2017
DOI: 10.1007/s11042-017-5124-9
|View full text |Cite
|
Sign up to set email alerts
|

A new efficient lightweight and secure image cipher scheme

Abstract: The protection of multimedia content has become a key area of research, since very often a user's privacy and confidentiality can be at risk. Although a large number of image encryption algorithms have recently emerged, only a subset of these algorithms are suitable for real applications. These algorithms however use non-integer operations such as chaotic solutions that introduce a sizeable overhead in terms of latency and resources, in addition to floating-point hardware that is costly to implement. Designing… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

2
64
0
2

Year Published

2018
2018
2019
2019

Publication Types

Select...
5
1
1

Relationship

3
4

Authors

Journals

citations
Cited by 30 publications
(68 citation statements)
references
References 36 publications
2
64
0
2
Order By: Relevance
“…Accordingly, a new paradigm emerged for cryptographic algorithms, which are referred to as "lightweight" since they exhibit low latency and overhead [5], [6]. Lightweight cryptographic algorithms that are based on the dynamic key approach have been proposed in [2], [7]- [9]. The cipher schemes described in [7]- [9] require two iterations of a round function, while [2] requires a single iteration of a round function, and it processes 2 blocks at a time, which makes it faster than the one in [7]- [9].…”
Section: B Related Workmentioning
confidence: 99%
“…Accordingly, a new paradigm emerged for cryptographic algorithms, which are referred to as "lightweight" since they exhibit low latency and overhead [5], [6]. Lightweight cryptographic algorithms that are based on the dynamic key approach have been proposed in [2], [7]- [9]. The cipher schemes described in [7]- [9] require two iterations of a round function, while [2] requires a single iteration of a round function, and it processes 2 blocks at a time, which makes it faster than the one in [7]- [9].…”
Section: B Related Workmentioning
confidence: 99%
“…Due to the meaning and content, this correlation is usually high (close to 1) in the case of a natural image. However, this correlation must be broken (close to 0) when encrypting the image [4], [18]. Fig.…”
Section: Security Evaluation Of Images Encrypted Under Chaotic Rcmentioning
confidence: 99%
“…Recently, two new lightweight cryptographic solutions were proposed, which are either based on a lightweight round function or on a small number of rounds by relying on the dynamic key approach [37,38], in order to reduce the required resources and latency [39,40,41]. These two recent dynamic key-dependent lightweight cipher schemes use a round function for two iterations (r = 2).…”
Section: Related Workmentioning
confidence: 99%
“…The round function of [37] consists of a dynamic substitution operation that uses a dynamic S-box followed by an integer matrix mixing for the diffusion operation. The cipher scheme of [37] is illustrated in Figure 1 and the architecture of [38] is similar compared to [37]. On the other hand, the cipher in [38], achieves a lower latency when compared to [37] since each round iteration applies only a single operation.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation