Image Encryption Based on AES Key Expansion

The relentless growth of Internet and communication technologies has made the extensive use of images unavoidable. The specific characteristics of image like high transmission rate with limited bandwidth, redundancy, bulk capacity and correlation among pixels makes standard algorithms not suitable f...

Full description

Saved in:
Bibliographic Details
Published in2011 Second International Conference on Emerging Applications of Information Technology pp. 217 - 220
Main Authors Subramanyan, B, Chhabria, V M, Babu, T G S
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.02.2011
Subjects
Online AccessGet full text
ISBN1424496837
9781424496839
DOI10.1109/EAIT.2011.60

Cover

Abstract The relentless growth of Internet and communication technologies has made the extensive use of images unavoidable. The specific characteristics of image like high transmission rate with limited bandwidth, redundancy, bulk capacity and correlation among pixels makes standard algorithms not suitable for image encryption. In order to overcome these limitations for real time applications, design of new algorithms that require less computational power while preserving a sufficient level of security has always been a subject of interest. This paper proposes an algorithm based on AES Key Expansion in which the encryption process is a bit wise exclusive or operation of a set of image pixels along with the a 128 bit key which changes for every set of pixels . The keys to be used are generated independently at the sender and receiver side based on AES Key Expansion process hence the initial key is alone shared rather than sharing the whole set of keys. The algorithm has been experimented with standard bench mark images proposed in USC-SIPI database. Experimental results and security analysis of the proposed algorithm shows that the proposed algorithm offers good resistance against brute force attack, key sensitivity tests and statistical crypt analysis.
AbstractList The relentless growth of Internet and communication technologies has made the extensive use of images unavoidable. The specific characteristics of image like high transmission rate with limited bandwidth, redundancy, bulk capacity and correlation among pixels makes standard algorithms not suitable for image encryption. In order to overcome these limitations for real time applications, design of new algorithms that require less computational power while preserving a sufficient level of security has always been a subject of interest. This paper proposes an algorithm based on AES Key Expansion in which the encryption process is a bit wise exclusive or operation of a set of image pixels along with the a 128 bit key which changes for every set of pixels . The keys to be used are generated independently at the sender and receiver side based on AES Key Expansion process hence the initial key is alone shared rather than sharing the whole set of keys. The algorithm has been experimented with standard bench mark images proposed in USC-SIPI database. Experimental results and security analysis of the proposed algorithm shows that the proposed algorithm offers good resistance against brute force attack, key sensitivity tests and statistical crypt analysis.
Author Chhabria, V M
Babu, T G S
Subramanyan, B
Author_xml – sequence: 1
  givenname: B
  surname: Subramanyan
  fullname: Subramanyan, B
  organization: Dept. of Inf. Technol., Thiagarajar Coll. of Eng., Madurai, India
– sequence: 2
  givenname: V M
  surname: Chhabria
  fullname: Chhabria, V M
  organization: Dept. of Inf. Technol., Thiagarajar Coll. of Eng., Madurai, India
– sequence: 3
  givenname: T G S
  surname: Babu
  fullname: Babu, T G S
  email: becks.subbu2@gmail.com
  organization: Dept. of Inf. Technol., Thiagarajar Coll. of Eng., Madurai, India
BookMark eNotjEFPg0AQhTfRJkrtzZuXvRtwZndhmSM2WyU26aHcm4UdDMZSAj3Iv5dEv8t7-V7yInHbX3oW4hEhQQR6cUVZJQoQkwxuRIRGGUNZru1KRIsGMoqA7sRmmr5gIVU213gvnsuz_2Tp-mach2t36eWrnzjIpRTuKD94lu5n8P20TA9i1frviTf_uRbVzlXb93h_eCu3xT7uCK5xZmpqamOxsQhek9FaedaMEPIA3IaQBlDcqLrmEDAjD9amCy3aFoLVa_H0d9sx82kYu7Mf51NqtaEU9S8SFUGW
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/EAIT.2011.60
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EndPage 220
ExternalDocumentID 5734951
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
AAWTH
ADFMO
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IEGSK
IERZE
OCL
RIE
RIL
ID FETCH-LOGICAL-i90t-64b9cb471c710a394332ae3e10d8d0efdd5d02ec2bbedd169a0775555f17f0d73
IEDL.DBID RIE
ISBN 1424496837
9781424496839
IngestDate Wed Aug 27 02:41:14 EDT 2025
IsPeerReviewed false
IsScholarly false
LCCN 2010942909
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i90t-64b9cb471c710a394332ae3e10d8d0efdd5d02ec2bbedd169a0775555f17f0d73
PageCount 4
ParticipantIDs ieee_primary_5734951
PublicationCentury 2000
PublicationDate 2011-Feb.
PublicationDateYYYYMMDD 2011-02-01
PublicationDate_xml – month: 02
  year: 2011
  text: 2011-Feb.
PublicationDecade 2010
PublicationTitle 2011 Second International Conference on Emerging Applications of Information Technology
PublicationTitleAbbrev eait
PublicationYear 2011
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0000527831
Score 1.5769564
Snippet The relentless growth of Internet and communication technologies has made the extensive use of images unavoidable. The specific characteristics of image like...
SourceID ieee
SourceType Publisher
StartPage 217
SubjectTerms AES Key Expansion
Algorithm design and analysis
Chaos
Encryption
Histograms
Image Confidentiality
Image Encryption
Pixel
Sensitivity
Title Image Encryption Based on AES Key Expansion
URI https://ieeexplore.ieee.org/document/5734951
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NSwMxEA21J08qrfhNDt50a9LsR3OssqVVKoIVeiubzARE3JayBeuvd7LbriIe3FN2Twlh5-VN5r1h7NIZJJbsdJD5W_fQJRAYK1RAUGsI76Jur5SPjR_j4Ut4P42mDXZda2EQsSw-w44flnf5MLcrnyoj8q7oPE9cZyfpxZVWq86niMj3jJBb7ZaOiXltLZ0277oufNc3aX80qQw8vTnlj8YqJa4M9th4O6OqnOStsypMx37-Mmv875T3Wftbwcefamw6YA3MW-xq9E7Rg6e5Xa7LSMFvCcOA06CfPvMHXPP0g6KDT6C12WSQTu6GwaZZQvCqRRHEodHWENJYOjJkSntbsgwVSgE9EOgAIhBdtF1jEEDGOvPed_Q4mTgBiTpkzXye4xHjmjieSVxkJaoQNO1WEjppZWhAKfpjj1nLr3O2qOwwZpslnvz9-ZTtVmlYXwFyxprFcoXnhOOFuSg38AvLapca
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFA5jHvSksom_zcGbdjZL2i7HKR2b-4Fghd1Gk7yAyDoZHTj_el_arYp4sKe0p4TQ9-V7ed_3CLm2CpAlW-ml7tZd2Mh4SvvcQ6hViHdBu1PIx8aTsP8iHqfBtEZuKy0MABTFZ9Byw-Iu3yz0yqXKkLxzPM8j19kJhBBBqdaqMip-4LpGsK16S4bIvbamTpt3WZW-y7u4O0hKC09nT_mjtUqBLL19Mt7OqSwoeWutctXSn7_sGv876QPS_Nbw0acKnQ5JDbIGuRnMMX7QONPLdREr6D2imKE46MbPdAhrGn9gfHAptCZJenHy0Pc27RK8V-nnXiiU1AqxRuOhIeXSGZOlwIH5pmN8sMYExm-DbisFxrBQps79Dh_LIuubiB-RerbI4JhQiSxPRTbQDLgwEvcrEpZpJpThHP_ZE9Jw65y9l4YYs80ST__-fEV2-8l4NBsNJsMzslcmZV09yDmp58sVXCCq5-qy2Mwv7_SaZw
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2011+Second+International+Conference+on+Emerging+Applications+of+Information+Technology&rft.atitle=Image+Encryption+Based+on+AES+Key+Expansion&rft.au=Subramanyan%2C+B&rft.au=Chhabria%2C+V+M&rft.au=Babu%2C+T+G+S&rft.date=2011-02-01&rft.pub=IEEE&rft.isbn=9781424496839&rft.spage=217&rft.epage=220&rft_id=info:doi/10.1109%2FEAIT.2011.60&rft.externalDocID=5734951
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424496839/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424496839/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424496839/sc.gif&client=summon&freeimage=true