Image encryption using HC-128 and HC-256 stream ciphers

Alireza Jolfaei, Ahmadreza Vizandan, Abdolrasoul Mirghadri

Research output: Contribution to journalArticle

7 Citations (Scopus)

Abstract

In this paper, we surveyed HC-128 and HC-256 as methods for protecting the distribution of digital images in an efficient and secure way. We proposed the Hongjun Cipher (HC) image encryption algorithm based on column-wise raster scanning of the plain image. Then, we performed a series of tests and some comparisons to justify the efficiency of surveyed algorithms for image encryption. These tests included key space analysis, visual test and histogram analysis, randomness analysis, information entropy, encryption quality, correlation analysis, differential analysis, sensitivity analysis and performance analysis. Based on all analysis and experimental results, it can be concluded that the two variants of HC scheme are efficient, feasible and trustworthy to be adopted for image encryption.
Original languageEnglish
Pages (from-to)19-42
Number of pages24
JournalInternational Journal of Electronic Security and Digital Forensics
Volume4
Issue number1
DOIs
Publication statusPublished - 2012
Externally publishedYes

Fingerprint Dive into the research topics of 'Image encryption using HC-128 and HC-256 stream ciphers'. Together they form a unique fingerprint.

  • Cite this