A Lightweight Image Encryption Algorithm For Secure Communications in Multimedia IOT
A Lightweight Image Encryption Algorithm For Secure Communications in Multimedia IOT
net/publication/354647326
CITATIONS READS
10 549
2 authors, including:
Seyedakbar Mostafavi
Yazd University
47 PUBLICATIONS 359 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Seyedakbar Mostafavi on 17 September 2021.
Abstract - Devices in the Internet of Things (IoT) have resource constraints in terms of
energy, computing power, and memory that make them vulnerable to some security attacks. Due
to the increasing volume of multimedia content, lightweight encryption algorithms have been
developed to allow IoT nodes to communicate securely with the least computational complexity
and bandwidth usage. To adapt the low data rate of IoT devices, a lightweight data compression
algorithm for image encryption is proposed in this paper which utilizes scan-based block
compression and selective pixel encryption approach to encrypt the image data in only one round,
resulting in low computational complexity and reduced data volume. The results of the
implementing the proposed approach in IoT testbed show that, on average, the power consumption
of the devices and packet rate is decreased by 15% and 26%, respectively, compared to the existing
algorithms.
1- Introduction
With the increasing number of social media networks, the demand for multimedia data sharing
has significantly increased and has created a new field in the Internet of Things called Multimedia
Internet of Things. In order to provide security in this area, lightweight encryption methods have
been introduced with the aim of providing end-to-end secure communication with the least power
consumption in resource-limited devices[1],[2] Generally, multimedia encryption algorithms can
be accomplished in both full encryption and selective encryption. In complete encryption, all
information is encrypted. This method is more sophisticated, yet it provides a high level of
security[3] that has been demonstrated in studies [4],[5], [6], [7], [8], [9],[10]. Although some of
these algorithms use data loss and compression, the number of encryption rounds to achieve an
optimal level of security has increased the computational complexity of these algorithms. In the
selective encryption method, only the important parts of information are encrypted and the
encryption is designed with regard to the compression algorithms[11] that are accomplished in
the researches [12], [13], [14], [15], [16]. This encryption is accomplished by selecting n bits from
1
Corresponding author
each pixel according to various factors such as signal strength, error propagation rate, and the
degree of block importance based on the number of pixels forming the edge. In some of the above
mentioned methods, though the amount of encrypted data is reduced, only partially encrypted data
decreases the security.
In this paper, in order to reduce the complexity of the encryption algorithm, improve the
performance and increase the level of security, an idea based on the selective encryption and the
methods in [17], [18],[19] is presented. The less data is encrypted, the overall complexity of the
algorithm will be decreased. Thus, the critical image data is encrypted using the method in [17]
and the other data is encrypted using in[18],[19]. As regards, most of the introduced cryptography
algorithms have static substitution and permutation that require repeated rounds to ensure the
desired level of security, which unfortunately increases the cost of computational complexity,
in[17] an idea has been put forward to remedy these disadvantages and reduce the weight of the
algorithm. To keep the security level within an acceptable level, Scan-based permutation in
[18],[19] is used.
It is worth noting that as multimedia data requires high bandwidth, reducing the amount of
sent data will significantly improve the quality of service and increase the remaining energy of the
nodes. Hence, compression techniques can, along with encryption, improve the energy
consumption of the nodes significantly [20]. Regarding the resource constrains and in order to
improve the service quality, reduce the node power consumption, decrease the number of sent
packets and also the encryption execution time, the idea of blocking the image and considering the
correlation between the pixels in each block has been raised in this paper. The proposed solution
is implemented and evaluated by a network simulator in the wireless network context. By applying
the proposed algorithm, the results show that the energy consumption of the nodes in the network
is reduced by 15% on average and the number of sent packets is also decreased 26% compared to
the base algorithm. The proposed method not only improves the network status in terms of energy
consumption and service quality, but also reduces the time of the execution of encryption and
decryption on the node side.
The remaining sections of the paper are organized as follows. In section 2, a review of the
prior art on the image encryption techniques in IoT is presented. In section 3, the structure of
single-round lightweight encryption algorithm is explained and the proposed data reduction
mechanism is presented. In the section 4, the proposed method is implemented on a variety of
scenarios to analyze its performance in terms of execution time, number of packets transmission,
node residual energy, uniformity analysis and key sensitivity. Finally, the paper is concluded with
some insights for future work.
2- Related Work
Cryptographic algorithms are used to maintain the confidentiality and integrity of
information. Concerning the increasing use of IoT devices with limited resources, the issues of the
data management security, performance and cost in such devices are crucial. The traditional
symmetric encryptions such as AES[21] ,RC4[22], [23], Blowfish[24], or asymmetric encryptions
such as DSA[25], RSA[26] cannot be implemented on these devices because resource constraint
devices have limited processing power, energy supply, and memory size. Lightweight
cryptographic algorithms were developed to balance the requirements of low resources,
performance and robustness of cryptography.
2-1 Lightweight cryptographic algorithms
Lightweight encryption algorithms can be divided into two types of block and stream ciphers.
The block ciphers are DESL[27], HIGHT[28], TEA[29], TWINE[30], LEA[31] and
PRESENT[31]. The stream ciphers are Trivium[32] and Grain[33]. Hummingbird2 does have the
properties of both[32]. In these algorithms, there are various alternative rounds of substitution and
transposition satisfying Shannon’s confusion and diffusion properties which ensure that the cipher
text is changed in a pseudo random way. The required execution time of these ciphers is 𝑟 times
the round function execution time and the required resources are also multiplied by 𝑟. The authors
in [17] present a new methodology to reduce 𝑟 to 1 to form a dynamic key-dependent lightweight
round function which efficiently satisfy the security requirements.
2-2 Data rate reduction techniques in IoT
Since the bandwidth for IoT-based systems is usually low because of the small packet size, it
is impossible to use this bandwidth for multimedia data with the large increase in the generation
of digital image data. Therefore, with increasing demand for this type of data, there has been a
correspondingly large increase in research activity in the field of image compression. The purpose
of the image compression is to decrease the redundancy and irrelevance of the image data in an
effective form [36]. Compression techniques aim to reduce image file size, retain quality in
retrieval of compressed images and hence decreases the time of traffic transmission through the
network and increases the transmission rate [37].
Three types of information are carried in each image: redundant, irrelevant, and useful.
Redundant information is the deterministic part of the information which can be reproduced
without loss from other information contained in the image. Irrelevant information is the part of
information that has enormous details which are beyond the limit of perceptual significance (i.e.,
psych visual redundancy). Useful information, on the other hand, is the part of information which
is neither redundant nor irrelevant. What makes image compression different is that these
techniques exploit the unique nature of the image and the observer. Therefore, their fidelities are
subject to the capabilities and limitations of the human visual system [37]. A typical method for
the vast majority of the images is that the neighboring pixels are correspondents and thusly contain
excess data which is considered in this paper [38]. Compression techniques are categorized into
two methods: lossless and lossy. In lossy compression, some information that is not visually or
audibly important will lose, while in lossless compression all information remains the same as the
original format [20].
To improve the quality of service, reduce the power consumption of the node and the number
of sent packets, as well as reduce the time of encryption, the idea of lossless compression as
blocking the image and considering the correlation of pixels in each block and also selective
encryption is presented in this paper. The proposed solution is implemented and evaluated by a
network simulator in the wireless network context. By applying the proposed algorithm, the service
quality parameters at the network level are significantly improved.
3- The proposed lightweight encryption algorithm
The design goals of our proposed encryption algorithm are (1) to reduce the encryption
complexity by focusing on significant image pixels, and (2) to improve the performance of data
communication by reducing the data needed to be exchanged between the nodes while keeping the
media security in an acceptable level. The main contributions of this paper are as follows: (1) A
combined lightweight image encryption algorithm is proposed that encrypts the significant and
insignificant pixels of an image with different algorithms to reduce the computational complexity.
(2) A method is designed to extract the significant parts of an image and reduce the transmitted
data by the correlation of the insignificant data with the significant ones. (3) Extensive
performance evaluation is conducted by simulating several scenarios in NS2 and analyzing
performance metrics such as time complexity, consumed energy, error propagation rate, encrypted
image uniformity, and key sensitivity.
The proposed method is an extension to work [17] which is used to design the first phase of
encryption algorithm. In the following section, we will first provide a sketch of the proposed image
encryption method. Then, the details of the proposed approach are presented in the following
subsections. An overview of the image encryption process is shown in Figure 1 which is performed
in the transmitter and receiver nodes after key sharing.
The symbols and notations used throughout the paper are shown in Table 1.
Table 1- Notations
Notation Description
SK Secret key – 64 bytes
No Nonce
DK Dynamic key – 64 bytes
KS1 , KS2 Dynamic substitution sub-key used to construct random
matrix – 16 bytes
KRM Matrix dynamic sub-key used to create RM1 and RM2
KP Permutation sub-key used to create π – 16 bytes
S1,S2 Substitution table
S1-1 , S2-1 Inverse Substitution table
π Dynamic permutation table
RM , RM1 , RM2 Dynamic random matrix
c,r,p Column number, row number and plane number
Blocks Block No. in image
bsize Block size
B[i] ith block
th
P[i][j] j pixel in B[i]
C[i] Selected pixel in B[i]
α The number of sub-matrices
h×h Size of each sub-matrices
xi Original plain sub-matrix at the ith index
yi The corresponding permuted sub-matrix of xi
cxi The corresponding encrypted sub-matrix of xi
cyi The corresponding encrypted sub-matrix of yi
X[i] ith sub-matrices
BR[i] Bit range of B[i] block
D[i][j] Substraction of pixels P[i][j] and selected pixels C[i]
In the key generation step, a dynamic secret key, consisting of 4 segments, is initially provided
for different parts of the algorithm to produce two substitution tables including a permutation table
and random matrices as well as to delete specific patterns and randomize the encrypted data. The
image is then block-sorted and a minimum pixel is selected from each block and encrypted using
the proposed algorithm for significant block encryption. The other pixels in each block are then
permutated using random shapers, then compressed and merged with the random matrices created
in the key generation section. Finally, the encrypted image is ready to transmit. The decryption
process on the receiving node is the reverse of this process.
3-1 Key generation
In order to encrypt the images in the proposed method, the encryption keys are generated in a
similar way described in [17]. For this purpose, a common secret key called 𝑆𝐾 and 4 sub-keys
are generated which are used for different parts of the cryptography. The method for producing
sub-keys is shown in Figure 2. The 𝑆𝐾 is a secret key that is shared between the parties after
authentication and is changed over a period of time to increase security.
To generate the desired 4 sub-keys, the 𝑆𝐾 key is first XORed with a random value called
Nonce. The result of XOR produces a hash and dynamic DK key. In this method, the SHA-5121
1
- Secure Hash Algorithm 512
hash algorithm has been used for the sake of its collision resistance and randomness feature. The
𝐷𝐾 key length is 64 bytes, divided into four 16-byte sub-keys, each used for one part of the
encryption. The two sub-keys 𝐾𝑆1 and 𝐾𝑆2 which are used to build the substitution tables are
composed of the first and second 16 bytes of the 𝐷𝐾 key. The third 16 bytes as 𝐾𝑅𝑀 (matrix key)
and the last 16 bytes as 𝐾𝑝 sub-key are used respectively to generate the permutation table[17].
In paper [10], the permutation table π is generated using 𝐾𝑃 key to randomize the sequential
order of the encryption and the decryption of the existing sub-matrices. The method of generating
1
- Key Scheduling Algorithm
π tables is the same as the method used to generate substitution tables. However, in order to reduce
the complexity of hardware implementation, a small altering is applied, which is presented in
Algorithm 2.
Algorithm 2 construct π table
1: procedure generate_Pbox(KP)
2: for 𝑖 ← 0 to α do
3: 𝜋[𝑖] ← 𝑖
4: 𝑗←0
5: for 𝑖 ← 0 to α do
6: 𝑗 ← (𝑗 + 𝜋[𝑗] + 𝐾𝑃 [𝑗 𝑚𝑜𝑑 16]) 𝑚𝑜𝑑 256)
7: swap(𝜋[𝑖] , 𝜋[𝑗])
8: return 𝜋
9: end procedure
1
- Pseudo-Random Generation Algorithm
For the purpose of encryption, each image is subdivided into a number of blocks over which
the proposed method is applied. Each image is divided into the same-sized blocks. In the proposed
method, only a certain pixel of each block is encrypted using significant block encryption
algorithm. These selected pixels have the minimum value among the other pixels of a block. The
selected pixels can be used to produce a smaller size, lower quality image. Therefore, even without
sending other pixels, the receiver will obtain an overall schema of the image after receiving this
data. Figure 3 shows a sample image subdivided into 4 × 4 blocks and selected pixels.
Figure 3- Determining the selected pixel and differences in the sample image
The performance of the proposed method is evaluated based on two factors: the algorithm
lightness and the encryption security level. In order to investigate the first factor, three criteria
including time complexity, number of transmitted packets, and residual energy of the nodes are
considered. The second factor is analyzed based on two criteria including key sensitivity and
uniformity. In the simulation experiments for the proposed method, blocks of different sizes have
been studied which their values range from 2 to 16. Block of size 1 is used for the purpose of
comparison with the research in [17], where its size is different from other blocks and it is not
compressed.
4-1 Time complexity
The time it takes for a cryptographic algorithm to encrypt or decrypt an image is defined as
time complexity of algorithm which indicates a measure of the complexity and resource
consumption of the algorithm. As it is seen in Figure 8, the increase in the block size does not
necessarily lead to a reduction in execution time and therefore, blocks of size 4 and 8 shows better
performance than blocks of size 2 and 16.
0.25
Figure 7- Time complexity with different block size for Lena image
1000
800 Block 1
Packet No.
600 Block 2
400 Block 4
200 Block 8
Block 16
0
Drop Airplane Lena Peppers House Sailboat Baboon
Block Size
Figure 8- The number of packets needed for different images with different block sizes
Block Size
As seen in Fig. 10, the presence of an error in a limited number of data bits cannot destroy the
overall structure of the decrypted image, and therefore the error propagation will not be significant.
The error propagation percentage for different blocks is shown in Figure 11.
60
20 Block 8
10 Block 16
0
1 5 10 15 20 25 30 35 40 45 50
% of error in channel
Referring to Figure 11, the error propagation in the blocking mode is approximately the same
as in block 1. Since our proposed method and the method in [17] works in the same way, the
proposed compression method does not cause additional error propagation.
The PSNR1 parameter is often used to evaluate the effect of error propagation. The PSNR
comparison shows how different the two images are; so as the smaller the PSNR difference, the
two images are less different. The PSNR value is calculated based on the MSE2 which calculates
the difference between the original image and the noisy image as follows [39].
∑𝑚.𝑛[𝐼1 (𝑚. 𝑛) − 𝐼2 (𝑚. 𝑛)]2 (4)
𝑀𝑆𝐸 =
𝑀 ×𝑁
In this equation, 𝑀 and 𝑁 are the number of rows and columns in the image, and the 𝐼1 (𝑚. 𝑛) and
𝐼2 (𝑚. 𝑛) are the pixels in row 𝑚 and column 𝑛 of the compared images. After calculating MSE, the
value of PSNR for color images can be calculated as follows [38]:
2552 (5)
𝑃𝑆𝑁𝑅 = 10𝑙𝑜𝑔10 ( )
𝑀𝑆𝐸
The value of PSNR for the pepper image with the blocks of different sizes is shown in Fig. 12. As
seen in the figure, the value of PSNR in different block sizes is close to the one in block 1 which
can be concluded that the proposed algorithm is resistant to noisy channels.
1
- Peak Signal-to-Noise Ratio
2
- Mean Square Error
30
25
Block 1
20
Block 2
PSNR 15
Block 4
10
5 Block 8
0 Block 16
1 5 10 15 20 25 30 35 40 45 50
% of error in channel
If there is an error in the decrypted image, it can be partially resolved by applying the median
filter. This filter divides the image into zones and helps eliminating the error by averaging the
pixels in that range. In the proposed method, if this range is the size of a block, it will not have the
effect of reducing the error, because if an error occurs in one block, the other pixels in that block
are also correlated and their difference will be calculated with the same error. Therefore, the areas
larger than one block should be considered for image recovery. In Fig. 13, the median filter is
applied to the pepper image transmitted with block of size 4 in a 5% noisy channel. As can be seen
in this figure, a median filter with a 4 × 4 range has no effect on the error reduction, as it is about
the size of a block. It is observed that with the increase of the filter range, the error is partially
covered.
(a) Received image (b) Median 4 pixel (c) Median 6 pixel (d) Median 7 pixel
Figure 13- Applying the median filter on the pepper image with block size 4 in a channel with 5% noise
Probability of emergence
Pixel Value Pixel Value
Probability of emergence
Probability of emergence
Probability of emergence
(a) real key (b) 50.21% (c) 50.22% (d) 49.97% (e) 50.32% (f) 50.20
Figure 15- Hamming distance and key sensitivity analysis for blocks 2 to 16 in Baboon image
(a) Real key (b) 56.97% (c) 57.11% (d) 57.03% (e) 56.85% (f) 57.04%
Fig. 16 - Hamming distance and key sensitivity analysis for blocks 2 to 16 in the drop image
As can be seen in Figures 15 and 16, the Hamming distance between the images is close to
50% and there is a large difference between the images. In other words, the small changes in the
key led to the large changes in the decrypted images. This illustrates the resistance of the proposed
algorithm to the key changes and secret key-related attacks.
5- Conclusion
Due to the limited resources of IoT nodes, the secure transmission of high-volume multimedia
content requires both efficient compression and effective encryption. In this paper, a lightweight
encryption algorithm for multimedia IoT was proposed which utilized a scan-based block
compression and selective pixel encryption approach. Since the proposed method uses constant
blocking, it was observed in the experiments that the blocks of size 4 and 8 show better
performance in terms of number of packet transmission and algorithm execution time. The
experiments also showed that applying the proposed method resulted in 15% decrease in energy
consumption of IoT nodes and 26% decrease in the number of packet transmission compared to
the competitive algorithms. By examining the error propagation on the image, it was found that
the result of the proposed approach is the same as the compared algorithms. By implementing the
key sensitivity analysis on the proposed method, it was shown that the Hamming distance was
approximately 50% indicating that the proposed method provides a desirable level of security.
Declaration
Conflict of Interest
The authors declare that they have no conflict of interest.
Funding
There is no funding for this publication.
Ethical Approval
This article does not contain any studies with human participants or animals performed by any of
the authors.
References
[1] A. Aslam and E. Curry, “Towards a Generalized Approach for Deep Neural Network
Based Event Processing for the Internet of Multimedia Things,” IEEE Access, vol. 6, no. c, pp.
25573–25587, 2018.
[2] Javadpour, Amir, and Alireza Mohammadi. "Improving brain magnetic resonance image
(MRI) segmentation via a novel algorithm based on genetic and regional growth." Journal of
biomedical physics & engineering 6, no. 2 (2016): 95.
[3] O. A. Khashan, A. M. Zin, and E. A. Sundararajan, “Performance study of selective
encryption in comparison to full encryption for still visual images,” J. Zhejiang Univ. Sci. C, vol.
15, no. 6, pp. 435–444, 2014.
[4] B. Mondal, P. Kumar, and S. Singh, “A chaotic permutation and diffusion based image
encryption algorithm for secure communications,” Multimedia Tools and Applications, vol. 77,
no. 23. pp. 31177–31198, 2018.
[5] Y. Luo, R. Zhou, J. Liu, S. Qiu, and Y. Cao, “An efficient and self-adapting colour-image
encryption algorithm based on chaos and interactions among multiple layers,” Multimed. Tools
Appl., vol. 77, no. 20, pp. 26191–26217, 2018.
[6] C. L. Li, H. M. Li, F. D. Li, D. Q. Wei, X. B. Yang, and J. Zhang, “Multiple-image
encryption by using robust chaotic map in wavelet transform domain,” Optik, vol. 171. pp. 277–
286, 2018.
[7] X. Chai, “An image encryption algorithm based on bit level Brownian motion and new
chaotic systems,” Multimedia Tools and Applications, vol. 76, no. 1. pp. 1159–1175, 2017.
[8] G. Ye, K. Jiao, C. Pan, and X. Huang, “An effective framework for chaotic image
encryption based on 3D logistic map,” Secur. Commun. Networks, vol. 2018, 2018.
[9] W. Xingyuan, Z. Junjian, and C. Guanghui, “An image encryption algorithm based on
ZigZag transform and LL compound chaotic system,” Optics and Laser Technology, vol. 119.
2019.
[10] X. Wang and H. Sun, “A chaotic image encryption algorithm based on zigzag-like
transform and DNA-like coding,” Multimedia Tools and Applications. 2019.
[11] G. A. Spanos and T. B. Maples, “Performance study of a selective encryption scheme for
the security of networked, real-time video,” Proc. Int. Conf. Comput. Commun. Networks, ICCCN,
pp. 2–10, 1995.
[12] O. Benrhouma, H. Hermassi, and S. Belghith, “Security analysis and improvement of a
partial encryption scheme,” Multimedia Tools and Applications, vol. 74, no. 11. pp. 3617–3634,
2015.
[13] Z. Fawaz, H. Noura, and A. Mostefaoui, “Securing JPEG-2000 images in constrained
environments: a dynamic approach,” Multimedia Systems, vol. 24, no. 6. pp. 669–694, 2018.
[14] Y. Zhang, D. Xiao, W. Wen, and Y. Tian, “Edge-based lightweight image encryption using
chaos-based reversible hidden transform and multiple-order discrete fractional cosine transform,”
Optics and Laser Technology, vol. 54. pp. 1–6, 2013.
[15] W. Zhang, H. Yu, and Z. L. Zhu, “Color image encryption based on paired interpermuting
planes,” Optics Communications, vol. 338. pp. 199–208, 2015.
[16] A. Kaur and G. Singh, “A Random Selective Block Encryption Technique for Secure
Image Cryptography Using Blowfish Algorithm,” Proceedings of the International Conference on
Inventive Communication and Computational Technologies, ICICCT 2018. pp. 1290–1293, 2018.
[17] H. Noura, A. Chehab, L. Sleem, M. Noura, R. Couturier, and M. M. Mansour, “One round
cipher algorithm for multimedia IoT devices,” Multimed. Tools Appl., vol. 77, no. 14, pp. 18383–
18413, 2018.
[18] S. S. Maniccam and N. G. Bourbakis, “Image and video encryption using SCAN patterns,”
Pattern Recognition, vol. 37, no. 4. pp. 725–737, 2004.
[19] K. Arava and L. Sumalatha, “An enhanced RGB scan image encryption using key-based
partitioning technique in cloud,” Smart Innovation, Systems and Technologies, vol. 105. pp. 155–
163, 2019.
[20] S. M. S. Hilles and M. S. Shafii, “Image Compression and Encryption Technique : Review
Paper,” Int. J. Data Sci. Res., vol. 1, no. 2, pp. 0–6, 2019.
[21] P. N. Penchalaiah, “Effective Comparison and Evaluation of DES and Rijndael Algorithm
( AES ),” International journal of computer science and engineering, vol. 02, no. 05, pp. 1641–
1645, 2010.
[22] A. Mousa and A. Hamad, “Evaluation of the RC4 Algorithm for Data Encryption,” Int. J.
Comput. Sci. Appl., vol. 3, no. 1, pp. 44–56, 2006.
[23] P. Jindal and B. Singh, “RC4 encryption - A literature survey,” Procedia Comput. Sci., vol.
46, no. Icict 2014, pp. 697–705, 2015.
[24] T. Nie and T. Zhang, “A study of DES and blowfish encryption algorithm,” IEEE Reg. 10
Annu. Int. Conf. Proceedings/TENCON, pp. 1–4, 2009.
[25] D. Coppersmith, “Data Encryption Standard (DES) and its strength against attacks,” IBM
J. Res. Dev., vol. 38, no. 3, pp. 243–250, 1994.
[26] H. C. Williams, “A Modification of the RSA Public-Key Encryption Procedure,” IEEE
Trans. Inf. Theory, vol. 26, no. 6, pp. 726–729, 1980.
[27] G. Leander, C. Paar, A. Poschmann, and K. Schramm, “New lightweight des variants,”
Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics),
vol. 4593 LNCS, pp. 196–210, 2007.
[28] D. Hong et al., “HIGHT: A new block cipher suitable for low-resource device,” Lecture
Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and
Lecture Notes in Bioinformatics), vol. 4249 LNCS. pp. 46–59, 2006.
[29] D. J. Wheeler and R. M. Needham, “TEA, a tiny encryption algorithm BT - Fast Software
Encryption,” Lect. Notes Comput. Sci., pp. 363–366, 1995.
[30] T. Suzaki, K. Minematsu, S. Morioka, and E. Kobayashi, “A lightweight block cipher for
multiple platforms,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect.
Notes Bioinformatics), vol. 7707 LNCS, pp. 339–354, 2013.
[31] D. Hong, J. K. Lee, D. C. Kim, D. Kwon, K. H. Ryu, and D. G. Lee, “LEA: A 128-bit
block cipher for fast encryption on common processors,” Lecture Notes in Computer Science
(including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),
vol. 8267 LNCS. pp. 3–27, 2014.
[32] A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, and A. Poschmann, “PRESENT : An
Ultra-Lightweight Block Cipher,” International Workshop on Cryptographic Hardware and
Embedded Systems, pp. 450–466, 2007.
[33] C. De Canni, B.Preneel, “Trivium,” New Stream Cipher Designs, pp. 244–245, 2008.
[34] M. Hell, T. Johansson, A. Maximov, and W. Meier, “A stream cipher proposal: Grain-
128,” IEEE Int. Symp. Inf. Theory - Proc., pp. 1614–1618, 2006.
[35] Daniel Engels, Markku-Juhani O. Saarinen, E. Smith, “The Hummingbird-2 lightweight
authenticated encryption algori,” International Workshop on Radio Frequency Identification:
Security and Privacy Issues, pp. 19-31, 2011.
[36] M. Singh, S. Kumar, S. Singh, and M. Shrivastava, “Various Image Compression
Techniques: Lossy and Lossless,” Int. J. Comput. Appl., vol. 142, no. 6, pp. 23–26, 2016.
[37] A. J. Hussain, A. Al-Fayadh, and N. Radi, “Image compression techniques: A survey in
lossless and lossy algorithms, ” Neurocomputing vol. 300. Elsevier B.V., 2018.
[38] C. Raghavendra, S. Sivasubramanian, and A. Kumaravel, “Improved image compression
using effective lossless compression technique,” Cluster Comput., vol. 22, pp. 3911–3916, 2019.
[39] A. Horé and D. Ziou, “Image quality metrics: PSNR vs. SSIM,” Proc. - Int. Conf. Pattern
Recognit., pp. 2366–2369, 2010.