Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2023, Academic Journal of Nawroz University (AJNU),
https://doi.org/10.25007/ajnu.v12n3a1643…
7 pages
1 file
Sending digital pictures across open networks has emerged as a major privacy risk in recent years. Despite the environment's adaptability and the many benefits it offers, there are, however, a significant number of threats to one's privacy and safety. A great number of cryptosystems have been proposed in the literature on picture encryption in an effort to make communication more secure. For the purpose of data transmission, the AES algorithm is utilized due to the increased efficiency it offers in the block. This paper proposes image encryption techniques based on the AES algorithm and Henon map. The plain image has been encrypted using the AES algorithm at the first step. Then, the Henon map is used to generate a random key which is required to provide the second step of encryption. This step of encryption has been performed using the XOR operation. The results of the studies demonstrate that the strategy proposed resolves the issues that are present in conventional techniques of encryption. The histogram of the encryption picture is consistently spaced despite being different from the histogram of the original image. The recommended approach is extremely sensitive to the key value; even minute adjustments result in a distinct visual representation. As a result, apps that provide real-time picture encryption while operating over unsecured networks are suitable for the unique technique.
As the information trade in electronic way is quickly expanding, it is likewise similarly vital to shield the classification of information from unapproved get to. The breaks in security influence client's protection and notoriety. The information traded can be content, picture, sound, video and so on. Each sort of information has its own particular highlights and diverse methods are utilized to shield classified picture information from unapproved get to. Thus encryption of information is done to affirm security in open systems. Cryptography is the investigation of procedures for secure correspondence within the sight of a foe. It manages issues like encryption, validation, and key appropriation to give some examples. Image encryption is a system that gives security to pictures by changing over the first picture into a picture which is hard to get it. In the base paper, main approach was that they have added a key stream generator (A5/1W7) to AES to ensure improving the encryption performance; mainly for images characterized by reduced entropy. The implementation of both techniques has been realized for experimental purposes. Detailed results in terms of security analysis and implementation are given. Comparative study with traditional encryption algorithms is shown the superiority of the modified algorithm. But the comparative study showed that encryption time as well as decryption time of this algorithm is quite high. The parameters used in their research such as entropy, co-relation and PSNR are also needed to be analyzed. To improvise their algorithm, we have proposed an algorithm which deals with XOR operation of the sub keys. The methodology is described below.
Security in transmission of digital images has its importance in today's image communications, due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access, Image security has become a critical issue. The difficulties in ensuring individuals privacy become increasingly challenging. Various methods have been investigated and developed to protect data and personal privacy. Encryption is probably the most obvious one. In order to protect valuable information from undesirable readers, image encryption is essential. This paper presents an application of AES (Advanced Encryption Standard) operations in image encryption and decryption. The encrypted cipher images always display the uniformly distributed RGB pixels.
International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2022
Image security is important these days as data is increasing a lot. These data can be images, videos, text, audio, etc. so to protect these images from attackers who can destroy the image quality or modify the images, some technologies like AES, DES, RSA, etc. have been invented. With the generation, data security has also become an essential issue. Considering these issues, the proposed technique ensures confidentiality, integrity, and authentication. Using these techniques, the host can encrypt and decrypt the image and can keep the digital images safe. When AES was chosen 16 years ago, digital technology was completely different from today and the scale of challenges was smaller, so with recent advanced technology and the emergence of new applications such as Big Data applications, in addition to applications running with 64-bit and many other applications have become necessary to design a new current algorithm for current requirements. Advanced Encryption Algorithm (AES) is a symmetric algorithm, which we will further discuss in detail in our research, and in addition to new recommendations for future work, a list of shortcomings and vulnerabilities of the internal structure of the AES algorithm will be diagnosed.
IJRET, 2012
Security in transmission of digital images has its importance in today’s image communications, due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access, Image security has become a critical issue. The difficulties in ensuring individuals privacy become increasingly challenging. Various methods have been investigated and developed to protect data and personal privacy. Encryption is probably the most obvious one. In order to protect valuable information from undesirable readers, image encryption is essential. This paper presents an application of AES (Advanced Encryption Standard) operations in image encryption and decryption. The encrypted cipher images always display the uniformly distributed RGB pixels.
IJRCAR, 2014
Encryption of images has become a necessity in today’s world to protect a confidential image from unauthorized access. Various methods have been proposed and developed in spatial, frequency and hybrid domains to encrypt the image securely. Encryption could either be a full encryption or partial encryption based on the security requirements. In this paper we present an overview of various image encryption techniques based on AES.
This is to certify that the thesis entitled "Image Encryption Based on AES" submitted by Mr. SANILA P (KNR22ECSE06) to the APJ Abdul Kalam Technological University in partial fulfillment of the requirements for the award of the Degree of Master of Technology in Electronics and Communication Engineering (Signal Processing & Embedded Systems) is a bonafide record of the project work carried out by him under my supervision and guidance. This report in any form has not been submitted to any other University or Institute for any purpose.
2014
Now a day’s rapid increasing growth of internet and multimedia data, security is main problem in storage and communication of images. The solution of this multimedia data can be solved by using encryption. There are various techniques available to protect the image data from unauthorized access. In this paper, authors reviewed different existing techniques of image encryption and also discussed the basic knowledge of Cryptography. Keywords— Chaotic Map, Cryptography, Decryption, Encryption, SCAN pattern, Security.
Image encryption is one of the most methods of information hiding. A novel secure encryption method for image hiding is presented in this paper. The proposed method provides good confusion and diffusion properties that ensures high security due to mixing the two Boolean operations: XOR and Rotation that are done on the bits of the pixels in the image. This method is implemented by firstly doing a sequential XOR operation on all the bits of pixels in the image, and secondly makes a circular rotate right of these bits. These two operations are repeated many times during the encryption phase. The security and performance of the proposed encryption method have been evaluated by applying it on images and analyze the recorded results using key space analysis, key sensitivity analysis, and statistical analysis. The performance experiments show that the proposed method is promising to use effectively in wide fields of image encryption.
Data Security is primary concern for every communication system. The relentless growth of Internet and communication technologies has made the extensive use of images unavoidable. There are many ways to provide security to data that is being communicated. This Paper describes a design of effective security for communication by AES algorithm for encryption and decryption.
2013
In the era of computer and internet technology, multimedia protection is becoming increasingly jeopardized. Therefore numerous ways of protecting information are being utilized by individuals, businesses and governments. This paper mainly focuses on a new AES a based image encryption technique using binary code which is expected to provide safety of images travelling over the internet. In order to evaluate the performance, the proposed image encryption technique was measured through a series of tests. These tests included a histogram analysis, information entropy, correlation analysis and differential analysis. Experimental results showed that the proposed encryption technique has satisfactory security and is more efficient than using the AES algorithm alone which makes it a good technique for the encryption of multimedia data. The results showed that the histogram of an encrypted image produced a uniform distribution, which is very different from the histogram of the plain image, a...
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
Academic journal of Nawroz University, 2022
Journal of Electrical Engineering, 2014
International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2021
International journal of engineering research and technology, 2013
International Journal of Electrical and Computer Engineering (IJECE), 2014
International Journal of Engineering Research and, 2015
Zenodo (CERN European Organization for Nuclear Research), 2023