Lightweight image encryption algorithms: design and evaluation
dc.contributor.author | Alghamdi, Yousef | |
dc.date.accessioned | 2023-11-01T18:17:12Z | |
dc.date.available | 2023-11-01T18:17:12Z | |
dc.date.graduationmonth | December | |
dc.date.issued | 2023 | |
dc.description.abstract | In an era dominated by increasing use of multimedia data such as images and videos, ensuring the security and confidentiality of images with real-time encryption is of greatest importance. Traditional encryption algorithms are secure, widely used, and recommended, yet they are not suitable nor computationally efficient for encrypting multimedia data due to the large size and high redundancy inherent in multimedia data. Thus, specialized algorithms for multimedia data encryption are needed. This dissertation explores lightweight image encryption algorithms, specifically designed to address time and resource constraints of realtime image encryption while maintaining the confidentiality and integrity of the multimedia data. The dissertation classifies image encryption based on the techniques used into seven different approaches and analyzes the strengths and weaknesses of each approach. It subsequently introduces and evaluates three novel algorithms designed to encrypt images with low complexity, high efficiency, and reliable security. These algorithms rely on a combination of permutation, substitution, and pseudorandom keystreams to ensure the security of the encrypted images. The first algorithm is based on chaotic systems. The algorithm is implemented using logistic map, permutations, AES S-box, and a plaintext related SHA-2 hash. The second algorithm is based on Trivium cipher. the algorithm is implemented to work on multi-rounds of encryption using pixel-based row and column permutations, and bit-level substitution. For the third algorithm, the Ascon algorithm selected by the National Institute of Standards and Technology (NIST) to standardize lightweight cryptography applications is evaluated for image encryption. To evaluate the proposed algorithms, a comprehensive set of security, quality, and efficiency valuation metrics is utilized to assess the proposed algorithms and compare them to contemporary image encryption algorithms. | |
dc.description.advisor | Arslan Munir | |
dc.description.degree | Doctor of Philosophy | |
dc.description.department | Department of Computer Science | |
dc.description.level | Doctoral | |
dc.identifier.uri | https://hdl.handle.net/2097/43512 | |
dc.language.iso | en | |
dc.publisher | Kansas State University | |
dc.rights | © the author. This Item is protected by copyright and/or related rights. You are free to use this Item in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights-holder(s). | |
dc.rights.uri | http://rightsstatements.org/vocab/InC/1.0/ | |
dc.subject | Lightweight image encryption | |
dc.subject | Ascon | |
dc.subject | Trivium | |
dc.subject | Chaotic maps | |
dc.subject | Permutation | |
dc.subject | Substitutions | |
dc.title | Lightweight image encryption algorithms: design and evaluation | |
dc.type | Dissertation |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- YousefAlghamdi2023.pdf
- Size:
- 44.04 MB
- Format:
- Adobe Portable Document Format
- Description:
- Yousef Alghamdi Dissertation 2023
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 1.6 KB
- Format:
- Item-specific license agreed upon to submission
- Description: