Stream cipher for binary image encryption using Ant Colony Optimization based key generation

نویسندگان

  • N. K. Sreelaja
  • G. A. Vijayalakshmi Pai
چکیده

Encryption of binary images is essential since it is vulnerable to eavesdropping in wired and wireless networks. The security of data becomes important since the communications over open network occur frequently. This paper focuses on encryption of binary image using a stream cipher method. In this paper we propose an Ant Colony Optimization (ACO) based approach of generating keys for encryption. The binary image is represented in a text form and encrypted using a stream cipher method. A novel technique termed Ant Colony Optimization Key Generation Binary Image Encryption (AKGBE) algorithm employs a character code table for encoding the keys and the plain text representing the binary image. The main advantage of this approach is that it reduces the number of keys to be stored and distributed. Experimental results demonstrating AKGBE’s encrypting binary images of different sizes and the comparison of its performance with other stream cipher methods are presented. © 2012 Elsevier B.V. All rights reserved.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Stream Cipher for Image Encryption Using Ant Colony Optimization Based Key Generation

This chapter deals with a stream cipher method for encrypting images. As digital devices such as scanners and digital cameras become more and more available and mass storage media for digital data become more affordable, the use of digital images in practical applications are becoming more widespread. The wired and wireless IP networks are vulnerable to eavesdropping making essential the data t...

متن کامل

Design of Stream Cipher for Text Encryption using Particle Swarm Optimization based Key Generation

Encryption of data traffic in a network is essential since it is vulnerable to eavesdropping. Thus the data transferred in a network is encrypted. Encryption can be done using stream cipher method such as Vernam Cipher which is considered to be the perfect cipher. However this method suffers from the drawback of storing and distributing a large number of keys. In this paper we propose a Particl...

متن کامل

Using Ants to Attack a Classical Cipher

Transposition ciphers are a class of historical encryption algorithms based on rearranging units of plaintext according to some fixed permutation which acts as the secret key. Transpositions form a building block of modern ciphers, and applications of metaheuristic optimisation techniques to classical ciphers have preceded successful results on modern-day cryptological problems. In this paper w...

متن کامل

High-speed architectures for binary-tree based stream ciphers: Leviathan case study

Abstract Real-time applications such as streaming media and voice require encryption algorithms that do not propagate errors and support fast encryption on small blocks. Since IP packets are delivered out-of-order in routed networks it is difficult to synchronize the source and the destination, therefore requiring encryption algorithms to support out-of-order generation of key stream. In this p...

متن کامل

Stream Cipher for Text Encryption Using Swarm Intelligence Based Key Generation

The third important aspect of security is encryption to transfer messages among the users in a secure manner. Group key management discussed in the earlier chapter is applicable for transferring messages securely to the members in a group. Apart from transferring messages to the members in a group, messages can be transferred securely to an individual user. Encryption plays a major role in such...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Appl. Soft Comput.

دوره 12  شماره 

صفحات  -

تاریخ انتشار 2012