In this paper, we surveyed HC-128 and HC-256 as methods for protecting the distribution of digital images in an efficient and secure way. We proposed the Hongjun Cipher (HC) image encryption algorithm based on column-wise raster scanning of the plain image. Then, we performed a series of tests and some comparisons to justify the efficiency of surveyed algorithms for image encryption. These tests included key space analysis, visual test and histogram analysis, randomness analysis, information entropy, encryption quality, correlation analysis, differential analysis, sensitivity analysis and performance analysis. Based on all analysis and experimental results, it can be concluded that the two variants of HC scheme are efficient, feasible and trustworthy to be adopted for image encryption.
|Number of pages||24|
|Journal||International Journal of Electronic Security and Digital Forensics|
|Publication status||Published - 2012|
Jolfaei, A., Vizandan, A., & Mirghadri, A. (2012). Image encryption using HC-128 and HC-256 stream ciphers. International Journal of Electronic Security and Digital Forensics, 4(1), 19-42. https://doi.org/10.1504/IJESDF.2012.045388