Improvement of rabbit lightweight stream cipher for image encryption using Lévy flight
Keywords:
image encryption, levey flay, rabbit, initial vector, Lévy flightAbstract
The encryption of digital images plays a very important role in maintaining privacy and security, in order to protect the people, like witnesses. So, an individual image must be encrypted before it is sent over the Internet to the intended recipient. In this paper, images are encrypted using the rabbit algorithm and the chaotic equation represented by Lévy flight for several reasons, including employing beginning seed number, variance of parameters, and unpredictable random walk direction by making the encryption key more robust through the randomization of the initial vector values. After applying the original and improved rabbit encryption algorithms to the images, the results showed that the proposed Rabbit cipher has shown higher robustness against brute force assaults and larger capability of defending against the statistical cracking. Which has been verified and validated through the use of security metrics are PSNR, MSE, and entropy criteria., The encryption of a 256-size image was achieved in just 3 seconds when the improved Rabbit algorithm has been used, so it will be possible to encrypt video frames in real time because it requires a lesser time and having higher security.
Downloads
References
Ail, Y.H. and Z.A. Alobaidy, Images encryption using chaos and random generation. Eng. &Tech. Journal, 2016. 34(1).
Akhyar, F., S.M. Nasution, and T.W. Purboyo. Rabbit algorithm for Video on Demand. in 2015 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob). 2015. IEEE.
Ali, N.H.M., A.M.S. Rahma, and A.S. Jamil, Text Hiding in Color Images Using the Secret Key Transformation Function in GF (2 n). Iraqi Journal of Science, 2015. 56(4B): p. 3240-3245.
Al-Janabi, S.T.F., K.S. Rijab, and A.M. Sagheer. Video Encryption Based on Special Huffman Coding and Rabbit Stream Cipher. in 2011 Developments in E-systems Engineering. 2011. IEEE.
Almheiri, A., et al., The entropy of Hawking radiation. Reviews of Modern Physics, 2021. 93(3): p. 035002.
Barthelemy, P., J. Bertolotti, and D.S. Wiersma, A Lévy flight for light. Nature, 2008. 453(7194): p. 495-498.
Boesgaard, M., et al. Rabbit: A new high-performance stream cipher. in International workshop on fast software encryption. 2003. Springer.
Chanana, M. (2018). Empirical study: relationship between self efficacy and academic performance. International Journal of Health & Medical Sciences, 1(1), 28-34. https://doi.org/10.31295/ijhms.v1n1.36
Chechkin, A.V., et al., Introduction to the theory of Lévy flights. Anomalous transport, 2008. 129.
Choo, E., et al. SRMT: A lightweight encryption scheme for secure real-time multimedia transmission. in 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07). 2007. IEEE.
Feng, X., et al., On guess and determine analysis of Rabbit. International Journal of Foundations of Computer Science, 2011. 22(06): p. 1283-1296.
Fúster-Sabater, A., Computing Classes of Cryptographic Sequence Generators. Procedia Computer Science, 2013. 18: p. 2440-2443.
Gandara, R.B. and M. Alaydrus. Analysis of the IEEE 802.15. 4 Protocol with Rabbit Encryption Algorithm for Industrial Applications in Oil and Gas Sector. in 2019 16th International Conference on Quality in Research (QIR): International Symposium on Electrical and Computer Engineering. 2019. IEEE.
Kundella, S. and R. Gobinath, A Persuasive Rabbit Algorithm Enhanced with Map Reduce Security Mechanism for ECG Data Security in Cloud Storage. Annals of the Romanian Society for Cell Biology, 2021. 25(6): p. 8882-8893.
Leksono, M.A. and R. Munir. Email client application with rabbit algorithm for Android smart phone. in 2012 7th International Conference on Telecommunication Systems, Services, and Applications (TSSA). 2012. IEEE.
Mahdi, M. and N. Hassan, A suggested super salsa stream cipher. Iraqi Journal for Computers and Informatics, 2018. 44(2): p. 5-10.
Mahdi, M.S. and N.F. Hassan, Design of keystream Generator utilizing Firefly Algorithm. Journal of Al-Qadisiyah for computer science and mathematics, 2018. 10(3): p. Page 91-99.
Obaida, T. H., & Abd, D. H. (2016). A Robust Approach for Mixed Technique of Data Encryption Between DES and RC4 Algorithm. Journal of Kufa for Mathematics and Computer, 3(2).
Prathima, N., S. Chetan, and S.M. Rehman. ASIC Implementation of Rabbit Stream Cipher Encryption for Data. in 2019 IEEE International WIE Conference on Electrical and Computer Engineering (WIECON-ECE). 2019. IEEE.
Santra, S., et al. Real-Time Vehicle Detection from Captured Images. in 2019 International Conference on Opto-Electronics and Applied Optics (Optronix). 2019. IEEE.
Sharma, A., et al., Multi-level image thresholding based on Kapur and Tsallis entropy using firefly algorithm. Journal of Interdisciplinary Mathematics, 2020. 23(2): p. 563-571.
Sruthi, L., et al., Secure Data Transmission using Rabbit Stream Cipher. International Journal of Engineering Research, 2014. 3(4).
Suryasa, I. W., Rodríguez-Gámez, M., & Koldoris, T. (2021). Health and treatment of diabetes mellitus. International Journal of Health Sciences, 5(1), i-v. https://doi.org/10.53730/ijhs.v5n1.2864
Suwais, K., Parallel Model for Rabbit Stream Cipher over Multi-core Processors. WSEAS TRANSACTIONS on INFORMATION SCIENCE and APPLICATIONS, 2014.
Tahir, R., et al. LRSA: lightweight Rabbit based security architecture for wireless sensor networks. in 2008 Second International Symposium on Intelligent Information Technology Application. 2008. IEEE.
Wang, Y., M. O'Neill, and F. Kurugollu. The improved sign bit encryption of motion vectors for H. 264/AVC. in 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO). 2012. IEEE.
Published
How to Cite
Issue
Section
Copyright (c) 2022 International journal of health sciences

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles published in the International Journal of Health Sciences (IJHS) are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJHS right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.
Articles published in IJHS can be copied, communicated and shared in their published form for non-commercial purposes provided full attribution is given to the author and the journal. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
This copyright notice applies to articles published in IJHS volumes 4 onwards. Please read about the copyright notices for previous volumes under Journal History.