S. Janakiraman, P. Roshini, Sundararaman Rajagopalan, K. Thenmozhi, Rengarajan Amirtharajan
{"title":"排列对称密钥完美的轻量级图像加密","authors":"S. Janakiraman, P. Roshini, Sundararaman Rajagopalan, K. Thenmozhi, Rengarajan Amirtharajan","doi":"10.1109/ICDCSYST.2018.8605175","DOIUrl":null,"url":null,"abstract":"Internet advancements and the arrival of new embedded gadgets have radically raised the information sharing in the form of images. In turn, the encryption algorithms have been widely used to secure images. Most of these image encryption algorithms have to run on resource-constrained devices that demand less computational complexity. In this regard, the algorithm proposed in this paper satisfies the need for a computationally less complex image encryption process with its simpler and efficient key generation procedure. The analysis of the implementation results in terms of statistical parameters in addition to its ability to withstand differential attacks validates the security level of the proposed Iightweight image encryption algorithm.","PeriodicalId":175583,"journal":{"name":"2018 4th International Conference on Devices, Circuits and Systems (ICDCS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Permutated Symmetric Key for Perfect Lightweight Image Encryption\",\"authors\":\"S. Janakiraman, P. Roshini, Sundararaman Rajagopalan, K. Thenmozhi, Rengarajan Amirtharajan\",\"doi\":\"10.1109/ICDCSYST.2018.8605175\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Internet advancements and the arrival of new embedded gadgets have radically raised the information sharing in the form of images. In turn, the encryption algorithms have been widely used to secure images. Most of these image encryption algorithms have to run on resource-constrained devices that demand less computational complexity. In this regard, the algorithm proposed in this paper satisfies the need for a computationally less complex image encryption process with its simpler and efficient key generation procedure. The analysis of the implementation results in terms of statistical parameters in addition to its ability to withstand differential attacks validates the security level of the proposed Iightweight image encryption algorithm.\",\"PeriodicalId\":175583,\"journal\":{\"name\":\"2018 4th International Conference on Devices, Circuits and Systems (ICDCS)\",\"volume\":\"18 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 4th International Conference on Devices, Circuits and Systems (ICDCS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICDCSYST.2018.8605175\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 4th International Conference on Devices, Circuits and Systems (ICDCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICDCSYST.2018.8605175","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Permutated Symmetric Key for Perfect Lightweight Image Encryption
Internet advancements and the arrival of new embedded gadgets have radically raised the information sharing in the form of images. In turn, the encryption algorithms have been widely used to secure images. Most of these image encryption algorithms have to run on resource-constrained devices that demand less computational complexity. In this regard, the algorithm proposed in this paper satisfies the need for a computationally less complex image encryption process with its simpler and efficient key generation procedure. The analysis of the implementation results in terms of statistical parameters in addition to its ability to withstand differential attacks validates the security level of the proposed Iightweight image encryption algorithm.