Partial Image Encryption using RC4 Stream Cipher Approach and Embedded in an Image
Cryptography is a science concerned with securing data transmission. By applying cryptographic operations to data, readable information is converted into unreadable data. Currently, security is of great importance. Data transferred over the internet must have some form of encryption. Different forms of multimedia contents are moved over the internet. This paper focuses on image encryption. It tries to amend the multiple selective region image cryptography techniques using a RC4 stream cipher. This approach is derived from the standard RC4 algorithm. The proposed method can highly improve security for images transferred over the internet.
Dawson, E & Nielsen, L. (1996). Automated cryptanalysis of XOR plaintext strings. Cryptologia, 20, 4.
Fluhrer, S., Mantin, I & Shamir, A. (2001). Weakness in the key scheduling algorithm of RC4. In: Proceedings, Workshop in Selected Areas of Cryptography.
Glover, P & Grant, M. (2004). Digital Communications. 2nd ed. Harlow: Person Education.
Knudsen, L & Eschen, D.J. (1998). Analysis method for alleged RC4. In: Proceedings, ASIACRYPT’ 98.
Kumar, I. (1997). Cryptology. Laguna Hills, CA: Aegean Park Press.
Mantin, I & Shamir, A. (2001). A practical attack on broadcast RC4. In: Proceedings, Fast Software Encryption.
Mister, S & Tavares, S. (1998). Cryptanalysis of RC4-like ciphers. In: Proceedings, Workshop in Selected Areas of Cryptography, SAC’ 98.
Pieprzyk, J & Pieprzyk, J. (2003). Fundamentals of Computer Security. Cambridge, UK: Springer.
Rescorla, E. (2001). SSL and TLS: Designing and Building Secure Systems. Reading, MA: Addison-Wesley.
Robshaw, M. (1995). Stream Ciphers. RSA Laboratories Technical Report TR-701, July 1995.
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License [CC BY-NC-ND 4.0] that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
AJNU is committed to protecting the privacy of the users of this journal website. The names, personal particulars and e-mail addresses entered in this website will be used only for the stated purposes of this journal and will not be made available to third parties without the user's permission or due process. Users consent to receive communication from the AJNU for the stated purposes of the journal. Queries with regard to privacy may be directed to firstname.lastname@example.org.