Open Access

A Comparative Analysis of Image Encryption Techniques Based on Linear Feedback Shift Registers and Chaotic Systems

4 Department of Information Systems, Tokyo Institute of Technology, Tokyo, Japan

Abstract

Purpose: This study aims to conduct a comparative analysis of image encryption techniques, focusing on the performance and security of systems based on Linear Feedback Shift Registers (LFSRs) against those based on chaotic maps. The research addresses a gap in the literature by systematically evaluating higher-order and combined LFSR designs, and demonstrating their viability as a lightweight and secure alternative for image encryption.

Methods: We implemented and tested several image encryption algorithms, including novel LFSR-based ciphers and established chaos-based systems using logistic, tent, and Henon maps. We evaluated their performance using a suite of security metrics, including statistical analysis (histograms and correlation), and differential attack analysis (NPCR and UACI). The efficiency of each cipher was also assessed through execution time measurements.

Results: The experimental results demonstrate that all tested ciphers, including the novel SCLFSR24, achieved robust security, with NPCR values exceeding 99% and UACI values greater than 40%. This is associated with high sensitivity to pixel changes and strong resistance to differential attacks. The LFSR-based ciphers generated similarly random keystreams and secure encrypted images, performing comparably to the well-known chaos-based methods.

Conclusion: The findings suggest that LFSR-based ciphers offer a compelling and practical alternative for image security. Their lightweight design and strong security performance, comparable to chaotic systems, are particularly well-suited for real-time applications in fields such as healthcare and multimedia communication.

Keywords

References

📄 Momeni A, Broumandnia A, Mirabedini SJ. Color image encryption using linear feed-back shift registers by three-dimensional permutation and substitution operations.Int J Nonlinear Anal Appl 2021;12: 903–921. Special Issue, Winter and Spring doi: 10.22075/IJMA.2021.5520
📄 Pan H, Lei Y, Jian C. Research on digital image encryption algorithm based on doublelogistic map. J Image Video Proc. 2018;142(1). doi: 10.1186/s13640-018-0386-3
📄 Allawi ST, Al-A’meri JH. Image encryption based on linear feedback shift registermethod. Al-Sadeq International Conference on Multidisciplinary in IT andCommunication Science and Applications (AIC-MITCSA) – IRAQ; 2016. p. 9–10.https://ieeexplore.ieee.org/document/7759903
📄 Feng L, Du J, Fu C. Digital image encryption algorithm based on double chaotic mapand lstm. Comput Mater Continua. 2023;77(2):1645–1662. doi: 10.32604/cmc.2023.042630
📄 Sankpal PR, Vijaya PA. Image encryption using chaotic maps: a survey. Procs of the 5thInternational Conf on Signal and Image Processing, ICSIP; 2014. p.102–107. https://ieeexplore.ieee.org/document/6754860
📄 Bhowmik A, Karforma S. Linear feedback shift registers and integer theory: a state-of-art approach in security issues over e-commerce. Electron Commer Res. 2021;22(4):1–21. doi: 10.1007/s10660-021-09477-w
📄 Hou S, Deng D, Wang Z, et al. A dynamically configurable LFSR-based PUF designagainst machine learning attacks. CCF Trans High Perform Comput. 2020;3(1):31–56.doi: 10.1007/s42514-020-00060-7
📄 Okunbor D. Software implementation of LSFR-based stream ciphers for GSMcryptosystems. IEEE Procs 7th International Conference on Reliability, InfocomTechnologies and Optimization (Trends and Future Directions) (ICRITO); 2018. p.59–65. doi: 10.1109/ICRITO.2018.8748397
📄 Sachs J. Linear feedback dhift registers for the uninitiated parts I-XVIII. 2017. https://www.embeddedrelated.com/showarticle/1193.php
📄 Sadkhan SB, Jawad NH. Simulink based implementation of developed A5/1 streamcipher cryptosystem. Procedia Computer Science. 2015;65:350–357. https://api.semanticscholar.org/CorpusID:62453886
📄 Okunbor D, Sharma RK. Object-oriented software for galois field-based encryption.Int J Bus Strategy. 2022;22(1):5–15. doi: 10.18374/IJBS-22-1.1
📄 Krishnapriya PV, Smitha S. Image security using linear feedback shift register. Int J InnovSci Res Tech. 2017;2. https://ijisrt.com/wp-content/uploads/2017/07/Image-Security-Using-Linear-Feedback-Shift-Register.pdf

Similar Articles

1-10 of 29

You may also start an advanced similarity search for this article.