Image encryption using HC-128 and HC-256 stream ciphers

  • Authors:
  • Alireza Jolfaei;Ahmadreza Vizandan;Abdolrasoul Mirghadri

  • Affiliations:
  • Faculty and Research Center of Communication and Information Technology, IHU, Tehran, Iran;Faculty and Research Center of Communication and Information Technology, IHU, Tehran, Iran;Faculty and Research Center of Communication and Information Technology, IHU, Tehran, Iran

  • Venue:
  • International Journal of Electronic Security and Digital Forensics
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we surveyed HC-128 and HC-256 as methods for protecting the distribution of digital images in an efficient and secure way. We proposed the Hongjun Cipher (HC) image encryption algorithm based on column-wise raster scanning of the plain image. Then, we performed a series of tests and some comparisons to justify the efficiency of surveyed algorithms for image encryption. These tests included key space analysis, visual test and histogram analysis, randomness analysis, information entropy, encryption quality, correlation analysis, differential analysis, sensitivity analysis and performance analysis. Based on all analysis and experimental results, it can be concluded that the two variants of HC scheme are efficient, feasible and trustworthy to be adopted for image encryption.