Improvement of rabbit lightweight stream cipher for image encryption using Lévy flight

https://doi.org/10.53730/ijhs.v6nS8.11630

Authors

  • Tameem Hameed Obaida Department of Computer Systems Techniques, Al-Furat Al-Awsat Technical University, Najaf Technical Institute, AL Najaf, Iraq
  • Abeer Salim Jamil Department of Computer Technical Engineering, Al-Mansour University College, Iraq
  • Nidaa Flaih Hassan Department of Computer Science, University of Technology, Baghdad, Iraq

Keywords:

image encryption, levey flay, rabbit, initial vector, Lévy flight

Abstract

The encryption of digital images plays a very important role in maintaining privacy and security, in order to protect the people, like witnesses. So, an individual image must be encrypted before it is sent over the Internet to the intended recipient. In this paper, images are encrypted using the rabbit algorithm and the chaotic equation represented by Lévy flight for several reasons, including employing beginning seed number, variance of parameters, and unpredictable random walk direction by making the encryption key more robust through the randomization of the initial vector values. After applying the original and improved rabbit encryption algorithms to the images, the results showed that the proposed Rabbit cipher has shown higher robustness against brute force assaults and larger capability of defending against the statistical cracking. Which has been verified and validated through the use of security metrics are PSNR, MSE, and entropy criteria., The encryption of a 256-size image was achieved in just 3 seconds when the improved Rabbit algorithm has been used, so it will be possible to encrypt video frames in real time because it requires a lesser time and having higher security.

Downloads

Download data is not yet available.

References

Ail, Y.H. and Z.A. Alobaidy, Images encryption using chaos and random generation. Eng. &Tech. Journal, 2016. 34(1).

Akhyar, F., S.M. Nasution, and T.W. Purboyo. Rabbit algorithm for Video on Demand. in 2015 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob). 2015. IEEE.

Ali, N.H.M., A.M.S. Rahma, and A.S. Jamil, Text Hiding in Color Images Using the Secret Key Transformation Function in GF (2 n). Iraqi Journal of Science, 2015. 56(4B): p. 3240-3245.

Al-Janabi, S.T.F., K.S. Rijab, and A.M. Sagheer. Video Encryption Based on Special Huffman Coding and Rabbit Stream Cipher. in 2011 Developments in E-systems Engineering. 2011. IEEE.

Almheiri, A., et al., The entropy of Hawking radiation. Reviews of Modern Physics, 2021. 93(3): p. 035002.

Barthelemy, P., J. Bertolotti, and D.S. Wiersma, A Lévy flight for light. Nature, 2008. 453(7194): p. 495-498.

Boesgaard, M., et al. Rabbit: A new high-performance stream cipher. in International workshop on fast software encryption. 2003. Springer.

Chanana, M. (2018). Empirical study: relationship between self efficacy and academic performance. International Journal of Health & Medical Sciences, 1(1), 28-34. https://doi.org/10.31295/ijhms.v1n1.36

Chechkin, A.V., et al., Introduction to the theory of Lévy flights. Anomalous transport, 2008. 129.

Choo, E., et al. SRMT: A lightweight encryption scheme for secure real-time multimedia transmission. in 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07). 2007. IEEE.

Feng, X., et al., On guess and determine analysis of Rabbit. International Journal of Foundations of Computer Science, 2011. 22(06): p. 1283-1296.

Fúster-Sabater, A., Computing Classes of Cryptographic Sequence Generators. Procedia Computer Science, 2013. 18: p. 2440-2443.

Gandara, R.B. and M. Alaydrus. Analysis of the IEEE 802.15. 4 Protocol with Rabbit Encryption Algorithm for Industrial Applications in Oil and Gas Sector. in 2019 16th International Conference on Quality in Research (QIR): International Symposium on Electrical and Computer Engineering. 2019. IEEE.

Kundella, S. and R. Gobinath, A Persuasive Rabbit Algorithm Enhanced with Map Reduce Security Mechanism for ECG Data Security in Cloud Storage. Annals of the Romanian Society for Cell Biology, 2021. 25(6): p. 8882-8893.

Leksono, M.A. and R. Munir. Email client application with rabbit algorithm for Android smart phone. in 2012 7th International Conference on Telecommunication Systems, Services, and Applications (TSSA). 2012. IEEE.

Mahdi, M. and N. Hassan, A suggested super salsa stream cipher. Iraqi Journal for Computers and Informatics, 2018. 44(2): p. 5-10.

Mahdi, M.S. and N.F. Hassan, Design of keystream Generator utilizing Firefly Algorithm. Journal of Al-Qadisiyah for computer science and mathematics, 2018. 10(3): p. Page 91-99.

Obaida, T. H., & Abd, D. H. (2016). A Robust Approach for Mixed Technique of Data Encryption Between DES and RC4 Algorithm. Journal of Kufa for Mathematics and Computer, 3(2).

Prathima, N., S. Chetan, and S.M. Rehman. ASIC Implementation of Rabbit Stream Cipher Encryption for Data. in 2019 IEEE International WIE Conference on Electrical and Computer Engineering (WIECON-ECE). 2019. IEEE.

Santra, S., et al. Real-Time Vehicle Detection from Captured Images. in 2019 International Conference on Opto-Electronics and Applied Optics (Optronix). 2019. IEEE.

Sharma, A., et al., Multi-level image thresholding based on Kapur and Tsallis entropy using firefly algorithm. Journal of Interdisciplinary Mathematics, 2020. 23(2): p. 563-571.

Sruthi, L., et al., Secure Data Transmission using Rabbit Stream Cipher. International Journal of Engineering Research, 2014. 3(4).

Suryasa, I. W., Rodríguez-Gámez, M., & Koldoris, T. (2021). Health and treatment of diabetes mellitus. International Journal of Health Sciences, 5(1), i-v. https://doi.org/10.53730/ijhs.v5n1.2864

Suwais, K., Parallel Model for Rabbit Stream Cipher over Multi-core Processors. WSEAS TRANSACTIONS on INFORMATION SCIENCE and APPLICATIONS, 2014.

Tahir, R., et al. LRSA: lightweight Rabbit based security architecture for wireless sensor networks. in 2008 Second International Symposium on Intelligent Information Technology Application. 2008. IEEE.

Wang, Y., M. O'Neill, and F. Kurugollu. The improved sign bit encryption of motion vectors for H. 264/AVC. in 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO). 2012. IEEE.

Published

09-08-2022

How to Cite

Obaida, T. H., Jamil, A. S., & Hassan, N. F. (2022). Improvement of rabbit lightweight stream cipher for image encryption using Lévy flight. International Journal of Health Sciences, 6(S8), 1628–1641. https://doi.org/10.53730/ijhs.v6nS8.11630

Issue

Section

Peer Review Articles