Skip to main content

Generation of Random Binary Sequence Using Adaptive Row–Column Approach and Synthetic Color Image

  • Conference paper
  • First Online:
Computer Networks, Big Data and IoT

Abstract

The security of a communication model is defined by the strength of the encryption and key generation algorithm. To ensure security, in block cipher techniques, a complex computation process is used for encryption. But, in stream cipher techniques, complex key generation techniques are used. This paper proposes a novel and complex key generation algorithm for stream cipher techniques that generate 15,72,864-bit key from a synthetic color image using a pattern-based bit extraction technique. A segmented form of a generated key can be used as a dynamic key in block cipher techniques. The proposed algorithm randomly uses eight patterns to extract bits from a synthetic color image to generate the key. The generated key’s randomness is tested using the NIST statistical analysis tool and compared with the keys generated from existing techniques. The key length and keyspace are compared with existing methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Shiu YS, Chang SY, Wu HC, Huang SCH, Chen HH (2011) Physical layer security in wireless networks: a tutorial. IEEE Wirel Commun 18(2):66–74

    Article  Google Scholar 

  2. Liu Y, Chen HH, Wang L (2016) Physical layer security for next-generation wireless networks: theories, technologies, and challenges. IEEE Commun Surv Tutor 19(1):347–376

    Article  Google Scholar 

  3. Singh G (2013) A study of encryption algorithms (RSA, DES, 3DES, and AES) for information security. Int J Comput Appl 67(19)

    Google Scholar 

  4. Erickson J (2008) Hacking: the art of exploitation. No starch press

    Google Scholar 

  5. Santhi B, Ravichandran KS, Arun AP, Chakkarapani L (2012) A novel cryptographic key generation method using image features. Res J Inf Technol 4(2):88–92

    Google Scholar 

  6. Manikandan C, Neelamegam P, Kumar R, Babu V, Satwikkommi S (2019) Design of Secure and Reliable MU-MIMO Transceiver System for Vehicular Networks. Int J Comput Netw Commun 11:15–32

    Google Scholar 

  7. Barhoom TS, Abusilmiyeh ZM (2013) A novel cryptography method based on image for key generation. In: Palestinian international conference on information and communication technology. IEEE, Gaza, Palestinian, pp 71–76

    Google Scholar 

  8. Riddhi N, Gamit N (2015) An efficient algorithm for dynamic key generation for image encryption. In: International conference on computer, communication, and control. IEEE, Indore, India, pp 1–5

    Google Scholar 

  9. Manikandan C, Kumar SR, Nikhith K, Gayathri MS, Neelamegam P (2019) Chaotic map based key generation and realistic power allocation technique for secure MU-MIMO wireless system. In: International conference on applications and techniques in information security, Springer, Singapore, pp 142–155

    Google Scholar 

  10. Manikandan G, Ramakrishnan S, Rajaram R, Venkatesh V (2013) An image-based key generation for symmetric key cryptography. Int J Eng Technol 5(3):2807–2810

    Google Scholar 

  11. Chinnusamy M, Sidharthan RK, Sivanandam V, Kommi SSS, Mallari Rao C, Periasamy N (2019) Optimal tracking of QR inspired LEA using particle filter for secured visual MIMO communication based vehicular network. Photonics 6(93):1–24

    Google Scholar 

  12. Jawad LM, Sulong G (2015) A novel dynamic secret key generation for an efficient image encryption algorithm. Mod Appl Sci 9(13):85–97

    Article  Google Scholar 

  13. Yao J, Kang H (2011) FPGA implementation of dynamic key management for des encryption algorithm. In: International conference on electronic & mechanical engineering and information technology. IEEE, Harbin, China, pp 4795–4798

    Google Scholar 

  14. Singh AK, Varshney S (2014) Enhanced data encryption standard using variable size key (128 N Bits) and 96 bit subkey. Int J Comput Appl 98(8):11–14

    Google Scholar 

  15. Chen L, Jordan S, Liu YK, Moody D, Peralta R, Perlner R, Smith-Tone D (2016) NIST: report on post-quantum cryptography. NIST, Tech. Rep.

    Google Scholar 

  16. Satwik KSS, Manikandan C, Elamaran V, Narasimhan K, Raju N (2017) An adaptive row-column least significant bit inlay approach for image steganography. Biomed Res 28(22):10216–10222

    Google Scholar 

  17. Manikandan C, Rakesh Kumar S, Sai Siva Satwik K, Neelamegam P, Narasimhan K, Raju N (2018) An integrated object tracking and covert visual MIMO communication service for museum security system using single vision sensor. Appl Sci 8(10):1–25

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to N. Raju .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Manikandan, C., Raju, N., Sai Siva Satwik, K., Chandrasekar, M., Elamaran, V. (2021). Generation of Random Binary Sequence Using Adaptive Row–Column Approach and Synthetic Color Image. In: Pandian, A., Fernando, X., Islam, S.M.S. (eds) Computer Networks, Big Data and IoT. Lecture Notes on Data Engineering and Communications Technologies, vol 66. Springer, Singapore. https://doi.org/10.1007/978-981-16-0965-7_10

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-0965-7_10

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-0964-0

  • Online ISBN: 978-981-16-0965-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics