Digital Image Encryption Implementations Based on AES Algorithm
DOI:
https://doi.org/10.21015/vtcs.v13i1.453Abstract
Objectives: To increase needed for exchanging digital photos electronically, due to alarming demand for multimedia applications, and because of the increasing use of images in electronic processes. Hence, the need for protection by unauthorized user is necessary. Method: This paper primarily is focusing on the necessary protection of these images using a specific analyzes algorithm: Advanced Encryption Standard (AES) with a full its description, which is known as an algorithm (Rijndael). Findings: It will be determined the address decryption, which is made up of different styles in all encryption and decryption steps in order to protect the valuable information. This algorithm will be implemented on MATLAB software programming. Application: The above results and analysis for this crypto system based on AES algorithm give a high performance. So we have reason to believe that use this method to encrypt the image will have a very good prospect in the future.
References
Real-time Efficient FPGA Implementation of AES Algorithm”, by El Maraghy M, Hesham S and Abd El Ghany M.A, IEEE International SOC Conference Sept 2013.
A new moodier version of Advanced Encryption Standard based algorithm for image encryption”, by Kamali S.H, Shakerian R, Hedayati M and Rahmani M (ICEIE) International Conference on Electronics and Information Engineering, volume 1, Aug 2010.
J.J. Amador, R. W.Green “Symmetric-Key Block Cipher for Image and Text Cryptography: International Journal of Imaging Systems and Technology, No. 3, 2005, pp. 178-188.
S.S. Maniccama, N.G. Bourbakis, "Image and video encryption using SCAN patterns", in Pattern Recognition 37 (2004), pp 725 – 737.
R. C.-W. Phan, "Impossible differential cryptanalysis of 7-round Advanced Encryption Standard (AES)", Information processing letters 91(2004) 33-38.
M. Zeghid, M. Machhout, L. Khriji, A. Baganne, and R. Tourki “A Modified AES Based Algorithm for ImageEncryption” World Academy of Science, Engineering and Technology 27, 2007
An Efficient FPGA Implementation of The Advanced Encryption Standard algorithm”, by Hoang Trang and Nguyen Van Loi, IEEE International Conference on Computing and Communication Technology, page 1 -4, Ho Chi Minh city, 2012.
Rachh, R.R.; Anami, B.S.; Ananda Mohan, P.V. ―Efficient implementations of S-box and Inv.erse S-box for AES algorithm,‖ in TENCON 2009 - 2009 IEEE Region 10 Conference , Nov. 2009, pp. 1–6.
Yang Jun Ding Jun Li Na Guo Yixiong (2010), FPGA based design and implementation of reduced AES algorithm, IEEE 978-0-7695-3972-0/10.
Chi-Feng Lu , Fast implementation of AES cryptographic algorithms in smart cards; Yan-Shun Kao; Hsia-Ling Chiang; Chung-Huang Yang; Security Technology, 2003.
C.-P. Su, C.-L. Horng, C.-T. Huang, and C.-W. Wu, ―A configurable AES processor for enhanced security,‖ in Proc. ASP-DAC, Shanghai, China, Jan. 2005, pp. 361–366.
Kaur, Swinder; Vig, Renu , ‖ Efficient Implementation of AES Algorithm in FPGA Device‖ in Conference on Computational Intelligence and Multimedia Applications, Nov 2007,pp. 179-187.
Evaluation Of Microblaze and Implementation Of AES Algorithm using Spartan-3E”, by M. Sambasiva Reddy and Mr.Y.Amar Babu, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 2, July 2013.
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC-By) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
This work is licensed under a Creative Commons Attribution License CC BY