Notification: Our email services are now fully restored after a brief, temporary outage caused by a denial-of-service (DoS) attack. If you sent an email on Dec 6 and haven't received a response, please resend your email.
CFP last date
20 December 2024
Reseach Article

Review on Image Encryption and Decryption using AES Algorithm

Published on June 2015 by Sneha Ghoradkar, Aparna Shinde
National Conference on Emerging Trends in Advanced Communication Technologies
Foundation of Computer Science USA
NCETACT2015 - Number 3
June 2015
Authors: Sneha Ghoradkar, Aparna Shinde
7d2f205e-6fe1-43bc-8b68-d09c22ecdd97

Sneha Ghoradkar, Aparna Shinde . Review on Image Encryption and Decryption using AES Algorithm. National Conference on Emerging Trends in Advanced Communication Technologies. NCETACT2015, 3 (June 2015), 11-13.

@article{
author = { Sneha Ghoradkar, Aparna Shinde },
title = { Review on Image Encryption and Decryption using AES Algorithm },
journal = { National Conference on Emerging Trends in Advanced Communication Technologies },
issue_date = { June 2015 },
volume = { NCETACT2015 },
number = { 3 },
month = { June },
year = { 2015 },
issn = 0975-8887,
pages = { 11-13 },
numpages = 3,
url = { /proceedings/ncetact2015/number3/20995-2036/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Emerging Trends in Advanced Communication Technologies
%A Sneha Ghoradkar
%A Aparna Shinde
%T Review on Image Encryption and Decryption using AES Algorithm
%J National Conference on Emerging Trends in Advanced Communication Technologies
%@ 0975-8887
%V NCETACT2015
%N 3
%P 11-13
%D 2015
%I International Journal of Computer Applications
Abstract

An Image Encryption and Decryption Using AES (Advance Encryption Standard) Algorithm is proposed in this paper. Due to increasing use of image in various field, it is very important to protect the confidential image data from unauthorized access. The design uses the iterative approach with block size of 128 bit and key size of 256 bit. The numbers of round for key size of 256 bits is 14. As secret key increases the security as well as complexity of the cryptography algorithms. This paper presents a algorithm in which the image is an input to AES Encryption to get the encrypted image and the encrypted image is the input to AES Decryption to get the original image.

References
  1. El Maraghy M, Hesham S and Abd El Ghany M. A, "Real-time Efficient FPGA Implementation of AES Algorithm", IEEE International SOC Conference (SOCC), page 203-208, Sept 2013.
  2. M. Sambasiva Reddy and Mr. Y. Amar Babu, "Evaluation Of Microblaze and Implementation Of AES Algorithm using Spartan-3E", International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 2, Issue 7, page 3341-3347, July 2013.
  3. Hoang Trang and Nguyen Van Loi, "An Efficient FPGA Implementation of The Advanced Encryption Standard algorithm", IEEE International Conference on Computing and Communication Technology, page 1-4, Ho Chi Minh city, 2012.
  4. Kamali S. H, Shakerian R, Hedayati M and Rahmani M, "A new modied version of Advanced Encryption Standard based algorithm for image encryption", (ICEIE) International Conference On Electronics and Information Engineering, volume 1, page 1250-1255, Aug 2010.
  5. Ahmad N, Hasan R and Jubadi W. M, "Design of AES S-box using combinational logic optimization", IEEE Symposium on Industrial Electronics & Applications (ISIEA), page 512-517, Oct 2010.
  6. M. Zeghid, M. Machhout, L. Khriji, A. Baganne, and R. Tourki, "A Modified AES Based Algorithm for Image Encryption", International Journal of Computer, Information, Systems and Control Engineering Vol:1 No:3, page 726-731, 2007.
  7. FIPS 197, "Advanced Encryption Standard (AES)," November 26, 2001.
  8. National Institute of Standards and Technology (NIST), "Data Encryption Standard (DES)," National Technical InformationService VA 22161, 1999.
Index Terms

Computer Science
Information Sciences

Keywords

Aes Algorithm Image Encryption Image Decryption