Developed Lightweight Cryptographic Algorithms for The Application of Image Encryption: A Review

Authors

  • Alaa Noori Mazher Department of Computer Science, University of Technology, Baghdad-Iraq
  • Jumana Waleed Department of Computer Science, College of Science, University of Diyala, Diyala -Iraq
  • Abeer Tariq Maolood Department of Computer Science, University of Technology, Baghdad-Iraq

DOI:

https://doi.org/10.29304/jqcm.2021.13.2.788

Keywords:

Developed Lightweight Cryptographic Algorithms, Digital Image Encryption, Salsa20, ChaCha20

Abstract

As a consequence of the fast evolution of information technology, a substantial amount of digital information is created and disseminated over various kinds of networks. The digital image represents one of the most commonly utilized formats of digital data since it has a straight visual effect. Moreover, a digital image holds important possibilities and extra information, for instance, personal photographs are capable of conveying the persons' physical appearance as well as other details like their ages and health. So, it is significant to protect digital images from unauthorized accessing that certainly specifies the need for developing efficient lightweight cryptographic algorithms to ensure the digital images' privacy. In this review paper, several developed lightweight cryptographic algorithms and their application in digital image encryption were presented. Additionally, a comparative analysis of the recently existing related works was achieved for these developed algorithms.

Downloads

Download data is not yet available.

References

[1] Mohamed Z. T., Xingyuan W., "A new fractional one dimensional chaotic map and its application in high-speed image encryption", Information Sciences, Vol. 550, (2021), 13-26.
[2] Mazher, A., Waleed, J., & MaoLood, A. (2020). The Security Threats and Solutions of Network Functions Virtualization: A Review. Journal of Al-Qadisiyah for Computer Science and Mathematics, 12(4), Comp Page 38-50.
[3] Najeeb, H. (2020). Steganography Technique for Embedding a Variety of Binary Images inside a Grayscale Image. Journal of Al-Qadisiyah for Computer Science and Mathematics, 12(2), Comp Page 1 -11.
[4] Waleed J., Jun H. D., Abbas T., Hameed S., Hatem H. (2014). A Survey of Digital Image Watermarking Optimization based on Nature Inspired Algorithms NIAs. International Journal of Security and Its Applications, 8(6), Page 315-334.
[5] Waleed J., Jun H. D., Hameed S. (2015). An Optimized Digital Image Watermarking Technique Based on Cuckoo Search (CS). ICIC Express Letters Part B: Applications. 6(10), Page 2629-2634.
[6] J.S. Al-janabi, R., J.S. Al-janabi, S., & Hussein Toman, Z. (2017). New method for Increasing watermarked image quality and security. Journal of Al-Qadisiyah for Computer Science and Mathematics, 9(2), Comp Page 78 - 85.
[7] Abduldaim A. M., Waleed J., Mazher A. N. (2020). An Efficient Scheme of Digital Image Watermarking Based on Hessenberg Factorization and DWT. 2020 International Conference on Computer Science and Software Engineering (CSASE), Duhok, Iraq, Page 180-185.
[8] Sabri R. I., Abduldaim A. M., Waleed J. (2020). Mamdani FIS Combined With LU Decomposition Method and Two-Level LWT for Image Watermarking Technique," 2020 3rd International Conference on Engineering Technology and its Applications (IICETA), Najaf, Iraq, Page 12-17.
[9] Ahmed, A., Salah, H., & Jameel, J. (2019). Multikey Image Encryption Algorithm Based on a High-Complexity Hyperchaotic System. Journal of Al-Qadisiyah for Computer Science and Mathematics, 11(3), Comp Page 69-85.
[10] Rokan Naif, J., H. Abdul-majeed, G., & K. Farhan, A. (2019). Internet of Things Security using New Chaotic System and Lightweight AES. Journal of Al-Qadisiyah for Computer Science and Mathematics, 11(2), comp 45-52.
[11] A. N. Mazher and J. Waleed, " Implementation of Modified GSO Based Magic Cube Keys Generation in Cryptography", Eastern-European Journal of Enterprise Technologies, vol. 1, No. 9-109, (2021), 43-49.
[12] Maniyath S.R., Thanikaiselvan V., "Robust and Lightweight Image Encryption Approach Using Public Key Cryptosystem", Cybernetics and Algorithms in Intelligent Systems. CSOC2018 2018. Advances in Intelligent Systems and Computing, Vol. 765. Springer, Cham, (2019), 1-11.
[13] T. M. Hasan, J. Waleed, N. M. Sahib, "Information Hiding Based on Retina Random Number Keys", Solid State Technology, Vol. 63 No. 1 (2020), 497-787.
[14] Shah A., Engineer M., "A Survey of Lightweight Cryptographic Algorithms for IoT-Based Applications", Smart Innovations in Communication and Computational Sciences. Advances in Intelligent Systems and Computing, Vol. 851. Springer, Singapore, (2019), 283-293.
[15] N. Raad, T. Hasan, A. Chalak and J. Waleed, "Secure Data In LoRaWAN Network By Adaptive Method Of Elliptic-curve Cryptography", 2019 International Conference on Computing and Information Science and Technology and Their Applications (ICCISTA), (2019), 1-6.
[16] N. Raad, T. M. Hasan, A. Chalak and J. Waleed, "Secure Data Transmissions for Iraqi National Identification Card Using LoRaWAN Protocol", 2019 2nd International Conference on Engineering Technology and its Applications (IICETA), (2019), 67-72.
[17] Muhammad Rana and Q. Mamun and M. R. Islam, "Current Lightweight Cryptography Protocols in Smart City IoT Networks: A Survey", ArXiv, Vol. abs/2010.00852, (2020), 1-22.
[18] Z. M. Jawad Kubba and H. K. Hoomod, "A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System," 2019 First International Conference of Computer and Applied Sciences (CAS), (2019), 199-203.
[19] H. A. Ismael, J. M. Abbas, S. A. Mostafa, and A. H. Fadel, “An enhanced fireworks algorithm to generate prime key for multiple users in fingerprinting domain,” Bull. Electr. Eng. Informatics, Vol. 10, No. 1, (2020), 337–343.
[20] D. J. Bernstein, "The Salsa20 Family of Stream Ciphers", New Stream Cipher Designs. Lecture Notes in Computer Science, vol. 4986. Springer, Berlin, Heidelberg, (2008), 84–97.
[21] Lin Ding, "Improved Related-Cipher Attack on Salsa20 Stream Cipher", in IEEE Access, Vol. 7, (2019), 30197-30202.
[22] A. Jolfaei and A. Mirghadri, "Survey: Image Encryption Using Salsa20", IJCSI International Journal of Computer Science Issues, Vol. 7, No. 5, (2010), 213-220.
[23] M. Almazrooie, A. Samsudin, M. M. Singh, "Improving the Diffusion of the Stream Cipher Salsa20 by Employing a Chaotic Logistic Map", Journal of Information Processing Systems, Vol. 11, No. 2, (2015), 310-324.
[24] A. H. Fadel, R. S. Hameed, J. N. Hasoon, S. A. Mostafa, B. A. Khalaf, "A Light-weight ESalsa20 Ciphering based on 1D Logistic and Chebyshev Chaotic Maps", Solid State Technology, Vol. 63, No. 1, (2020), 704-717.
[25] E. L. Mohaisen and R. S. Mohammed, "Improving Salsa20 Stream Cipher Using Random Chaotic Maps," 2020 3rd International Conference on Engineering Technology and its Applications (IICETA), (2020), 1-6.
[26] K. R. Qasim, and S. S. Qasim, "Encrypt Medical Image using CSalsa20 Stream Algorithm", Medico-Legal Update, Vol. 20, No. 3, (2020), 1248-1256.
[27] S. Dey, and S. Sarkar, "Improved analysis for reduced round Salsa and Chacha", Discrete Applied Mathematics, Vol. 227, (2017), 58-69.
[28] A. Czubak, A. Jasiński, M. Szymanek, "A Note on Keys and Keystreams of Chacha20 for Multi-Key Channels", Computer Networks, Communications in Computer and Information Science, Vol. 860. Springer, Cham, (2018), 1-16.
[29] M. S. Mahdi, R. A. Azeez, N. F. Hassan, "A proposed lightweight image encryption using ChaCha with hyperchaotic maps", Periodicals of Engineering and Natural Sciences, Vol. 8, No. 4, (2020), 2138-2145.

Downloads

Published

2021-05-06

How to Cite

Mazher, A. N., Waleed, J., & Maolood, A. T. (2021). Developed Lightweight Cryptographic Algorithms for The Application of Image Encryption: A Review. Journal of Al-Qadisiyah for Computer Science and Mathematics, 13(2), Comp Page 11 – 22. https://doi.org/10.29304/jqcm.2021.13.2.788

Issue

Section

Computer Articles