CFP last date
20 May 2024
Reseach Article

Modified AES Algorithm Integrating IBDP (Image Block Displacement Procedure) for Data Encryption

by Anukirti, Vishal Jayaswal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 179 - Number 44
Year of Publication: 2018
Authors: Anukirti, Vishal Jayaswal
10.5120/ijca2018917065

Anukirti, Vishal Jayaswal . Modified AES Algorithm Integrating IBDP (Image Block Displacement Procedure) for Data Encryption. International Journal of Computer Applications. 179, 44 ( May 2018), 5-9. DOI=10.5120/ijca2018917065

@article{ 10.5120/ijca2018917065,
author = { Anukirti, Vishal Jayaswal },
title = { Modified AES Algorithm Integrating IBDP (Image Block Displacement Procedure) for Data Encryption },
journal = { International Journal of Computer Applications },
issue_date = { May 2018 },
volume = { 179 },
number = { 44 },
month = { May },
year = { 2018 },
issn = { 0975-8887 },
pages = { 5-9 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume179/number44/29425-2018917065/ },
doi = { 10.5120/ijca2018917065 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:58:19.180547+05:30
%A Anukirti
%A Vishal Jayaswal
%T Modified AES Algorithm Integrating IBDP (Image Block Displacement Procedure) for Data Encryption
%J International Journal of Computer Applications
%@ 0975-8887
%V 179
%N 44
%P 5-9
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Today sharing of a digital images over network is growing in huge numbers. The security of network is becoming more significant as the quantity of data being exchanged on the internet rises. Apart from this, the data that is relevant for the image is also transmitted with it. Therefore, the privacy and data integrity entails protecting against illegal access and utilization. Thus these actions have resulted in enormous growth of the field of securing the data. Information ciphering is a method which is utilized for hiding data in the digital files likes- audio, images and video etc. This method is also referred to as steganography. Here the data is hidden in the image. The data may be the information about the image. To calculate and estimate the performance of the proposed algorithm, a set of test were done which were quite successful and promising. These assessments were comprised of histogram analysis, correlation analysis, differential analysis, information entropy. Results of assessments displayed that the new integration method has a promising security features and it is more efficient than AES algorithm alone, without the shifting technique which enables it becoming a decent method for ciphering the digital data. The results exhibited that histogram of a ciphered image made a uniform distribution which is quite unique different from the histogram of the plain image and the correlation of pixels of the image was dramatically decreased by utilizing the integration method, thus higher entropy results were achieved.

References
  1. Ashwini R. Tonde Ȧ, Akshay P. DhandeȦ “Implementation of Advanced Encryption Standard (AES) Algorithm Based on FPGA” IJCET , Vol 4 , No. 2 , April -2014
  2. E.Kavitha, “FPGA implementation of area optimized AES Algorithm for secure communication applications” (IJARCET), Volume 5, Issue 4, April 2016
  3. Nan Li, “Research of Database Encryption Based on Fast AES Algorithm Implementation” Springer-Verlag Berlin Heidelberg Part III, CCIS 216, pp. 31–35, 2011
  4. Archana Mishra*, Sourabh Sharma, “Design and Implementation of High Speed AES Algorithm for data security” (IJESRT), 5(8): August, 2016
  5. https://en.wikipedia.org/wiki/Image_compression
  6. Ahmed Fathy, Ibrahim F. Tarrad, Hesham F.A. Hamed, Ali Ismail Awad,”Advanced Encryption Algorithm:Issues and Implementation Aspects”, Springer-Verlag Berlin Heidelberg AMLTA 2012, CCIS 322, pp. 516–523, 2012
  7. S. Kahu, and R. Rahate, "Image compression using singular value decomposition", International Journal of Advancements in Research & Technology, vol. 2, no. 8, pp. 244-248, 2013
  8. https://www.tutorialspoint.com/cryptography/advanced_encryption_standard.htm
  9. https://en.wikipedia.org/wiki/Advanced_Encryption_Standard
  10. S. SrideviSathyaPriya, P. Karthigai Kumar, N.M. Siva Mangai, and P.T. Vanathi, “Survey on Efficient, Low-Power, AES Image Encryption and Bio-cryptography Schemes” Smart Computing Review, vol. 2, no. 6, December 2012
  11. http://searchsecurity.techtarget.com/definition/Advanced-Encryption-Standard
  12. http://www.facweb.iitkgp.ernet.in/~sourav/AES.pdf
  13. https://in.mathworks.com/help/matlab/learn_matlab/product-description.html?requestedDomain=true
  14. https://info.townsendsecurity.com/bid/72450/what-are-the-differences-between-des-and-aes-encryption
  15. Ahmed Bashir Abugharsa, AbdSamad Bin Hasan Basari, HamidaAlmangush,”A New Image Encryption Approach using The Integration of A Shifting Technique and The Aes Algorithm“, IJCA Vol-42 No.9, March-2012
Index Terms

Computer Science
Information Sciences

Keywords

PFAK Data Encryption Modified Algorithm PCA Noise Block Cipher NC Noise.