Skip to main content
Top
Published in: Wireless Personal Communications 2/2019

16-05-2019

A Novel Image Encryption Technique Based on Generalized Advanced Encryption Standard Based on Field of Any Characteristic

Authors: Majid Khan, Noor Munir

Published in: Wireless Personal Communications | Issue 2/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The privacy of digital contents is one of the most important issue of the digitally advanced world. The transmission of online information is increasing immensely from last one decade. As the technology evolving with the passage of time, the secrecy of digital information is one of the unavoidable problem. The secrecy of information can be achieved through different encryption algorithms. In this article, our aim is to introduce an innovative technique for an image encryption to extend the advanced encryption standard (AES) to the Galois field of any characteristic. With the new improvement, all four steps in basic algorithm with binary characteristic is modified accordingly. We have extended number of possibilities in our proposed substitution boxes which imply, we added more confusion capabilities and generalized the existing concepts. Moreover, we have applied the anticipated scheme to digital image encryption. We have utilized standard statistical to verify the robustness of our suggested technique for encrypted image.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Lian, S. (2009). Quasi-commutative watermarking and encryption for secure media content distribution. Multimedia Tools and Applications, 43, 91–107.CrossRef Lian, S. (2009). Quasi-commutative watermarking and encryption for secure media content distribution. Multimedia Tools and Applications, 43, 91–107.CrossRef
2.
go back to reference Announcing the Advanced Encryption Standard (AES). (2000). Federal Information Processing Standards Publication 197 November 26, 2000. Announcing the Advanced Encryption Standard (AES). (2000). Federal Information Processing Standards Publication 197 November 26, 2000.
3.
go back to reference Muhaya, F. B. (2009). Modified AES using chaotic key generator for satellite imagery encryption. Emerging Intelligent Computing Technology and Applications, 5754, 1014–1024.CrossRef Muhaya, F. B. (2009). Modified AES using chaotic key generator for satellite imagery encryption. Emerging Intelligent Computing Technology and Applications, 5754, 1014–1024.CrossRef
4.
go back to reference Krishnamurthy, G. N., & Ramaswamy, V. (2008). Making AES stronger: AES with key dependent S-box. International Journal of Computer Science and Network Security, 8(9), 388–398. Krishnamurthy, G. N., & Ramaswamy, V. (2008). Making AES stronger: AES with key dependent S-box. International Journal of Computer Science and Network Security, 8(9), 388–398.
5.
go back to reference Kawle, P., Hiwase, A., Bagde, G., Tekam, E., & Kalbande, R. (2014). Modified advanced encryption standard. International Journal of Soft Computing and Engineering, 4, 21–23. Kawle, P., Hiwase, A., Bagde, G., Tekam, E., & Kalbande, R. (2014). Modified advanced encryption standard. International Journal of Soft Computing and Engineering, 4, 21–23.
7.
go back to reference Khan, M., Shah, T., & Batool, S. I. (2017). A new approach for image encryption and watermarking based on substitution box over the classes of chain rings. Multimedia Tools and Applications, 76, 24027–24062.CrossRef Khan, M., Shah, T., & Batool, S. I. (2017). A new approach for image encryption and watermarking based on substitution box over the classes of chain rings. Multimedia Tools and Applications, 76, 24027–24062.CrossRef
8.
go back to reference Khan, M., & Shah, T. (2016). Construction and applications of chaotic S-boxes in image encryption. Neural Computing and Applications, 27, 677–685.CrossRef Khan, M., & Shah, T. (2016). Construction and applications of chaotic S-boxes in image encryption. Neural Computing and Applications, 27, 677–685.CrossRef
9.
go back to reference Khan, M., Shah, T., & Batool, S. I. (2016). A new implementations of chaotic S-boxes in CAPTCHA. Signal, Image and Video Processing, 10, 293–300.CrossRef Khan, M., Shah, T., & Batool, S. I. (2016). A new implementations of chaotic S-boxes in CAPTCHA. Signal, Image and Video Processing, 10, 293–300.CrossRef
10.
go back to reference Khan, M., & Waseem, H. M. (2018). A novel image encryption scheme based on quantum dynamical spinning and rotations. PLoS ONE, 13(11), e0206460.CrossRef Khan, M., & Waseem, H. M. (2018). A novel image encryption scheme based on quantum dynamical spinning and rotations. PLoS ONE, 13(11), e0206460.CrossRef
11.
go back to reference Khan, M. (2015). A novel image encryption scheme based on multi-parameters chaotic S-boxes. Nonlinear Dynamics, 82, 527–533.MathSciNetCrossRef Khan, M. (2015). A novel image encryption scheme based on multi-parameters chaotic S-boxes. Nonlinear Dynamics, 82, 527–533.MathSciNetCrossRef
12.
13.
go back to reference Khan, M., & Shah, T. (2015). An efficient construction of substitution box with fractional chaotic system. Signal, Image and Video Processing, 9, 1335–1338.CrossRef Khan, M., & Shah, T. (2015). An efficient construction of substitution box with fractional chaotic system. Signal, Image and Video Processing, 9, 1335–1338.CrossRef
14.
go back to reference Khan, M., Shah, T., Mahmood, H., & Gondal, M. A. (2014). An efficient method for the construction of block cipher with multi-chaotic systems. Nonlinear Dynamics, 71, 493–504.MathSciNet Khan, M., Shah, T., Mahmood, H., & Gondal, M. A. (2014). An efficient method for the construction of block cipher with multi-chaotic systems. Nonlinear Dynamics, 71, 493–504.MathSciNet
15.
go back to reference Wang, Y., Wong, K. W., Liao, X., & Chen, G. (2009). A new chaos-based fast image encryption algorithm. Applied Soft Computing, 11, 514–522.CrossRef Wang, Y., Wong, K. W., Liao, X., & Chen, G. (2009). A new chaos-based fast image encryption algorithm. Applied Soft Computing, 11, 514–522.CrossRef
16.
go back to reference Zhang, L., Liao, X., & Wang, X. (2005). An image encryption approach based on chaotic maps. Chaos, Solitons & Fractals, 24(3), 759–765.MathSciNetCrossRef Zhang, L., Liao, X., & Wang, X. (2005). An image encryption approach based on chaotic maps. Chaos, Solitons & Fractals, 24(3), 759–765.MathSciNetCrossRef
17.
go back to reference Borujeni, S. E., & Eshghi, M. (2009). Chaotic image encryption design using tompkins–paige algorithm. Hindawi Publishing Corporation Mathematical Problem in Engineering, 200, 22.MATH Borujeni, S. E., & Eshghi, M. (2009). Chaotic image encryption design using tompkins–paige algorithm. Hindawi Publishing Corporation Mathematical Problem in Engineering, 200, 22.MATH
18.
go back to reference Guarnong, C., Mao, Y., & Chui, C. K. (2004). A symmetric image encryption scheme based on 3D chaotic Cat maps. Chaos, Solitons & Fractals, 21(3), 749–761.MathSciNetCrossRef Guarnong, C., Mao, Y., & Chui, C. K. (2004). A symmetric image encryption scheme based on 3D chaotic Cat maps. Chaos, Solitons & Fractals, 21(3), 749–761.MathSciNetCrossRef
19.
go back to reference Zhou, Q., Wo Wong, K., Liao, X., Xiang, T., & Hu, Y. (2008). Parallel image encryption algorithm based on discretized chaotic map. Chaos, Solitons & Fractals, 38(4), 1081–1092.CrossRef Zhou, Q., Wo Wong, K., Liao, X., Xiang, T., & Hu, Y. (2008). Parallel image encryption algorithm based on discretized chaotic map. Chaos, Solitons & Fractals, 38(4), 1081–1092.CrossRef
20.
go back to reference Gao, H., Zhang, Y., Liang, S., & Li, D. (2006). A new chaotic algorithm for image encryption. Chaos, Solitons & Fractals, 29(2), 393–399.CrossRef Gao, H., Zhang, Y., Liang, S., & Li, D. (2006). A new chaotic algorithm for image encryption. Chaos, Solitons & Fractals, 29(2), 393–399.CrossRef
21.
go back to reference Mao, Y., Chen, G., & Lian, S. (2004). A novel fast image encryption scheme based on 3D chaotic bakermaps. International Journal of Bifurcation and Chaos, 14(10), 3613–3624.MathSciNetCrossRef Mao, Y., Chen, G., & Lian, S. (2004). A novel fast image encryption scheme based on 3D chaotic bakermaps. International Journal of Bifurcation and Chaos, 14(10), 3613–3624.MathSciNetCrossRef
22.
go back to reference Khanzadi, H., Omam, M. A., Lotfifar, F., & Eshghi, M. (2010). Image encryption based on gyrator transforms using chaotic maps. In Signal processing (ICSP), 2010 IEEE 10th international conference on (pp. 2608–2612). Khanzadi, H., Omam, M. A., Lotfifar, F., & Eshghi, M. (2010). Image encryption based on gyrator transforms using chaotic maps. In Signal processing (ICSP), 2010 IEEE 10th international conference on (pp. 2608–2612).
24.
go back to reference Guoji, Z., & Qing, L. (2011). A novel image encryption method based on total shuffling scheme. Optics Communications, 284, 2775–2780.CrossRef Guoji, Z., & Qing, L. (2011). A novel image encryption method based on total shuffling scheme. Optics Communications, 284, 2775–2780.CrossRef
Metadata
Title
A Novel Image Encryption Technique Based on Generalized Advanced Encryption Standard Based on Field of Any Characteristic
Authors
Majid Khan
Noor Munir
Publication date
16-05-2019
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 2/2019
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-019-06594-6

Other articles of this Issue 2/2019

Wireless Personal Communications 2/2019 Go to the issue