Image Encryption Based on AES Key Expansion
The relentless growth of Internet and communication technologies has made the extensive use of images unavoidable. The specific characteristics of image like high transmission rate with limited bandwidth, redundancy, bulk capacity and correlation among pixels makes standard algorithms not suitable f...
Saved in:
| Published in | 2011 Second International Conference on Emerging Applications of Information Technology pp. 217 - 220 |
|---|---|
| Main Authors | , , |
| Format | Conference Proceeding |
| Language | English |
| Published |
IEEE
01.02.2011
|
| Subjects | |
| Online Access | Get full text |
| ISBN | 1424496837 9781424496839 |
| DOI | 10.1109/EAIT.2011.60 |
Cover
| Abstract | The relentless growth of Internet and communication technologies has made the extensive use of images unavoidable. The specific characteristics of image like high transmission rate with limited bandwidth, redundancy, bulk capacity and correlation among pixels makes standard algorithms not suitable for image encryption. In order to overcome these limitations for real time applications, design of new algorithms that require less computational power while preserving a sufficient level of security has always been a subject of interest. This paper proposes an algorithm based on AES Key Expansion in which the encryption process is a bit wise exclusive or operation of a set of image pixels along with the a 128 bit key which changes for every set of pixels . The keys to be used are generated independently at the sender and receiver side based on AES Key Expansion process hence the initial key is alone shared rather than sharing the whole set of keys. The algorithm has been experimented with standard bench mark images proposed in USC-SIPI database. Experimental results and security analysis of the proposed algorithm shows that the proposed algorithm offers good resistance against brute force attack, key sensitivity tests and statistical crypt analysis. |
|---|---|
| AbstractList | The relentless growth of Internet and communication technologies has made the extensive use of images unavoidable. The specific characteristics of image like high transmission rate with limited bandwidth, redundancy, bulk capacity and correlation among pixels makes standard algorithms not suitable for image encryption. In order to overcome these limitations for real time applications, design of new algorithms that require less computational power while preserving a sufficient level of security has always been a subject of interest. This paper proposes an algorithm based on AES Key Expansion in which the encryption process is a bit wise exclusive or operation of a set of image pixels along with the a 128 bit key which changes for every set of pixels . The keys to be used are generated independently at the sender and receiver side based on AES Key Expansion process hence the initial key is alone shared rather than sharing the whole set of keys. The algorithm has been experimented with standard bench mark images proposed in USC-SIPI database. Experimental results and security analysis of the proposed algorithm shows that the proposed algorithm offers good resistance against brute force attack, key sensitivity tests and statistical crypt analysis. |
| Author | Chhabria, V M Babu, T G S Subramanyan, B |
| Author_xml | – sequence: 1 givenname: B surname: Subramanyan fullname: Subramanyan, B organization: Dept. of Inf. Technol., Thiagarajar Coll. of Eng., Madurai, India – sequence: 2 givenname: V M surname: Chhabria fullname: Chhabria, V M organization: Dept. of Inf. Technol., Thiagarajar Coll. of Eng., Madurai, India – sequence: 3 givenname: T G S surname: Babu fullname: Babu, T G S email: becks.subbu2@gmail.com organization: Dept. of Inf. Technol., Thiagarajar Coll. of Eng., Madurai, India |
| BookMark | eNotjEFPg0AQhTfRJkrtzZuXvRtwZndhmSM2WyU26aHcm4UdDMZSAj3Iv5dEv8t7-V7yInHbX3oW4hEhQQR6cUVZJQoQkwxuRIRGGUNZru1KRIsGMoqA7sRmmr5gIVU213gvnsuz_2Tp-mach2t36eWrnzjIpRTuKD94lu5n8P20TA9i1frviTf_uRbVzlXb93h_eCu3xT7uCK5xZmpqamOxsQhek9FaedaMEPIA3IaQBlDcqLrmEDAjD9amCy3aFoLVa_H0d9sx82kYu7Mf51NqtaEU9S8SFUGW |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/EAIT.2011.60 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| EndPage | 220 |
| ExternalDocumentID | 5734951 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR AAWTH ADFMO ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IEGSK IERZE OCL RIE RIL |
| ID | FETCH-LOGICAL-i90t-64b9cb471c710a394332ae3e10d8d0efdd5d02ec2bbedd169a0775555f17f0d73 |
| IEDL.DBID | RIE |
| ISBN | 1424496837 9781424496839 |
| IngestDate | Wed Aug 27 02:41:14 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| LCCN | 2010942909 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i90t-64b9cb471c710a394332ae3e10d8d0efdd5d02ec2bbedd169a0775555f17f0d73 |
| PageCount | 4 |
| ParticipantIDs | ieee_primary_5734951 |
| PublicationCentury | 2000 |
| PublicationDate | 2011-Feb. |
| PublicationDateYYYYMMDD | 2011-02-01 |
| PublicationDate_xml | – month: 02 year: 2011 text: 2011-Feb. |
| PublicationDecade | 2010 |
| PublicationTitle | 2011 Second International Conference on Emerging Applications of Information Technology |
| PublicationTitleAbbrev | eait |
| PublicationYear | 2011 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0000527831 |
| Score | 1.5769564 |
| Snippet | The relentless growth of Internet and communication technologies has made the extensive use of images unavoidable. The specific characteristics of image like... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 217 |
| SubjectTerms | AES Key Expansion Algorithm design and analysis Chaos Encryption Histograms Image Confidentiality Image Encryption Pixel Sensitivity |
| Title | Image Encryption Based on AES Key Expansion |
| URI | https://ieeexplore.ieee.org/document/5734951 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NSwMxEA21J08qrfhNDt50a9LsR3OssqVVKoIVeiubzARE3JayBeuvd7LbriIe3FN2Twlh5-VN5r1h7NIZJJbsdJD5W_fQJRAYK1RAUGsI76Jur5SPjR_j4Ut4P42mDXZda2EQsSw-w44flnf5MLcrnyoj8q7oPE9cZyfpxZVWq86niMj3jJBb7ZaOiXltLZ0277oufNc3aX80qQw8vTnlj8YqJa4M9th4O6OqnOStsypMx37-Mmv875T3Wftbwcefamw6YA3MW-xq9E7Rg6e5Xa7LSMFvCcOA06CfPvMHXPP0g6KDT6C12WSQTu6GwaZZQvCqRRHEodHWENJYOjJkSntbsgwVSgE9EOgAIhBdtF1jEEDGOvPed_Q4mTgBiTpkzXye4xHjmjieSVxkJaoQNO1WEjppZWhAKfpjj1nLr3O2qOwwZpslnvz9-ZTtVmlYXwFyxprFcoXnhOOFuSg38AvLapca |
| linkProvider | IEEE |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFA5jHvSksom_zcGbdjZL2i7HKR2b-4Fghd1Gk7yAyDoZHTj_el_arYp4sKe0p4TQ9-V7ed_3CLm2CpAlW-ml7tZd2Mh4SvvcQ6hViHdBu1PIx8aTsP8iHqfBtEZuKy0MABTFZ9Byw-Iu3yz0yqXKkLxzPM8j19kJhBBBqdaqMip-4LpGsK16S4bIvbamTpt3WZW-y7u4O0hKC09nT_mjtUqBLL19Mt7OqSwoeWutctXSn7_sGv876QPS_Nbw0acKnQ5JDbIGuRnMMX7QONPLdREr6D2imKE46MbPdAhrGn9gfHAptCZJenHy0Pc27RK8V-nnXiiU1AqxRuOhIeXSGZOlwIH5pmN8sMYExm-DbisFxrBQps79Dh_LIuubiB-RerbI4JhQiSxPRTbQDLgwEvcrEpZpJpThHP_ZE9Jw65y9l4YYs80ST__-fEV2-8l4NBsNJsMzslcmZV09yDmp58sVXCCq5-qy2Mwv7_SaZw |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2011+Second+International+Conference+on+Emerging+Applications+of+Information+Technology&rft.atitle=Image+Encryption+Based+on+AES+Key+Expansion&rft.au=Subramanyan%2C+B&rft.au=Chhabria%2C+V+M&rft.au=Babu%2C+T+G+S&rft.date=2011-02-01&rft.pub=IEEE&rft.isbn=9781424496839&rft.spage=217&rft.epage=220&rft_id=info:doi/10.1109%2FEAIT.2011.60&rft.externalDocID=5734951 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424496839/lc.gif&client=summon&freeimage=true |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424496839/mc.gif&client=summon&freeimage=true |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424496839/sc.gif&client=summon&freeimage=true |