Image Encryption Based on AES Key Expansion

The relentless growth of Internet and communication technologies has made the extensive use of images unavoidable. The specific characteristics of image like high transmission rate with limited bandwidth, redundancy, bulk capacity and correlation among pixels makes standard algorithms not suitable f...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Subramanyan, B, Chhabria, V M, Babu, T G S
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 220
container_issue
container_start_page 217
container_title
container_volume
creator Subramanyan, B
Chhabria, V M
Babu, T G S
description The relentless growth of Internet and communication technologies has made the extensive use of images unavoidable. The specific characteristics of image like high transmission rate with limited bandwidth, redundancy, bulk capacity and correlation among pixels makes standard algorithms not suitable for image encryption. In order to overcome these limitations for real time applications, design of new algorithms that require less computational power while preserving a sufficient level of security has always been a subject of interest. This paper proposes an algorithm based on AES Key Expansion in which the encryption process is a bit wise exclusive or operation of a set of image pixels along with the a 128 bit key which changes for every set of pixels . The keys to be used are generated independently at the sender and receiver side based on AES Key Expansion process hence the initial key is alone shared rather than sharing the whole set of keys. The algorithm has been experimented with standard bench mark images proposed in USC-SIPI database. Experimental results and security analysis of the proposed algorithm shows that the proposed algorithm offers good resistance against brute force attack, key sensitivity tests and statistical crypt analysis.
doi_str_mv 10.1109/EAIT.2011.60
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5734951</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5734951</ieee_id><sourcerecordid>5734951</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-64b9cb471c710a394332ae3e10d8d0efdd5d02ec2bbedd169a0775555f17f0d73</originalsourceid><addsrcrecordid>eNotjD1PwzAURS2hStDSjY3FO0p4zx9xPIbKlIhKHZq9cuIXFERDFHcg_x5LcJZ7da50GXtAyBHBPruqbnIBiHkBN2yNSihli1KaFVsnDVYJC_aWbWP8hIQWppR4x57qi_8g7sZuXqbr8D3yFx8p8FQqd-LvtHD3M_kxpumerXr_FWn7nxvWvLpm95Ydjvt6Vx2ywcI1K1Rru1YZ7AyCl1ZJKTxJQghlAOpD0AEEdaJtKQQsrAdjdKJH00MwcsMe_24HIjpP83Dx83LWRiqrUf4CZDg_2A</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Image Encryption Based on AES Key Expansion</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Subramanyan, B ; Chhabria, V M ; Babu, T G S</creator><creatorcontrib>Subramanyan, B ; Chhabria, V M ; Babu, T G S</creatorcontrib><description>The relentless growth of Internet and communication technologies has made the extensive use of images unavoidable. The specific characteristics of image like high transmission rate with limited bandwidth, redundancy, bulk capacity and correlation among pixels makes standard algorithms not suitable for image encryption. In order to overcome these limitations for real time applications, design of new algorithms that require less computational power while preserving a sufficient level of security has always been a subject of interest. This paper proposes an algorithm based on AES Key Expansion in which the encryption process is a bit wise exclusive or operation of a set of image pixels along with the a 128 bit key which changes for every set of pixels . The keys to be used are generated independently at the sender and receiver side based on AES Key Expansion process hence the initial key is alone shared rather than sharing the whole set of keys. The algorithm has been experimented with standard bench mark images proposed in USC-SIPI database. Experimental results and security analysis of the proposed algorithm shows that the proposed algorithm offers good resistance against brute force attack, key sensitivity tests and statistical crypt analysis.</description><identifier>ISBN: 1424496837</identifier><identifier>ISBN: 9781424496839</identifier><identifier>DOI: 10.1109/EAIT.2011.60</identifier><identifier>LCCN: 2010942909</identifier><language>eng</language><publisher>IEEE</publisher><subject>AES Key Expansion ; Algorithm design and analysis ; Chaos ; Encryption ; Histograms ; Image Confidentiality ; Image Encryption ; Pixel ; Sensitivity</subject><ispartof>2011 Second International Conference on Emerging Applications of Information Technology, 2011, p.217-220</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5734951$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5734951$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Subramanyan, B</creatorcontrib><creatorcontrib>Chhabria, V M</creatorcontrib><creatorcontrib>Babu, T G S</creatorcontrib><title>Image Encryption Based on AES Key Expansion</title><title>2011 Second International Conference on Emerging Applications of Information Technology</title><addtitle>eait</addtitle><description>The relentless growth of Internet and communication technologies has made the extensive use of images unavoidable. The specific characteristics of image like high transmission rate with limited bandwidth, redundancy, bulk capacity and correlation among pixels makes standard algorithms not suitable for image encryption. In order to overcome these limitations for real time applications, design of new algorithms that require less computational power while preserving a sufficient level of security has always been a subject of interest. This paper proposes an algorithm based on AES Key Expansion in which the encryption process is a bit wise exclusive or operation of a set of image pixels along with the a 128 bit key which changes for every set of pixels . The keys to be used are generated independently at the sender and receiver side based on AES Key Expansion process hence the initial key is alone shared rather than sharing the whole set of keys. The algorithm has been experimented with standard bench mark images proposed in USC-SIPI database. Experimental results and security analysis of the proposed algorithm shows that the proposed algorithm offers good resistance against brute force attack, key sensitivity tests and statistical crypt analysis.</description><subject>AES Key Expansion</subject><subject>Algorithm design and analysis</subject><subject>Chaos</subject><subject>Encryption</subject><subject>Histograms</subject><subject>Image Confidentiality</subject><subject>Image Encryption</subject><subject>Pixel</subject><subject>Sensitivity</subject><isbn>1424496837</isbn><isbn>9781424496839</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2011</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotjD1PwzAURS2hStDSjY3FO0p4zx9xPIbKlIhKHZq9cuIXFERDFHcg_x5LcJZ7da50GXtAyBHBPruqbnIBiHkBN2yNSihli1KaFVsnDVYJC_aWbWP8hIQWppR4x57qi_8g7sZuXqbr8D3yFx8p8FQqd-LvtHD3M_kxpumerXr_FWn7nxvWvLpm95Ydjvt6Vx2ywcI1K1Rru1YZ7AyCl1ZJKTxJQghlAOpD0AEEdaJtKQQsrAdjdKJH00MwcsMe_24HIjpP83Dx83LWRiqrUf4CZDg_2A</recordid><startdate>201102</startdate><enddate>201102</enddate><creator>Subramanyan, B</creator><creator>Chhabria, V M</creator><creator>Babu, T G S</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201102</creationdate><title>Image Encryption Based on AES Key Expansion</title><author>Subramanyan, B ; Chhabria, V M ; Babu, T G S</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-64b9cb471c710a394332ae3e10d8d0efdd5d02ec2bbedd169a0775555f17f0d73</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2011</creationdate><topic>AES Key Expansion</topic><topic>Algorithm design and analysis</topic><topic>Chaos</topic><topic>Encryption</topic><topic>Histograms</topic><topic>Image Confidentiality</topic><topic>Image Encryption</topic><topic>Pixel</topic><topic>Sensitivity</topic><toplevel>online_resources</toplevel><creatorcontrib>Subramanyan, B</creatorcontrib><creatorcontrib>Chhabria, V M</creatorcontrib><creatorcontrib>Babu, T G S</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Subramanyan, B</au><au>Chhabria, V M</au><au>Babu, T G S</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Image Encryption Based on AES Key Expansion</atitle><btitle>2011 Second International Conference on Emerging Applications of Information Technology</btitle><stitle>eait</stitle><date>2011-02</date><risdate>2011</risdate><spage>217</spage><epage>220</epage><pages>217-220</pages><isbn>1424496837</isbn><isbn>9781424496839</isbn><abstract>The relentless growth of Internet and communication technologies has made the extensive use of images unavoidable. The specific characteristics of image like high transmission rate with limited bandwidth, redundancy, bulk capacity and correlation among pixels makes standard algorithms not suitable for image encryption. In order to overcome these limitations for real time applications, design of new algorithms that require less computational power while preserving a sufficient level of security has always been a subject of interest. This paper proposes an algorithm based on AES Key Expansion in which the encryption process is a bit wise exclusive or operation of a set of image pixels along with the a 128 bit key which changes for every set of pixels . The keys to be used are generated independently at the sender and receiver side based on AES Key Expansion process hence the initial key is alone shared rather than sharing the whole set of keys. The algorithm has been experimented with standard bench mark images proposed in USC-SIPI database. Experimental results and security analysis of the proposed algorithm shows that the proposed algorithm offers good resistance against brute force attack, key sensitivity tests and statistical crypt analysis.</abstract><pub>IEEE</pub><doi>10.1109/EAIT.2011.60</doi><tpages>4</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 1424496837
ispartof 2011 Second International Conference on Emerging Applications of Information Technology, 2011, p.217-220
issn
language eng
recordid cdi_ieee_primary_5734951
source IEEE Electronic Library (IEL) Conference Proceedings
subjects AES Key Expansion
Algorithm design and analysis
Chaos
Encryption
Histograms
Image Confidentiality
Image Encryption
Pixel
Sensitivity
title Image Encryption Based on AES Key Expansion
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-24T07%3A35%3A18IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Image%20Encryption%20Based%20on%20AES%20Key%20Expansion&rft.btitle=2011%20Second%20International%20Conference%20on%20Emerging%20Applications%20of%20Information%20Technology&rft.au=Subramanyan,%20B&rft.date=2011-02&rft.spage=217&rft.epage=220&rft.pages=217-220&rft.isbn=1424496837&rft.isbn_list=9781424496839&rft_id=info:doi/10.1109/EAIT.2011.60&rft_dat=%3Cieee_6IE%3E5734951%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5734951&rfr_iscdi=true