Imperceptible and Robust Encryption: Salsa20 Stream Cipher for Colour Image Data

Authors

  • Aldi Azmi Arfian University of Dian Nuswantoro
  • Christy Atika Sari University of Dian Nuswantoro
  • Eko Hari Rachmawanto University of Dian Nuswantoro
  • Folasade Olubusola Isinkaye Ekiti State University, Ado Ekiti, Nigeria

DOI:

10.33395/sinkron.v9i1.13049

Keywords:

Data security, Stream cipher, Salsa20, Encryption, Hash function

Abstract

Data security has become crucial, especially in today's era, therefore we need to protect our personal data to avoid unwanted incidents. The primary objective of this research is to empirically demonstrate the viability of our proposed methodology for encrypting color images using the Salsa20 algorithm, renowned for its stream cipher characteristics, which inherently afford it a swift processing speed. The encryption method we use is to take each pixel from the original image and convert it into bytes based on the RGB value in it, then encrypt it using a keyword that has been converted using a hash function. In this study, we carried out several evaluations to evaluate the performance of the encrypted and decrypted images to test the method we propose, including histogram analysis and compare patterns, visual image testing, and key space analysis. Through this experiment, it has been proven that Salsa20 is effective in maintaining confidentiality and image integrity. Histogram analysis reveals differences in pixel distribution patterns between the original and encrypted images. Visual testing shows that the encrypted image maintains good optical quality. Keyspace analysis ensures the security of encryption keys. The performance evaluation resulted in an NPCR above 99%, UACI had been reached 69.28%, MSE was closes to 0, and the highest PSNR was around 61.89dB, this shows that encrypted images recovered with high accuracy.

GS Cited Analysis

Downloads

Download data is not yet available.

Author Biographies

Christy Atika Sari, University of Dian Nuswantoro

She received the master in Informatic Engineering from Dian Nuswantoro University and University Teknikal Malaysia Melaka (UTeM) in 2012. She is currently active as author in international journal and confrence scopus indexed. She also awarded as best author and best paper in national and intenational confrence in 2019 and 2020 respectively and awarded from Ristekbrin DIKTI as the indonesian top 50 best researchers in 2020. She currently as lecturer in intelligent systems and and continue to develop the research field image processing and data hiding. She can be contacted at email: christy.atika.sari@dsn.dinus.ac.id.

Scopus Author ID: 57193848115 SciProfiles: 3076319

Eko Hari Rachmawanto, University of Dian Nuswantoro

Folasade Olubusola Isinkaye, Ekiti State University, Ado Ekiti, Nigeria

Lecturer/Dr. (Computer Science) in Ekiti State University.
Scopus Author ID: 55135963100

References

Anwar, M. R., Apriani, D., & Adianita, I. R. (2021). Hash Algorithm in Verification of Certificate Data Integrity And Security. Aptisi Transactions on Technopreneurship (ATT), 3(2), 65–72. https://doi.org/10.34306/att.v3i2.212

Anwar, S., & Meghana, S. (2019). A pixel permutation based image encryption technique using chaotic map. Multimedia Tools and Applications, 78(19), 27569–27590. https://doi.org/10.1007/s11042-019-07852-2

Arab, A., Rostami, M. J., & Ghavami, B. (2019). An image encryption method based on chaos system and AES algorithm. Journal of Supercomputing, 75(10), 6663–6682. https://doi.org/10.1007/s11227-019-02878-7

Cincotta, P. M., Giordano, C. M., Alves Silva, R., & Beaugé, C. (2021). The Shannon entropy: An efficient indicator of dynamical stability. Physica D: Nonlinear Phenomena, 417. https://doi.org/10.1016/j.physd.2020.132816

Fernandez de Loaysa Babiano, L., Macfarlane, R., & Davies, S. R. (2023). Evaluation of live forensic techniques, towards Salsa20-Based cryptographic ransomware mitigation. Forensic Science International: Digital Investigation, 46. https://doi.org/10.1016/j.fsidi.2023.301572

Gupta, A., Singh, D., & Kaur, M. (2020). An efficient image encryption using non-dominated sorting genetic algorithm-III based 4-D chaotic maps: Image encryption. Journal of Ambient Intelligence and Humanized Computing, 11(3), 1309–1324. https://doi.org/10.1007/s12652-019-01493-x

Hameed, R. S., Hussein, A., Khalaf, B. A., Fadel, A. H., Hasoon, J. N., Mostafa, S. A., & Khalaf, A. (2020). A Light-weight ESalsa20 Ciphering based on 1D Logistic and Chebyshev Chaotic Maps. Solid State Technology. https://www.researchgate.net/publication/344492787

Jangir, A., & Pandey, J. G. (2021). GIFT cipher usage in image data security: hardware implementations, performance and statistical analyses. Journal of Real-Time Image Processing, 18(6), 2551–2567. https://doi.org/10.1007/s11554-021-01146-3

Jawad Kubba, Z. M., & Hoomod, H. K. (2019). A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System. International Conference of Computer and Applied Sciences, 199–203.

Mansouri, A., & Wang, X. (2021). Image encryption using shuffled Arnold map and multiple values manipulations. Visual Computer, 37(1), 189–200. https://doi.org/10.1007/s00371-020-01791-y

Martino, R., & Cilardo, A. (2020). Designing a SHA-256 processor for blockchain-based IoT applications. Internet of Things, 11. https://doi.org/10.1016/j.iot.2020.100254

Mohaisen, E. L., & Mohammed, R. S. (2020). Improving Salsa20 stream cipher using random chaotic maps. 2020 3rd International Conference on Engineering Technology and Its Applications, IICETA 2020, 1–6. https://doi.org/10.1109/IICETA50496.2020.9318902

Muhalhal, L. A., & Alshawi, I. S. (2022). Improved Salsa20 Stream Cipher Diffusion Based on Random Chaotic Maps. Informatica (Slovenia), 46(7), 95–102. https://doi.org/10.31449/inf.v46i7.4279

Naif, J. R., Ahmed, I. S., Alani, N., & Hoomod, H. K. (2023). EAMSA 512: New 512 Bits Encryption Al-gorithm Based on Modified SALSA20. Iraqi Journal for Computer Science and Mathematics, 131–142. https://doi.org/10.52866/ijcsm.2023.02.02.011

Pabbi, A., Malhotra, R., & Manikandan, K. (2021). Implementation of least significant bit image steganography with advanced encryption standard. 2021 International Conference on Emerging Smart Computing and Informatics, ESCI 2021, 363–366. https://doi.org/10.1109/ESCI50559.2021.9396884

Reza, S. M. S., Arifeen, M. M., Tiong, S. K., Akhteruzzaman, M., Amin, N., Shakeri, M., Ayob, A., & Hussain, A. (2020). Salsa20 based lightweight security scheme for smart meter communication in smart grid. Telkomnika (Telecommunication Computing Electronics and Control), 18(1), 228–233. https://doi.org/10.12928/TELKOMNIKA.V18I1.14798

Setiadi, D. R. I. M. (2021). PSNR vs SSIM: imperceptibility quality assessment for image steganography. Multimedia Tools and Applications, 80(6), 8423–8444. https://doi.org/10.1007/s11042-020-10035-z

Singhal*, Mr. V., Shukla, Mr. Y. K., & Prakash, Dr. N. (2020). Image Steganography embedded with Advance Encryption Standard (AES) securing with SHA-256. International Journal of Innovative Technology and Exploring Engineering, 9(8), 641–648. https://doi.org/10.35940/ijitee.H6442.069820

Tran, T. H., Pham, H. L., & Nakashima, Y. (2021). A High-Performance Multimem SHA-256 Accelerator for Society 5.0. IEEE Access, 9, 39182–39192. https://doi.org/10.1109/ACCESS.2021.3063485

Waleed, J., Noori Mazher, A., & Tariq MaoLood, A. (2021). Developed Lightweight Cryptographic Algorithms for The Application of Image Encryption: A Review. Journal of Al-Qadisiyah for Computer Science and Mathematics, 13(2), 11–22. https://doi.org/10.29304/jqcm.2021.13.2.788

Zou, Y., Zhang, J., Upadhyay, M., Sun, S., & Jiang, T. (2020). Automatic image thresholding based on Shannon entropy difference and dynamic synergic entropy. IEEE Access, 8, 171218–171239. https://doi.org/10.1109/ACCESS.2020.3024718

Downloads


Crossmark Updates

How to Cite

Arfian, A. A., Sari, C. A., Rachmawanto, E. H., & Isinkaye, F. O. (2024). Imperceptible and Robust Encryption: Salsa20 Stream Cipher for Colour Image Data. Sinkron : Jurnal Dan Penelitian Teknik Informatika, 8(1), 221-229. https://doi.org/10.33395/sinkron.v9i1.13049