Stream Cipher for Image Encryption Using Ant Colony Optimization Based Key Generation
ثبت نشده
چکیده
This chapter deals with a stream cipher method for encrypting images. As digital devices such as scanners and digital cameras become more and more available and mass storage media for digital data become more affordable, the use of digital images in practical applications are becoming more widespread. The wired and wireless IP networks are vulnerable to eavesdropping making essential the data traffic to be encrypted.
منابع مشابه
Stream cipher for binary image encryption using Ant Colony Optimization based key generation
Encryption of binary images is essential since it is vulnerable to eavesdropping in wired and wireless networks. The security of data becomes important since the communications over open network occur frequently. This paper focuses on encryption of binary image using a stream cipher method. In this paper we propose an Ant Colony Optimization (ACO) based approach of generating keys for encryptio...
متن کاملDesign of Stream Cipher for Text Encryption using Particle Swarm Optimization based Key Generation
Encryption of data traffic in a network is essential since it is vulnerable to eavesdropping. Thus the data transferred in a network is encrypted. Encryption can be done using stream cipher method such as Vernam Cipher which is considered to be the perfect cipher. However this method suffers from the drawback of storing and distributing a large number of keys. In this paper we propose a Particl...
متن کاملUsing Ants to Attack a Classical Cipher
Transposition ciphers are a class of historical encryption algorithms based on rearranging units of plaintext according to some fixed permutation which acts as the secret key. Transpositions form a building block of modern ciphers, and applications of metaheuristic optimisation techniques to classical ciphers have preceded successful results on modern-day cryptological problems. In this paper w...
متن کاملStream Cipher for Text Encryption Using Swarm Intelligence Based Key Generation
The third important aspect of security is encryption to transfer messages among the users in a secure manner. Group key management discussed in the earlier chapter is applicable for transferring messages securely to the members in a group. Apart from transferring messages to the members in a group, messages can be transferred securely to an individual user. Encryption plays a major role in such...
متن کاملAn Efficient Chaos-Based Feedback Stream Cipher (ECBFSC) for Image Encryption and Decryption
The chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques. Towards this direction, this paper presents an efficient chaosbased feedback stream cipher (ECBFSC) for image cryptosystems. The proposed stream cipher is based on the use of a chaotic logistic map and an external secret key of 256-bit. The initial conditions for th...
متن کامل