Imperceptible and Robust Encryption: Salsa20 Stream Cipher for Colour Image Data
DOI:
10.33395/sinkron.v9i1.13049Keywords:
Data security, Stream cipher, Salsa20, Encryption, Hash functionAbstract
Data security has become crucial, especially in today's era, therefore we need to protect our personal data to avoid unwanted incidents. The primary objective of this research is to empirically demonstrate the viability of our proposed methodology for encrypting color images using the Salsa20 algorithm, renowned for its stream cipher characteristics, which inherently afford it a swift processing speed. The encryption method we use is to take each pixel from the original image and convert it into bytes based on the RGB value in it, then encrypt it using a keyword that has been converted using a hash function. In this study, we carried out several evaluations to evaluate the performance of the encrypted and decrypted images to test the method we propose, including histogram analysis and compare patterns, visual image testing, and key space analysis. Through this experiment, it has been proven that Salsa20 is effective in maintaining confidentiality and image integrity. Histogram analysis reveals differences in pixel distribution patterns between the original and encrypted images. Visual testing shows that the encrypted image maintains good optical quality. Keyspace analysis ensures the security of encryption keys. The performance evaluation resulted in an NPCR above 99%, UACI had been reached 69.28%, MSE was closes to 0, and the highest PSNR was around 61.89dB, this shows that encrypted images recovered with high accuracy.
Downloads
References
Anwar, M. R., Apriani, D., & Adianita, I. R. (2021). Hash Algorithm in Verification of Certificate Data Integrity And Security. Aptisi Transactions on Technopreneurship (ATT), 3(2), 65–72. https://doi.org/10.34306/att.v3i2.212
Anwar, S., & Meghana, S. (2019). A pixel permutation based image encryption technique using chaotic map. Multimedia Tools and Applications, 78(19), 27569–27590. https://doi.org/10.1007/s11042-019-07852-2
Arab, A., Rostami, M. J., & Ghavami, B. (2019). An image encryption method based on chaos system and AES algorithm. Journal of Supercomputing, 75(10), 6663–6682. https://doi.org/10.1007/s11227-019-02878-7
Cincotta, P. M., Giordano, C. M., Alves Silva, R., & Beaugé, C. (2021). The Shannon entropy: An efficient indicator of dynamical stability. Physica D: Nonlinear Phenomena, 417. https://doi.org/10.1016/j.physd.2020.132816
Fernandez de Loaysa Babiano, L., Macfarlane, R., & Davies, S. R. (2023). Evaluation of live forensic techniques, towards Salsa20-Based cryptographic ransomware mitigation. Forensic Science International: Digital Investigation, 46. https://doi.org/10.1016/j.fsidi.2023.301572
Gupta, A., Singh, D., & Kaur, M. (2020). An efficient image encryption using non-dominated sorting genetic algorithm-III based 4-D chaotic maps: Image encryption. Journal of Ambient Intelligence and Humanized Computing, 11(3), 1309–1324. https://doi.org/10.1007/s12652-019-01493-x
Hameed, R. S., Hussein, A., Khalaf, B. A., Fadel, A. H., Hasoon, J. N., Mostafa, S. A., & Khalaf, A. (2020). A Light-weight ESalsa20 Ciphering based on 1D Logistic and Chebyshev Chaotic Maps. Solid State Technology. https://www.researchgate.net/publication/344492787
Jangir, A., & Pandey, J. G. (2021). GIFT cipher usage in image data security: hardware implementations, performance and statistical analyses. Journal of Real-Time Image Processing, 18(6), 2551–2567. https://doi.org/10.1007/s11554-021-01146-3
Jawad Kubba, Z. M., & Hoomod, H. K. (2019). A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System. International Conference of Computer and Applied Sciences, 199–203.
Mansouri, A., & Wang, X. (2021). Image encryption using shuffled Arnold map and multiple values manipulations. Visual Computer, 37(1), 189–200. https://doi.org/10.1007/s00371-020-01791-y
Martino, R., & Cilardo, A. (2020). Designing a SHA-256 processor for blockchain-based IoT applications. Internet of Things, 11. https://doi.org/10.1016/j.iot.2020.100254
Mohaisen, E. L., & Mohammed, R. S. (2020). Improving Salsa20 stream cipher using random chaotic maps. 2020 3rd International Conference on Engineering Technology and Its Applications, IICETA 2020, 1–6. https://doi.org/10.1109/IICETA50496.2020.9318902
Muhalhal, L. A., & Alshawi, I. S. (2022). Improved Salsa20 Stream Cipher Diffusion Based on Random Chaotic Maps. Informatica (Slovenia), 46(7), 95–102. https://doi.org/10.31449/inf.v46i7.4279
Naif, J. R., Ahmed, I. S., Alani, N., & Hoomod, H. K. (2023). EAMSA 512: New 512 Bits Encryption Al-gorithm Based on Modified SALSA20. Iraqi Journal for Computer Science and Mathematics, 131–142. https://doi.org/10.52866/ijcsm.2023.02.02.011
Pabbi, A., Malhotra, R., & Manikandan, K. (2021). Implementation of least significant bit image steganography with advanced encryption standard. 2021 International Conference on Emerging Smart Computing and Informatics, ESCI 2021, 363–366. https://doi.org/10.1109/ESCI50559.2021.9396884
Reza, S. M. S., Arifeen, M. M., Tiong, S. K., Akhteruzzaman, M., Amin, N., Shakeri, M., Ayob, A., & Hussain, A. (2020). Salsa20 based lightweight security scheme for smart meter communication in smart grid. Telkomnika (Telecommunication Computing Electronics and Control), 18(1), 228–233. https://doi.org/10.12928/TELKOMNIKA.V18I1.14798
Setiadi, D. R. I. M. (2021). PSNR vs SSIM: imperceptibility quality assessment for image steganography. Multimedia Tools and Applications, 80(6), 8423–8444. https://doi.org/10.1007/s11042-020-10035-z
Singhal*, Mr. V., Shukla, Mr. Y. K., & Prakash, Dr. N. (2020). Image Steganography embedded with Advance Encryption Standard (AES) securing with SHA-256. International Journal of Innovative Technology and Exploring Engineering, 9(8), 641–648. https://doi.org/10.35940/ijitee.H6442.069820
Tran, T. H., Pham, H. L., & Nakashima, Y. (2021). A High-Performance Multimem SHA-256 Accelerator for Society 5.0. IEEE Access, 9, 39182–39192. https://doi.org/10.1109/ACCESS.2021.3063485
Waleed, J., Noori Mazher, A., & Tariq MaoLood, A. (2021). Developed Lightweight Cryptographic Algorithms for The Application of Image Encryption: A Review. Journal of Al-Qadisiyah for Computer Science and Mathematics, 13(2), 11–22. https://doi.org/10.29304/jqcm.2021.13.2.788
Zou, Y., Zhang, J., Upadhyay, M., Sun, S., & Jiang, T. (2020). Automatic image thresholding based on Shannon entropy difference and dynamic synergic entropy. IEEE Access, 8, 171218–171239. https://doi.org/10.1109/ACCESS.2020.3024718
Downloads
How to Cite
Issue
Section
License
Copyright (c) 2023 Aldi Azmi Arfian, Christy Atika Sari, Eko Hari Rachmawanto, Folasade Olubusola Isinkaye
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.