A Modified KLEIN Encryption-based Knight Tour for Image Encryption
DOI:
https://doi.org/10.37385/jaets.v5i1.3296Keywords:
KLEIN encryption, Knight tour, Image encryption, Lightweight encryptionAbstract
The security considerations should be balanced with the specific use case and potential risks associated with using lightweight encryption. The security offered by lighter encryption algorithms could not be as high as that offered by heavier encryption techniques. In this paper, a Modified KLEIN Algorithm is proposed for image encryption based on the Knight Tour movement in Chessboard. The required key generation is represented by inputting an image as a key image and then applying a specific operation based on knight tour movement to produce a key scheduled in the proposed encryption algorithm. The movement of Knight Tour applied in modifying the proposed algorithm for increasing security. The experimental results explain the efficiency of a modified algorithm when comparing the histogram of the input image with the encrypted image also the correlation is tested before and after encryption in three directions horizontal, vertical, and diagonal which explains there are very low values of them in all directions. The similarity test also explains there are high differences between the plain and encrypted images. The chessboard movement might be useful when used with another encryption algorithm which increases the confidentiality of transferring data. The contribution of this work is the use of an image as a key for encryption with a specific planning method which helps in key management.
Downloads
References
Bisht, K., & Deshmukh, M. (2020). Encryption algorithm based on knight’s tour and n-neighbourhood addition. 2020 7th International Conference on Signal Processing and Integrated Networks (SPIN), 31–36. https://doi.org/10.1109/SPIN48934.2020.9071013
Boussif, M., Aloui, N., & Cherif, A. (2020). Securing DICOM images by a new encryption algorithm using Arnold transform and Vigenère cipher. IET Image Processing, 14(6). https://doi.org/10.1049/iet-ipr.2019.0042
Chatterjee, R., & Chakraborty, R. (2020). A Modified Lightweight PRESENT Cipher For IoT Security. In 2020 International Conference on Computer Science, Engineering and Applications (ICCSEA), pp. 1-6. https://doi.org/10.1109/ICCSEA49143.2020.9132950
Gong, Z., Nikova, S., & Law, Y. W. (2011). KLEIN: a new family of lightweight block ciphers. International Workshop on Radio Frequency Identification: Security and Privacy Issues, 1–18. https://doi.org/10.1007/978-3-642-25286-0_1
Hasoon, J. N., Fadel, A. H., Hameed, R. S., & Khalaf, B. A. (2023). Pseudo number generation based on the knight tour in chess board. AIP Conference Proceedings, 2475(1). https://doi.org/10.1063/5.0102803
Hoomod, H. K., Naif, J. R., & Ahmed, I. S. (2020). A new intelligent hybrid encryption algorithm for IoT data based on modified PRESENT-Speck and novel 5D chaotic system. Periodicals of Engineering and Natural Sciences, 8(4), 2333-2345. http://dx.doi.org/10.21533/pen.v8i4.1738
Ja?mi?ah al-Mustans?iri?yah, Institute of Electrical and Electronics Engineers. Iraq Section, & Institute of Electrical and Electronics Engineers. (n.d.). 1st International Conference of Computer and Applied Sciences (1st - CAS 2019): December 18-19, 2019.
Jangir, A., & Pandey, J. G. (2021). GIFT cipher usage in image data security: hardware implementations, performance and statistical analyses. Journal of Real-Time Image Processing, 18(6), 2551–2567. https://doi.org/10.1007/s11554-021-01146-3
Kukreja, S., Kasana, G., & Kasana, S. S. (2021). Copyright protection scheme for color images using extended visual cryptography. Computers and Electrical Engineering, 91(February), 106931. https://doi.org/10.1016/j.compeleceng.2020.106931
Kushwaha, P. K., Singh, M. P., & Kumar, P. (2014). A survey on lightweight block ciphers. International Journal of Computer Applications, 96(17).
Lallemand, V., & Naya-Plasencia, M. (2014, March). Cryptanalysis of KLEIN. In International Workshop on Fast Software Encryption (pp. 451-470). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-662-46706-0_23
Liping, X., & Xi, W. (2020, August). Improved Encryption Algorithm for Digital Image of Knight Tour Based on Cell Block. In 2020 Chinese Control and Decision Conference (CCDC) (pp. 1146-1151). IEEE. https://doi.org/10.1109/CCDC49329.2020.9164366?
Liu, L., Hao, S., Lin, J., Wang, Z., Hu, X., & Miao, S. (2018). Image block encryption algorithm based on chaotic maps. IET Signal Processing, 12(1), 22–30. https://doi.org/10.1049/iet-spr.2016.0584
Liu, X., Deng, J., Sun, Q., Xue, C., Li, S., Zhou, Q., Huang, X., Liu, H., & Zhou, J. (2022). Differentiation of intracranial solitary fibrous tumor/hemangiopericytoma from atypical meningioma using apparent diffusion coefficient histogram analysis. Neurosurgical Review, 45(3), 2449–2456. https://doi.org/10.1007/s10143-022-01771-x
Mahmood, A. S., Rahim, M. S. M., & Othman, N. Z. S. (2016). Implementation of the binary random number generator using the knight tour problem. Modern Applied Science, 10(4), 35. http://dx.doi.org/10.5539/mas.v10n4p35
Muthalagu, R., Bolimera, A., & Kalaichelvi, V. (2020). Lane detection technique based on perspective transformation and histogram analysis for self-driving cars. Computers & Electrical Engineering, 85, 106653.
Rahman, A. U., Sultan, K., Musleh, D., Aldhafferi, N., Alqahtani, A., & Mahmud, M. (2018). Robust and Fragile Medical Image Watermarking: A Joint Venture of Coding and Chaos Theories. Journal of Healthcare Engineering, 2018. https://doi.org/10.1155/2018/8137436
Raj, V., Janakiraman, S., & Amirtharajan, R. (2021). Optimal concurrency on FPGA for lightweight medical image encryption. Journal of Intelligent and Fuzzy Systems, 40(6), 10385–10400. https://doi.org/10.3233/JIFS-200203
Sarosh, P., Parah, S. A., & Bhat, G. M. (2022). An efficient image encryption scheme for healthcare applications. Multimedia Tools and Applications, 81(5), 7253–7270. https://doi.org/10.1007/s11042-021-11812-0
Shannon, C. E. (1948). A mathematical theory of communication. The Bell System Technical Journal, 27(3), 379–423. https://doi.org/10.1002/j.1538-7305.1948.tb01338.x
Shashikiran, B. S., Shaila, K., & Venugopal, K. R. (2021). Minimal block knight’s tour and edge with lsb pixel replacement based encrypted image steganography. SN Computer Science, 2(3), 139. https://doi.org/10.1007/s42979-021-00542-7
Singh, M., Kakkar, A., & Singh, M. (2015). Image encryption scheme based on Knight’s tour problem. Procedia Computer Science, 70, 245–250. https://doi.org/10.1016/j.procs.2015.10.081
Singh, S., Sharma, P. K., Moon, S. Y., & Park, J. H. (2017). Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. Journal of Ambient Intelligence and Humanized Computing, 1–18. https://doi.org/10.1007/s12652-017-0494-4
Wasit University. College of Engineering, & Institute of Electrical and Electronics Engineers. (n.d.). International Conference on Advances in Sustainable Engineering and Applications?: 14-15 March 2018, Wasit, Iraq?: ICASEA 2018 conference proceedings.
Wu, Y., Noonan, J. P., & Agaian, S. (2011). Shannon entropy based randomness measurement and test for image encryption. arXiv preprint arXiv:1103.5520. https://doi.org/10.48550/arXiv.1103.5520
Yakout, A., Husseina, S. A., Bakryb, S., & Thabita, M. (n.d.). BIOCHEMICAL AND HEMATOLOGICAL ALTERATIONS ASSOCIATED WITH DOXORUBICIN INDUCED TOXICITY IN RAT S. 11-16.
Younus, Z. S., & Younus, G. T. (2019). Video steganography using knight tour algorithm and LSB method for encrypted data. Journal of Intelligent Systems, 29(1), 1216–1225. https://doi.org/10.1515/jisys-2018-0225