2017 International Conference on Inventive Systems and Control (ICISC) 2017
DOI: 10.1109/icisc.2017.8068729
|View full text |Cite
|
Sign up to set email alerts
|

Permutation-Substitution architecture based image encryption algorithm using middle square and RC4 PRNG

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 7 publications
0
6
0
Order By: Relevance
“…Bhowmick et al [18] in 2017 designed a scheme for encrypting gray scale images based on PSN architecture using middle square and RC4 Pseudo Random Number Generation (PRNG). Although, the images encrypted by the designed scheme attains the ideal entropy value, but it fails to resist the differential attack.…”
Section: Related Workmentioning
confidence: 99%
“…Bhowmick et al [18] in 2017 designed a scheme for encrypting gray scale images based on PSN architecture using middle square and RC4 Pseudo Random Number Generation (PRNG). Although, the images encrypted by the designed scheme attains the ideal entropy value, but it fails to resist the differential attack.…”
Section: Related Workmentioning
confidence: 99%
“…Mao et al [10] presented an image encryption scheme using 3D chaotic baker maps. Bhowmick et al [11] used the middle square and the RC4 for an image encryption architecture. Bhopi et al [12] proposed an encryption algorithm for the security of medical images based on permutation.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, avoiding unauthorised access and view to the DICOM imaging has become an important issue. Many techniques are used to protect secret images like encryption [1–12] and watermarking [13–16]. However, the capacity of watermarking techniques is limited, so to hide an image in another multimedia data, it is necessary that the size of the cover data will be multiple of the watermark data.…”
Section: Introductionmentioning
confidence: 99%
“…At the last layer, the results of bit-shift and ACM encryption are encrypted again with the RC4 algorithm, which is a stream cipher. The RC4 algorithm consists of three stages, namely the key scheduling algorithm (KSA), pseudo-random generator algorithm (PRGA), and XOR operation [30]. The key used in this layer is the same as the key used in the previous two layers, but the key used does not go through the preprocessing process such as SUM, SUB, ABS, and MOD operations.…”
Section: Stream Ciphermentioning
confidence: 99%