DOI QR코드

DOI QR Code

Proposed image encryption method using PingPong256

  • Kim, Ki-Hwan (Dept. of Ubiquitous IT, Dongseo University) ;
  • Lee, Hoon Jae (Div. of Information and Communication Engineering, Dongseo University) ;
  • Lee, Young Sil (Div. of Information and Communication Engineering, Dongseo University)
  • Received : 2019.12.24
  • Accepted : 2020.01.06
  • Published : 2020.01.31

Abstract

In this paper, we propose a method in which PingPong256 combines LFSR and variable clock to generate an irregular PRNG and use it for image encryption. PingPong256 is guaranteed an extended period based on the two LFSRs, and the variable clock is a structure that outputs the result of operating a predetermined clock in one operation by referring to the state of the different LFSR. A variable clock is characterized by the difficulty of predicting the output at any time because the choice increases with time. PingPong256 combines the advantages of LFSR and variable clock, the convenience of hardware and software implementation, and the benefits of sensitivity and irregular periods. Also, the statistical safety was verified using the NIST SP800-22, the safety of the proposed method, and the sensitivity of the image change was tested using NPCR and UACI.

본 논문에서 우리는 PingPong256은 LFSR과 가변클록을 결합하여 불규칙한 PRNG를 생성하고 이를 이미지 암호화에 활용하는 방법을 제안한다. PingPong256은 2개의 LFSR을 기반으로 긴 주기가 보장되며, 가변클록은 서로 다른 LFSR의 상태를 참조하여 1회 동작시 임의의 클록만큼 동작한 결과를 출력하는 구조이다. 가변클록은 시간이 경과함에 따라 선택지가 증가하기 때문에 임의의 시간에 출력을 예측하기 어렵다는 특성으로 나타난다. PingPong256은 LFSR과 가변클록과 하드웨어 및 소프트웨어 구현의 편리함이라는 장점 및 민감성과 불규칙한 주기라는 장점을 결합한 것이다. 또한 NIST SP800-22를 사용하여 통계적 안전성을 검증하고 제안 된 방법의 안전성을 확인하고 NPCR 및 UACI를 사용하여 이미지 변화의 감도를 테스트 하였습니다.

Keywords

References

  1. Vaibhav B Joshi and Mehul S Raval, "An Improved Commutative Reversible Watermarking and Encryption for Fingerprint Image." September. 2019. URL:https://osf.io/kvxah/download
  2. KiHwan Kim, HyeongRag Kim, HoonJae Lee, Young-Jae Ryu, “Analysis of Noise Sensitivity due to Image Wireless Transmission,” Journal of the Korea Institute of Information and Communication Engineering(JKIICE), Vol. 22, No. 1, pp. 211-220, January 2018. DOI: https://doi.org/10.6109/jkiice.2018.22.1.211
  3. Amandeep Singh, Praveen Agarwal and Mehar Chand, "Image Encryption and Analysis using Dynamic AES," IEEE. 2019 5th International Conference on Optimization and Applications (ICOA), April 2019. DOI: 10.1109/ICOA.2019.8727711
  4. Yong Zhang, "Test and verification of AES used for image encryption," 3D Research, Vol. 9, No. 3, pp. 1, March 2018. DOI: 10.1007/s13319-017-0154-7
  5. Yuqin Lue, Jin Yu, Wenrui Lai, Lingfeng Liu, "A novel chaotic image encryption algorithm based on improved baker map and logistic map," Multimedia Tools and Applications, pp.1-21, April 2019. DIO: 10.1109/ICCSIT.2010.5564894
  6. Vinod Patidar, N.K. Pareek, G. Purohit, K.K. Sud, "A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption," ELSEVIER.
  7. Shuqin Zhu, Congxu Zhu and Wenhong Wang, "A New Image Encryption Algorithm Based on Chaos and Secure Hash SHA-256," Entropy, Vol.20, No.9, September 2018. DOI: 10.3390/e20090716
  8. Amna Shifa, Muhammad S. Afgan, Mamoona N. Asghar, Martin Fleury, Imran Memon, Saima Abdullah AND Nadia Rasheed, "Joint crypto-stego scheme for enhanced image protection with nearest-centroid clustering," IEEE Access, Vol. 6, pp.16189-16206, March 2018. DOI: 10.1109/ACCESS.2018.2815037
  9. El-Habib Bensikaddour, Youcef Bentoutou and Nasreddine Taleb, "Satellite image encryption method based on AES-CTR algorithm and GEFFE generator." 2017 8th International Conference on Recent Advances in Space Technologies (RAST), IEEE, June 2017. DOI: 10.1109/RAST.2017.8002953
  10. Ki-Hwan Kim and HoonJae Lee. "Proposal of multi-channel operation technique using PingPong256." 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), September 2018, DOI: https://doi.org/10.1109/TrustCom/BigDataSE.2018.00222
  11. Andrew Rukhin, Juan Soto, James Nechvatal, Miles Smid, Elaine Barker, Stefan Leigh, Mark Levenson, Mark Vangel, David Banks, Alan Heckert, James Dray and San Vo, "A statistical test suite for random and pseudorandom number generators for cryptographic applications," National Institute of Standards and Technology, 2001.
  12. Shi Liu, Changliang Guo and John T.Sheridan, "A review of optical image encryption techniques." Optics & Laser Technology, Vol. 57, pp. 327-342, April 2014. DOI: 10.1016/j.optlastec.2013.05.023
  13. Lu Xu, Zhi Li, Jian Li and Wei Hua, "A novel bit-level image encryption algorithm based on chaotic maps," Opt. Lasers Eng, Vol. 78, pp. 17-25, March 2016. DOI: 10.1016/j.optlaseng.2015.09.007
  14. Xing-Yuan Wang, Ying-Qian Zhang and Xue-Mei Bao, "A novel chaotic image encryption scheme using DNA sequence operations," Opt. Lasers Eng. Vol. 73, pp. 53-61, October 2015. DOI:10.1016/j.optlaseng.2015.03.022
  15. Ting Hu, Ye Liu, Li-Hua Gong and Chun-Juan Ouyang, "An image encryption scheme combining chaos with cycle operation for DNA sequences," Nonlinear Dyn, Vol. 87, pp. 51-66, August 2017. DOI: https://doi.org/10.1007/s11071-016-3024-6
  16. Ye Liu, Jun Wang, Jinghui Fan and Lihua Gong, "Image encryption algorithm based on chaotic system and dynamic S-boxes composed of DNA sequences," Multimed. Tools Appl, Vol. 75, pp. 4363-4382, February 2015. DOI: https://doi.org/10.1007/s11042-015-2479-7
  17. Yue Wu, Joseph P. Noonan and Sos Agaian, "NPCR and UACI randomness tests for image encryption," Cyber journals: multidisciplinary journals in science and technology, Journal of Selected Areas in Telecommunications (JSAT), Vol. 1, No. 2, pp. 31-38, April 2011. URL: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.390.2127&rep=rep1&type=pdf

Cited by

  1. 이미지 암호화 및 다양한 잡음에 내성을 갖춘 PingPong 256 Shuffling 방법 vol.24, pp.11, 2020, https://doi.org/10.6109/jkiice.2020.24.11.1507