Top PDF Increasing Security by Implementing Image Encryption using AES Algorithm

Increasing Security by Implementing Image Encryption using AES Algorithm

Increasing Security by Implementing Image Encryption using AES Algorithm

Abstract—To provide security in image application, encryption is required. In this paper, we analyze AES algorithm and various security measures used for image encryption in AES algorithm. As cryptography helps in hiding the sensitive information or its transmission over an insecure network. Preventing any unidentified or unintended user to read it. Cryptography is the method to protect information from undesirable attackers while transmitted or stored.

4 Ler mais

LOW POWER FAULT TOLERANT SBOX DESIGN FOR XTS-AES ENCRYPTION

LOW POWER FAULT TOLERANT SBOX DESIGN FOR XTS-AES ENCRYPTION

Now-a-days Hardware Fault Tolerant plays a major role in Computing Systems and the techniques applied to rectify the fault are Voting Systems and TMR [17] but in this paper we deal with component reusability, a new technique in Fault Tolerance where the fault is rectified by using the previous components. Therefore the security level applied to the algorithm should be difficult to find the Key even when the faults are injected by several methods by the attacker by using several modern techniques where the information is retrieved by breaking the strength of the algorithm by repeating the hacking algorithm several times.
Mostrar mais

8 Ler mais

Design and Implementation of Image Encryption Algorithm Using Chaos

Design and Implementation of Image Encryption Algorithm Using Chaos

The proposed image encryption algorithm has two major steps. Firstly, the correlation among the adjacent pixels is disturbed completely as the image data have strong correlations among adjacent pixels. For image security and secrecy, one has to disturb this correlation. To achieve this, a block and stream based image shuffling scheme is proposed using the three chaotic maps mentioned above. Then the pixel values of the shuffled image are modified by employing Henon map. Encryption is done in two stages confusion and diffusion.
Mostrar mais

5 Ler mais

Estudo e implementação de ip-cores para Criptografia simétrica baseada no Advanced encryption standard (AES)

Estudo e implementação de ip-cores para Criptografia simétrica baseada no Advanced encryption standard (AES)

This work addresses data encryption using Rijndael symmetric key encryption algorithm , which is used in Advanced Encryption Standard - AES. AES has massively widespread in computing, communications, and broadcast media applications, due to its robustness. By intensively using of all flavors and sizes of devices and networks, the AES has become the standard at the time of implementation and deployment of these applications when the major requirement, in addition to performance, is security, i.e. virtually all of those applications nowadays. In systems equipped with modern processors, even those on small devices, it is common to find some that perform the encryption and decryption procedures in software. With the "explosive" spread of addition of security layers in almost everything that is processed inside and outside of the devices, even on systems equipped with powerful computing resources, the possibility of performing these layers on (small) additional hardware resources, developed with specific purpose, has become attractive. This dissertation presents a study of the theoretical foundations involving AES, some architectures and implementations based on it and documented in the recent technical and scientific literature, as well as the methodologies and requirements for the development of its hardware implementation, in particular, focusing on mobile systems, where performance has to be achieved in low power consumption and small area scenarios. Reference models have been developed and functionally validated in high-level languages for each hierarchical architectural level compiled from the mentioned study. As a proof of concept, this work consisted in undertaking a project of an intellectual property of digital integrated circuit core (IP core) for the encryption/decryption procedures of AES, starting from the pseudocode level of the algorithms and going to the level of a digital integrated circuit core. Among the solutions studied from recent literature, modules and operations that could be replicated and/or reused were identified. A microarchitecture for the full AES was implemented hierarchically to the core level with standard cells placed and routed. The work also offers three implementation options for the block identified as the most complex: the S-Box. Results of performance and area were then presented and compared with those of literature.
Mostrar mais

114 Ler mais

Efficiency and Security of Some Image Encryption Algorithms

Efficiency and Security of Some Image Encryption Algorithms

Transposition - substitution techniques mean the schemes, which are composed of two basic parts: position permutation and diffusion of pixel value. Maniccama and Bourbakisa (2004) have proposed a method that is based on permutation of pixels and substitution of the pixel values [8]. The permutation is done by encryption keys that are generated by the SCAN methodology. The pixel values are replaced using a simple substitution rule, which adds confusion (hide relationship between key and cipher-image) and diffusion (hide relationship between plain-image and cipher-image) properties to the encryption method. The permutation and substitution operations are applied in intertwined manner and iteratively. The encryption algorithm uses four scan keys to increase the complexity of pixel rearrangement. The user specifies two of them as part of encryption key and the other two keys are fixed as part of encryption algorithm.
Mostrar mais

4 Ler mais

Inventive Cubic Symmetric Encryption System for Multimedia

Inventive Cubic Symmetric Encryption System for Multimedia

Cryptography is a security technique that must be applied in both communication sides to pro- tect the data during its transmission through the network from all kinds of attack. On the sender side, the original data will be changed into different symbols or shapes by using a known key; this is called encryption. On the other communication side, the decryption process will be done and the data will be returned to its former shape by using the agreed key. The importance of cryptography is to fulfil the communication security requirements. Real time applications (RTA) are vulnerable for the moment because of their big size. However, some of the current algo- rithms are not really appropriate for use with these kinds of information. In this paper, a novel symmetric block cipher cryptography algorithm has been illustrated and discussed. The system uses an 8x8x8 cube, and each cell contains a pair of binary inputs. The cube can provide a huge number of combinations that can produce a very strong algorithm and a long key size. Due to the lightweight and fast technique used in this idea, it is expected to be extremely rapid com- pared to the majority of current algorithms, such as DES and AES.
Mostrar mais

7 Ler mais

COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETWORKS (MANETS)

COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETWORKS (MANETS)

Umaparvathi and Varughese in [9] presented a comparison of the most commonly used symmetric encryption algorithms AES (Rijndael), DES, 3DES and Blowfish in terms of power consumption. A comparison had been conducted for those encryption algorithms using different data types like text, image, audio and video. The various encryption algorithms had been implemented in Java. In the experiments, the software encrypts different file formats with file sizes (4MB - 11MB). The performance metrics like encryption time, decryption time and throughput had been collected. The presented simulation results showed that AES has a better performance than other common encryption algorithms used. Since AES had not showed any known security weak points in the presented study, this makes it an excellent candidate. 3DES showed poor performance results since it requires more processing power. Since the battery power is one of the major limitations in MANET nodes, the AES encryption algorithm is the best choice.
Mostrar mais

13 Ler mais

QR Code based secure OTP distribution scheme for Authentication in Net-Banking

QR Code based secure OTP distribution scheme for Authentication in Net-Banking

System consists of a web service that will generate alpha-numerical OTPs using pseudo-random numbers and current timestamp. Use of timestamp further assures security and uniqueness of OTP. The alpha-numerical password string is then encrypted using Advanced Encryption Standard (AES).The key for the algorithm will be ATM pin of the user since it is unique for every user and can be obtained by Bank Server in every login session through account number. The AES algorithm is used here since not only it provides higher security but also it improves performance in such critical systems. The encrypted string is then converted to QR image by the Bank Server. It is then sent to the concerned user using email as transmission medium via SMTP. User then
Mostrar mais

4 Ler mais

Integral Imaging Based 3-D Image Encryption Algorithm Combined with Cellular Automata

Integral Imaging Based 3-D Image Encryption Algorithm Combined with Cellular Automata

In this paper, to improve the quality and security of reconstructed 3D image, we propose a new 3D image encryption algorithm using CII and MLCA. In the proposed algorithm, a 3-D image is recorded as a 2-D EIA by using a lenslet array, and the recorded 2-D EIA are enciphered by MLCA. The decryption process and the encryption process are exact opposites. The 2-D EIA are recovered by the inverse MLCA process, and the 3-D object is subsequently reconstructed using the recovered EIA via computational integral imaging reconstruction (CIIR). The quality of the reconstructed images using CIIR is better than that of the images reconstructed using all optical II. This is because CIIR is free of diffraction and device limitations. To show the usefulness of the proposed algorithm, preliminary experiments are performed, and the experimental results are analyzed.
Mostrar mais

10 Ler mais

Improving System Security and User Privacy in Secure Electronic Transaction (SET) with X.509 v3 Certificate

Improving System Security and User Privacy in Secure Electronic Transaction (SET) with X.509 v3 Certificate

With the advancement of internets, user’s transaction is at ease, timely manner and effective wise through online payment method, so also cybercriminals become increasingly more prompt in areas like e-commerce sites, financial institutions, payment processes and other online transactions. Therefore the need for the system security and privacy became the central issues for the acceptance of online payment methods in particular and growth of the Internet market in general. Using SET as an open encryption and security specification designed to protect credit card transaction on the internet. This paper proposes a new approach for increasing security by avoiding privacy violation using Public Key Infrastructure, X.509 certificate and Format Preservation encryption method, the credit card number is encrypted using public key algorithm and re-encrypted using Format preservation Encryption algorithm and finally stored in the X.509 version 3 certificate private extensions. This technique can be used to improve the security of the user credit card information against card fraud or the compromise of data associated with the account.
Mostrar mais

5 Ler mais

Substitution-diffusion based Image Cipher

Substitution-diffusion based Image Cipher

We propose a new non-chaos based image encryption scheme using a key of 128-bit size. In the algorithm, image is partitioned into several key based dynamic blocks and each block is passed through the eight rounds of diffusion as well as substitution process. In diffusion process, sequences of block pixels are rearranged within itself by a zigzag approach whereas block pixels are replaced with another by using difference transformation in substitution process. We have carried out an extensive security and performance analysis of the proposed image encryption technique using various statistical analysis, key sensitivity analysis, differential analysis, key space analysis, speed performance, etc. Based on the results of our analysis, we conclude that the proposed image encryption technique is perfectly suitable for the secure image storing and transmission.
Mostrar mais

12 Ler mais

Image Encryption using chaos functions and fractal key

Image Encryption using chaos functions and fractal key

Since rapid growth of image transmission on computer networks and Internet, digital image security has been very critical. In order to image transmission, secure and fast algorithms are required for image encryption. Novel encryption schemes has been presented by researchers in recent years. Chaos system like logistic mapping [3] and Lorenz mapping designed for image encryption and researchers presented different encryption schemes based on chaos system [1- 4]. Chaos system process has various features like high sensitivity to initial state, certainty, ergodic and etc. chaos sequence which are random sequences are generated by chaos mapping. These structures are very complex and their analysis and prediction is too difficult [5- 7]. Wang et al. [8] presented a chaos based encryption algorithm. Teng et al. [9] proposed an encryption algorithm based on parity bit, chaos and self-adaptively. Chaos mapping
Mostrar mais

8 Ler mais

Encryption and Decryption of Digital Image Using Color Signal

Encryption and Decryption of Digital Image Using Color Signal

This paper aims at improving the level of security and secrecy provided by the digital color signal-based image encryption. The image encryption and decryption algorithm is designed and implemented to provide confidentiality and security in transmission of the image based data as well as in storage. This new proposed encryption algorithm can ensure the lossless of transmissions of images. The proposed encryption algorithm in this study has been tested on some images and showed good results.
Mostrar mais

5 Ler mais

A Randomized Secure Data Hiding Algorithm Using File Hybridization for Information Security

A Randomized Secure Data Hiding Algorithm Using File Hybridization for Information Security

Our proposed system provides hierarchical security in various phases. As the final transmitted image is the hybrid image, it helps in creating mystification to the analyst about which part of the image actually contains secret data. If the analyst succeeded in identifying the container image also, it will be very difficult to retrieve the secret data from the container image because of the new embedding process. As the embedding is done by using complete byte at random positions for storing the color image data based on stego-key, it is strong against bit inversion mechanisms used by analysts. The bit inversions (mostly LSB) [9], [10] and [11] done by analyst have less impact on the actual color image retrieved. Major part of the column still contains the color of the alphabet which serves the purpose in identifying the character. The encryption process retains less information in the ciphered data by using random color mapping. Only 36 colors used in the possible color mappings of 256*256*256.
Mostrar mais

12 Ler mais

Encryption Image Using Small Order Linear Systems and Repeated Modular Numbers

Encryption Image Using Small Order Linear Systems and Repeated Modular Numbers

Form the testing of our algorithm which appearing in Table 1 we have a three encrypted images for each original image. Firstly we have obtained a plain image of an RGB color. Then this analysis by taking two sequential gray level numbers by constructing 2by2 linear system. Finally repeated modular numbers technique is used for production three matrices. Here it is interesting to note that the encrypted image do not has any resemblance with their corresponding original images. This fact ensures security of images in an effective manner. The histogram of each of original image and its decrypted image referee the goodness of this algorithm. The results of these histograms appear in Table 2 where ha and hb represent the histogram of original image and decrypted image respectively. The results appearing in Tables 1 and 2 are promised to develop.
Mostrar mais

6 Ler mais

The Risk and Challenges of Cloud Computing

The Risk and Challenges of Cloud Computing

The general public has been leveraging forms of Internet-based computer utilities since the mid 1990s through various incarnations of search engines (Yahoo!, Google), e-mail services (Hotmail, Gmail), open publishing platforms (MySpace, Facebook, YouTube), and other types of social media (Twitter, LinkedIn)[3]. Without the development of ARPANET (Advance Research Projects Agency Network) by J.C.R.Licklider in 1960‟s and many other researchers who dream of improving the interconnection of systems, CC would never have come into existence[10].
Mostrar mais

6 Ler mais

AES ALGORITHM IMPLEMENTATION IN PROGRAMMING LANGUAGES

AES ALGORITHM IMPLEMENTATION IN PROGRAMMING LANGUAGES

AES poate fi folosit (ca şi al i algoritmi) în diferite moduri pentru realizarea cript ării. Este facilă implementarea unui sistem care s ă folosească AES ca algoritm de criptare, dar mai mult ă pricepere şi experien ă este necesară pentru implementarea lui într-un mod corect pentru o situa ie dat ă. Începând cu versiunea 6, Java are suport încorporat pentru algoritmul AES prin intermediul furnizorului SunJCE care – cum s-a şi arătat în acest articol – este uşor de folosit şi există de asemenea multe documenta ii şi exemple disponibile.
Mostrar mais

9 Ler mais

Monitoring of High Power Laser Welding Process by Using Image Difference Algorithm

Monitoring of High Power Laser Welding Process by Using Image Difference Algorithm

commercialized for several years [7]. Also, the laser focus deviations from the desired path can be estimated by coaxially monitoring the optical signals emitted from the weld pool area [8]. The way of reconstructing a three-dimensional model of a molten pool and detecting the welding state has been a research focus at the present time [9,10]. Some research has been conducted on infrared temperature measurement of hybrid laser-TIG welding process [11]. Several fundamental studies on plasma monitoring have been performed to evaluate the stability of laser welding [12]. High-speed photography has been proved to be an effective method in analyzing the structure and dynamic behavior of a keyhole during laser welding process [13]. In order to optimize the productivity of laser welding, electromagnetic emissions from the weld zone, such as reflected light, thermal radiation and plasma radiation, are the most important information during on-line monitoring [14]. Recently, using near-infrared sensing technology in seam tracking and monitoring of laser welding process have been investigated [15,16].
Mostrar mais

5 Ler mais

Implementação de sistemas de encriptação AES advanced encryption standard em hardware para segurança

Implementação de sistemas de encriptação AES advanced encryption standard em hardware para segurança

As so, the work here wants to describe the study and implementation of protection methods and countermeasures that allow establishing a security level against Side-Channel Attacks (SCA) based on the observation and analysis of the consequence of the implementation. The ones typically used, the same that are studied here, are attacks based on the analysis of the electrical consumption of the device, namely Single Power Analysis (SPA) and Differential Power Analysis (DPA). The first is based on a direct observation of the variation of the consumption by the attacker that withdraws information from it, identifying it by its trace. The second, a lot more complex and effective, uses technics based on error correction and statistical analysis to extract information, becoming more difficult to prevent.
Mostrar mais

134 Ler mais

Selective image encryption for Medical and Satellite Images

Selective image encryption for Medical and Satellite Images

Abstract— Information security plays a very important role in fast growing information and communication technology. Few applications like medical image security and satellite image security needs to secure only selected portion of the image. This paper describes a concept of selective image encryption in two ways. First method divides the image in to sub blocks, then selected blocks are applied to encryption process. Second method automatically detects the positions of objects, and then selected objects are applied to encryption process. Morphological techniques are used to detect the positions of the objects in given images. These two approaches are specifically developed to encrypt the portion of an image in medical images and satellite image.
Mostrar mais

7 Ler mais

Show all 10000 documents...