TABLE 4 - uploaded by Alireza Jolfaei
Content may be subject to copyright.
COMPARISON BETWEEN MAE OF A5/1 AND W7. 

COMPARISON BETWEEN MAE OF A5/1 AND W7. 

Source publication
Article
Full-text available
In this paper, we survey A5/1 and W7 stream ciphers as methods for protecting the distribution of digital images in an efficient and secure way. So, we performed a series of tests and some comparisons to justify their efficiency for image encryption. These tests included key space analysis, histogram analysis, Randomness Tests, information entropy,...

Similar publications

Article
Full-text available
Rivest Cipher 4 (RC4) is an efficient stream cipher that is commonly used in internet protocols. However, there are several flaws in the key scheduling algorithm (KSA) of RC4. The contribution of this paper is to overcome some of these weaknesses by proposing a new version of KSA coined as modified KSA. In the initial state of the array is suggeste...
Article
Full-text available
In this paper, a new modification was proposed to enhance the security level in the Blowfish algorithm by increasing the difficulty of cracking the original message which will lead to be safe against unauthorized attack. This algorithm is a symmetric variable-length key, 64-bit block cipher and it is implemented using gray scale images of different...
Conference Paper
Full-text available
Nonlinear feedback shift registers (NLFSRs) are a central part of many stream ciphers such as the Grain cipher, first introduced in 2005. Zadeh and Heys have in several papers, e.g., [1], applied the Simple Power Analysis (SPA) attack on stream ciphers to determine the contents of the nonlinear feedback shift register used in the cipher. In this pa...
Article
Full-text available
The stream cipher systems are used to protect the sensitive information from adversaries. There are many types of algorithms that vary in complexity and security degree. Most of the securities in stream cipher systems depend on the strength of cipher key generation. One of the problems with these systems is the key exchanges or distribution. This p...
Conference Paper
Full-text available
This paper treats the protection of images. We are dealing with the problem of image encryption and decryption. The encryption scheme is done by using the stream cipher system based on the nonlinear combination generator. The proposed keystream generator consists of fourteen binary primitive nonlinear feedback shift registers (NLFSRs) and one Boole...

Citations

... In Mirghadri (2010b, 2010c) and Jolfaei et al. (2012aJolfaei et al. ( , 2012b, Jolfaei et al. investigated the application of fast stream ciphers, including A5/1 (Ekdahl and Johansson, 2003), W7 (Jolfaei and Mirghadri, 2010b) and some of the eSTREAM finalists, such as Salsa20 (Bernstein, 2008a) and HC (Wu, 2008a), for the syntax-aware image encryption. These ciphers work on binary streams. ...
Article
Full-text available
Confidentiality of digital images is an important requirement for many multimedia applications and services. To maintain confidentiality, encryption of digital images is essential. Digital images are usually very large and encrypting such bulky data induces many performance overheads, which can be too expensive for real-time applications in resource constrained environments. In this paper, we propose a chaotic image encryption scheme which satisfies the need for both lightweightedness and security. To justify the security and efficiency, the new cipher was evaluated using a series of statistical tests. These tests included a visual testing and a histogram analysis, a randomness analysis, a correlation analysis, an entropy analysis and an image encryption quality analysis. Based on all analyses and experimental results, it is concluded that the proposed scheme is effective, efficient and trustworthy and therefore can be adopted for image encryption.
... In the second type, the output sequence is built based on a function of the key and a fixed number of previous bits of the cipher text [19]. In this paper, two simultaneous stream cipher algorithms will be used that for video frames encryption are much better than any other block ciphers such as AES or DES. ...
... One of the encryption systems used in GSM mobile system is the A5/1 stream cipher. A5/1 is a simultaneous stream cipher and is built based on the linear feedback shift registers [19]. ...
... W7 is a simultaneous stream cipher that is suitable for the hardware implementation and is designed for very high rates of data. This cipher has been proposed in order to replace A5/1 in GSM security plan due to the security problems in A5/1 [19]. ...
Article
Full-text available
Recently, creating security in multimedia systems involving video has become one of the main needs in commercial and military usages. The most important traits of video frames are simultaneousness of frames and high volume of information. Considering these features, A5/1 and W7 stream ciphers are used for video main frames in the field of selective encryption of each DCT transform coefficient.In addition, a suitable method is expressed in order to select the encryption method of DCT transform coefficients by the stream algorithms. The simulation results of MATLAB software show that this method is suitable for multimedia security in terms of both security and execution speed of the algorithm.
... Commonly stream encryption algorithms are used for image encryption [5,[7][8][9]. Stream ciphers are built using a pseudorandom key sequence, and then this sequence is combined with the original text through exclusive-or operator. ...
... Also, both algorithms have adequate security and proper performance speed for image encrypting as compared to block cipher algorithms such as DES, AES, and RC5. Reference [7] provides more details about these two algorithms and their applications in multimedia security. This paper is classified as follows. ...
... Any pixel correlates highly with adjacent pixels in the original image. Equations (5), (6), and (7) are used to study the correlation between adjacent pixels in horizontal, vertical, and diagonal orientations [4,7,15,16]: ...
Article
Full-text available
Security of the multimedia data including image and video is one of the basic requirements for the telecommunications and computer networks. In this paper, we consider a simple and lightweight stream encryption algorithm for image encryption, and a series of tests are performed to confirm suitability of the described encryption algorithm. These tests include visual test, histogram analysis, information entropy, encryption quality, correlation analysis, differential analysis, and performance analysis. Based on this analysis, it can be concluded that the present algorithm in comparison to A5/1 and W7 stream ciphers has the same security level, is better in terms of the speed of performance, and is used for real-time applications.
... The histogram analysis clarifies how pixels in an image are distributed by plotting the number of pixels at each intensity level [19]. As we consider many image frames, hence we perform chi-square test [35,36] to justify the uniformity caused by the proposed scheme. ...
Article
A multimedia surveillance system aims to provide security and safety of people in a monitored space. However, due to the nature of surveillance, privacy-sensitive information such as face, gait, and other physical parameters based on the captured media from multiple sensors, can be revealed without the permission of the people who appear in the surveillance video. This is a major concern in recent days. Therefore, it is desirable to have such mechanism that can hide privacy-sensitive information as much as possible, yet supporting effective surveillance tasks. In this article, we propose a chaos cryptography based data scrambling approach that can be applied on selected regions of interest (ROIs) in video camera footage, which contains privacy-sensitive data. Our approach also supports multiple levels of abstraction of data hiding depending on the role of the authorized user. In order to evaluate the suitability of this approach, we applied our algorithm on some video camera footage and observed that our approach is computationally efficient and, hence, it can be applied for real-time video surveillance tasks in preserving privacy sensitive information.
... Pass [7,8,12,16] 14488 253.0605 Pass [7,8,8,12] 14412 Frequency test within a block failed [7,7,2,7] 14065 353.3379 Fail [6,9,6,2] 12494 ...
... Pass [7,8,8,12] 14412 Frequency test within a block failed [7,7,2,7] 14065 353.3379 Fail [6,9,6,2] 12494 ...
Article
Full-text available
Salsa20 uses a single set of rotation distances within its core function. To our knowledge, no design rationales on the choice of rotation distances are given on the Salsa20 core function. This is the first paper that analyzes rotations influence over the output sequence in the Salsa20 image encryption scheme. We focus on the Salsa20/8 image encryption scheme and use recent developments in the analysis of the Salsa20 core function to evaluate the security implications of using different sets of rotation distances in the core function. Finally, we give some observations on the some sets of rotation distances used in the Salsa20/8 image encryption scheme.
... Pass [7,8,12,16] 14488 253.0605 Pass [7,8,8,12] 14412 Frequency test within a block failed [7,7,2,7] 14065 353.3379 Fail [6,9,6,2] 12494 ...
... Pass [7,8,8,12] 14412 Frequency test within a block failed [7,7,2,7] 14065 353.3379 Fail [6,9,6,2] 12494 ...
Conference Paper
Full-text available
Salsa20 uses a single set of rotation distances within its core function. To our knowledge, no design rationales on the choice of rotation distances are given on Salsa20 core function. This is the first paper that analyzes rotations influence over the output sequence in Salsa20 image encryption scheme. We focus on Salsa20/8 image encryption scheme and use recent developments in the analysis of the Salsa20 core function to evaluate the security implications of using different sets of rotation distances in the core function. Finally, we give some observations on the some set of rotation distances used in Salsa20/8 image encryption scheme.
... The histogram analysis clarifies how pixels in an image are distributed by plotting the number of pixels at each intensity level [19]. As we consider many image frames, hence we perform chi-square test [35,36] to justify the uniformity caused by the proposed scheme. ...
Conference Paper
Potential of nonverbal communication as the communication medium between multiuser 3D virtual worlds and real environment are attracting the interest of many researchers around the world. Driven by the motivation, we explored the possibilities of integrating haptic interactions with Linden Lab's multiuser online virtual world, Second Life. We developed an add-on to the Second Life communication channel in order to facilitate emotional feedbacks such as human touch, encouraging pat and comforting hug to the participating users through real-world haptic simulation. These social touch that are fundamental to physical and emotional development in turn can enhance the users interactive and immersive experiences with the virtual social communities in the Second Life. In this paper, we describe the development of a prototype that realizes the aforementioned virtual-real communication through a haptic-jacket system. Some of the potential applications of the proposed approach include remote child caring, stress recovery, distant lover's communication etc.
... The encrypted image histogram, approximated by a uniform distribution, is quite different from plainimage histogram. The uniformity caused by the proposed encryption scheme is justified by the chisquare test [18,19] as follows: ...
Article
Full-text available
In this paper, a novel image encryption scheme is proposed based on combination of pixel shuffling and W7. Due to sensitivity to initial conditions, chaotic maps have a good potential for designing dynamic permutation map. So a chaotic Henon map is used to generate permutation matrix. An external secret key is used to derive the initial conditions for the chaotic map and W7 secret key. Pixel shuffling is performed via vertical and horizontal permutation. Shuffling is used to expand diffusion in the image and dissipate the high correlation among image pixels. In order to evaluate performance, the proposed algorithm was measured through a series of tests. Experimental results illustrate that the scheme is highly key sensitive and shows a good resistance against brute-force and statistical attacks.
Article
In this research article, we have designed a novel image encryption scheme based on Deoxyribonucleic acid (DNA) and chaotic sequencing. We have studied sequences of different genes consisting of four bases, Adenine (A), Cytosine (C), Thymine (T) and Guanine (G), also known as nucleotides which are the fundamental code of life. The purpose of DNA is to store, copy and transmit the genetic information of the living organism. The proposed image encryption scheme uses the chaotic system to generate random sequences and to choose between two or more options. The image is totally transformed by first encoding it into DNA nucleotides, shuffling to achieve diffusion and then substitution is performed to achieve confusion. Then later the DNA fusion operation is performed on the DNA image and the DNA complements are applied on the resulting DNA image, a random number of times to break the residual correlation between the pixels. The cipher image has been tested to fulfill all the standard benchmarks to be categorized as a good ciphered image which includes entropy, correlation coefficient, Pearson’s chi square, peak signal to noise ratio, mean square error, mean absolute error, structure similarity indexed measures, differential analysis and histogram uniformity test.
Article
Full-text available