CFP last date
20 May 2024
Reseach Article

An AES - based Robust Image Encryption Scheme

by Supriyo De, Jaydeb Bhaumik
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 109 - Number 12
Year of Publication: 2015
Authors: Supriyo De, Jaydeb Bhaumik
10.5120/19243-0987

Supriyo De, Jaydeb Bhaumik . An AES - based Robust Image Encryption Scheme. International Journal of Computer Applications. 109, 12 ( January 2015), 29-34. DOI=10.5120/19243-0987

@article{ 10.5120/19243-0987,
author = { Supriyo De, Jaydeb Bhaumik },
title = { An AES - based Robust Image Encryption Scheme },
journal = { International Journal of Computer Applications },
issue_date = { January 2015 },
volume = { 109 },
number = { 12 },
month = { January },
year = { 2015 },
issn = { 0975-8887 },
pages = { 29-34 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume109/number12/19243-0987/ },
doi = { 10.5120/19243-0987 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:44:38.758782+05:30
%A Supriyo De
%A Jaydeb Bhaumik
%T An AES - based Robust Image Encryption Scheme
%J International Journal of Computer Applications
%@ 0975-8887
%V 109
%N 12
%P 29-34
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The security of digital information has become a major issue during the last three decades. Encryption is one of the ways to ensure confidentiality for the digital data. Protection of multimedia data is now becoming a big challenge to create a healthy digital world. A large number of algorithms for data and image encryption are reported in the literature. Unfortunately, all traditional cryptosystems can't fulfill all the requirements of image encryption. Cryptographic weakness or high computational cost does not fulfill the real time requirement for the encryption technique. In this paper a novel approach is developed to encrypt the digital image which ensures better security with optimum cost. A linear transformation is done before encrypting an image by the Advanced Encryption Standard (AES) in ECB mode. The results show that the correlation between adjacent image elements is significantly reduced by employing the proposed scheme compared to other schemes. The histogram, correlation, entropy analysis as well as differential cryptanalysis of proposed image encryption scheme have been done to justify the strength of the proposed scheme.

References
  1. J. Daemen and V. Rijmen, "The Design of Rijndael- AES, The Advanced Encryption Standard," Springer-Verlag, 2002.
  2. J. Daemen and V. Rijmen, "AES Proposal: Rijndael," Proc. of First Advanced Encryption Standard (AES) Conference, 1998.
  3. H. Yin, H. Debiao, K. Yong, and F. Xiande, "High- speed ASIC implementation of AES supporting 128/192/256 bits," Proc. of Int. Conf. on Test and Measurement, IEEE, Vol. 1, Dec. 2009, pp. 95-98.
  4. R. Pakshwar, V. K. Trivedi, V. Richhariya, "A Survey on Different Image Encryption and Decryption Techniques," International Journal of Computer Science and Information Technologies, Vol. 4(1), 2013, pp. 113-116.
  5. X. Li, J. Knipe, H. Cheng, "Image Compression and Encryption Using Tree Structures," Elsevier Science - Patten Recognition Letters, 1997, pp 1253-1259.
  6. C. W. Huang, Y. H. Tu, H. C. Yeh , S. H. Liu, C. J. Chang, "Image observation on the modified ECB operations in Advanced Encryption Standard," Proc. of Int. Conf. on Information Society (i-Society), London, Jun. 2011, pp. 264 – 269.
  7. B. Subramanyan , V. M. Chhabria, T. G. S. Babu, "Image Encryption Based on AES Key Expansion," Emerging Applications of Information Technology (EAIT), Second International Conference, India,Feb. 2011, pp. 217 – 220.
  8. A. M. Riad, A. H. Hussein, A. A. El-Azm, "A New Selective Image Encryption Approach Using Hybrid Chaos and Block Cipher," Proc. Of Int. Conf. on Informatics and Systems (INFOS), Cario, May. 2012, pp. 36-39.
  9. A. A. Shtewi, B. E. M. Hasan, A. E. F. A. Hegazy, "An Efficient Modified Advanced Encryption Standard (MAES) Adapted for Image Cryptosystems," International Journal of Computer Science and Network Security, Vol. 10, Feb. 2010, pp. 226-232.
  10. Y. Wu, J. P. Noonan, S. Agaian, "NPCR and UACI Randomness Tests for Image Encryption," Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), Apr. 2011.
  11. M. A. El-Wahed, S. Mesbah, A. Shoukry, "Efficiency and Security of Some Image Encryption Algorithms," Proc. of the World Congress on Engineering, Vol. 1, Jul. 2008.
Index Terms

Computer Science
Information Sciences

Keywords

Block Cipher Advanced Encryption Standard Linear transformation Security analysis