Skip to main content
Erschienen in: Wireless Personal Communications 2/2014

01.11.2014

High Definition Image Encryption Algorithm Based on AES Modification

verfasst von: Salim Muhsin Wadi, Nasharuddin Zainal

Erschienen in: Wireless Personal Communications | Ausgabe 2/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this article, a high-speed and highly restricted encryption algorithm is proposed to cipher high-definition (HD) images based on the modified advanced encryption standard (AES) algorithm. AES is a well-known block cipher algorithm and has several advantages, such as high-level security and implementation ability. However, AES has some drawbacks, including high computation costs, pattern appearance, and high hardware requirements. The aforementioned problems become more complex when the AES algorithm ciphers an image, especially HD images. Three modifications are proposed in this paper to improve AES algorithm performance through, decreasing the computation costs, decreasing the hardware requirements, and increasing the security level. First, modification was conducted using MixColumn transformation in 5 rounds instead of 10 rounds in the original AES-128 to decrease the encryption time. Security is enhanced by improving the key schedule operation by adding MixColumn transformation to this operation as second modification. In addition, to decrease the hardware requirements, S-box and Inv. S-box in the original AES are replaced by one simple S-box used for encryption and decryption in the proposed method. The proposed AES version conducts one of the ciphering modes to solve the appearance pattern problem. Experimental results indicate that the proposed modifications to the AES algorithm made the algorithm more compatible with HD image encryption.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Jong-Wook, H., Choon-Sik, P., Dae-Hyun, R., & Eun-Soo, K. (1999). Optical image encryption based on XOR operations. Optical Engineering, 38(1), 47–54.CrossRef Jong-Wook, H., Choon-Sik, P., Dae-Hyun, R., & Eun-Soo, K. (1999). Optical image encryption based on XOR operations. Optical Engineering, 38(1), 47–54.CrossRef
2.
Zurück zum Zitat Daesung, M., Yongwha, C., Sung, P., Kiyoung, M., & Kyo, C. (2006). An efficient selective encryption of fingerprint images for embedded processors. ETRI Journal, 28(4), 444–452.CrossRef Daesung, M., Yongwha, C., Sung, P., Kiyoung, M., & Kyo, C. (2006). An efficient selective encryption of fingerprint images for embedded processors. ETRI Journal, 28(4), 444–452.CrossRef
3.
Zurück zum Zitat Shahram, B., & Mohammad, E. (2013). Chaotic image encryption system using phase-magnitude transformation and pixel substitution. Telecommunication Systems, 52(2), 525–537. Shahram, B., & Mohammad, E. (2013). Chaotic image encryption system using phase-magnitude transformation and pixel substitution. Telecommunication Systems, 52(2), 525–537.
4.
Zurück zum Zitat Nanrun, Z., Yixian, W., & Lihua, G. (2011). Novel optical image encryption scheme based on fractional Mellin transform. Optics Communications, 284(13), 3234–3242.CrossRef Nanrun, Z., Yixian, W., & Lihua, G. (2011). Novel optical image encryption scheme based on fractional Mellin transform. Optics Communications, 284(13), 3234–3242.CrossRef
5.
Zurück zum Zitat Fan, G., Linfei, C., & Daomu, Z. (2008). A half-blind color image hiding and encryption method in fractional Fourier domains. Optics Communications, 281(17), 4254–4260.CrossRef Fan, G., Linfei, C., & Daomu, Z. (2008). A half-blind color image hiding and encryption method in fractional Fourier domains. Optics Communications, 281(17), 4254–4260.CrossRef
6.
Zurück zum Zitat Shahram, B. (2000). Speech encryption based on fast Fourier transform permutation. In 7th IEEE international conference on electronics, circuits and systems. Jounieh, Lebanon. Shahram, B. (2000). Speech encryption based on fast Fourier transform permutation. In 7th IEEE international conference on electronics, circuits and systems. Jounieh, Lebanon.
7.
Zurück zum Zitat Zhengjun, L., Lie, X., Ting, L., Hang, C., Pengfei, L., Chuang, L., et al. (2011). Color image encryption by using Arnold transform and color-blend operation in discrete cosine transform domains. Optics Communications, 284(1), 123–128.CrossRef Zhengjun, L., Lie, X., Ting, L., Hang, C., Pengfei, L., Chuang, L., et al. (2011). Color image encryption by using Arnold transform and color-blend operation in discrete cosine transform domains. Optics Communications, 284(1), 123–128.CrossRef
8.
Zurück zum Zitat Hsuan, C., Hone-Ene, H., & Cheng-Ling, L. (2011). Position multiplexing multiple-image encryption using cascaded phase-only masks in Fresnel transform domain. Optics Communications, 284(18), 4146–4151.CrossRef Hsuan, C., Hone-Ene, H., & Cheng-Ling, L. (2011). Position multiplexing multiple-image encryption using cascaded phase-only masks in Fresnel transform domain. Optics Communications, 284(18), 4146–4151.CrossRef
9.
Zurück zum Zitat Hwang, H. (2011). An optical image cryptosystem based on Hartley transform in the Fresnel transform domain. Optics Communications, 284(13), 3243–3247.CrossRef Hwang, H. (2011). An optical image cryptosystem based on Hartley transform in the Fresnel transform domain. Optics Communications, 284(13), 3243–3247.CrossRef
10.
Zurück zum Zitat Akhshani, A., Behnia, S., Akhava, A., Abu Hassan, H., & Hassan, Z. (2010). A novel scheme for image encryption based on 2D piecewise chaotic maps. Optics Communications, 283(17), 3259–3266.CrossRef Akhshani, A., Behnia, S., Akhava, A., Abu Hassan, H., & Hassan, Z. (2010). A novel scheme for image encryption based on 2D piecewise chaotic maps. Optics Communications, 283(17), 3259–3266.CrossRef
11.
Zurück zum Zitat Fu, C., Lin, B., Miao, Y., Xiao, L., & Jun-jie, C. (2011). A novel chaos-based bit-level permutation scheme for digital image encryption. Optics Communications, 284(23), 5415–5423.CrossRef Fu, C., Lin, B., Miao, Y., Xiao, L., & Jun-jie, C. (2011). A novel chaos-based bit-level permutation scheme for digital image encryption. Optics Communications, 284(23), 5415–5423.CrossRef
12.
Zurück zum Zitat Liu, H., & Wang, X. (2011). Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Optics Communications, 284(16–17), 3895–3903.CrossRef Liu, H., & Wang, X. (2011). Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Optics Communications, 284(16–17), 3895–3903.CrossRef
13.
Zurück zum Zitat Akhavan, A., Samsudin, A., & Akhshani, A. (2011). A symmetric image encryption scheme based on combination of nonlinear chaotic maps. Journal of the Franklin Institute, 348(8), 1797–1813.MathSciNetCrossRef Akhavan, A., Samsudin, A., & Akhshani, A. (2011). A symmetric image encryption scheme based on combination of nonlinear chaotic maps. Journal of the Franklin Institute, 348(8), 1797–1813.MathSciNetCrossRef
14.
Zurück zum Zitat Ruisong, Y. (2011). A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism. Optics Communications, 284(22), 5290–5298.CrossRef Ruisong, Y. (2011). A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism. Optics Communications, 284(22), 5290–5298.CrossRef
15.
Zurück zum Zitat Zhi-liang, Z., Wei, Z., Kwok-wo, W., & Hai, Y. (2011). A chaos-based symmetric image encryption scheme using a bit-level permutation. Information Sciences, 181(6), 1171–1186.CrossRef Zhi-liang, Z., Wei, Z., Kwok-wo, W., & Hai, Y. (2011). A chaos-based symmetric image encryption scheme using a bit-level permutation. Information Sciences, 181(6), 1171–1186.CrossRef
16.
Zurück zum Zitat Alexander, P., & Massimiliano, Z. (2012). Chaotic map cryptography and security. In Encryption: methods, software and security (pp. 301–332). Nova Science Publishers. Alexander, P., & Massimiliano, Z. (2012). Chaotic map cryptography and security. In Encryption: methods, software and security (pp. 301–332). Nova Science Publishers.
17.
Zurück zum Zitat Jiancheng, Z., Rabab, W., & Dongxu, Q. (2004). A new digital image scrambling method based on Fibonacci numbers. In International conference on circuits and systems, Vancouver, Canada. Jiancheng, Z., Rabab, W., & Dongxu, Q. (2004). A new digital image scrambling method based on Fibonacci numbers. In International conference on circuits and systems, Vancouver, Canada.
18.
Zurück zum Zitat Jiancheng, Z., Rabab, W., & Dongxu, Q. (2004). The generalized Fibonacci transformations and application to image scrambling. In IEEE international conference on acoustics, speech, and signal processing, Montreal, Canada. Jiancheng, Z., Rabab, W., & Dongxu, Q. (2004). The generalized Fibonacci transformations and application to image scrambling. In IEEE international conference on acoustics, speech, and signal processing, Montreal, Canada.
19.
Zurück zum Zitat Linfei, C., Daomu, Z., & Fan, G. (2013). Image encryption based on singular value decomposition and Arnold transform in fractional domain. Optics Communications, 291, 98–103.CrossRef Linfei, C., Daomu, Z., & Fan, G. (2013). Image encryption based on singular value decomposition and Arnold transform in fractional domain. Optics Communications, 291, 98–103.CrossRef
20.
Zurück zum Zitat Qiudong, S., Wenying, Y., Jiangwei, H., & Wenxin, M. (2012). Image encryption based on bit-plane decomposition and random scrambling. In 2nd International conference on consumer electronics, communications and networks, Hubei, China. Qiudong, S., Wenying, Y., Jiangwei, H., & Wenxin, M. (2012). Image encryption based on bit-plane decomposition and random scrambling. In 2nd International conference on consumer electronics, communications and networks, Hubei, China.
21.
Zurück zum Zitat Yicong, Z., Karen, P., & Sos, A. (2009). Image encryption algorithms based on generalized P-Gray code bit plane decomposition. In Conference record of the forty-third Asilomar conference on signals, systems and computers, CA, USA. Yicong, Z., Karen, P., & Sos, A. (2009). Image encryption algorithms based on generalized P-Gray code bit plane decomposition. In Conference record of the forty-third Asilomar conference on signals, systems and computers, CA, USA.
22.
Zurück zum Zitat Zheng, W., Cheng, Z., & Cui, Y. (2008). Image data encryption and hiding based on wavelet packet transform and bit planes decomposition. In 4th International conference on wireless communications, networking and mobile computing, Dalian, China. Zheng, W., Cheng, Z., & Cui, Y. (2008). Image data encryption and hiding based on wavelet packet transform and bit planes decomposition. In 4th International conference on wireless communications, networking and mobile computing, Dalian, China.
23.
Zurück zum Zitat Nandi, S., Kar, B., & Chaudhuri, P. (1994). Theory and applications of cellular automata in cryptography. IEEE Transactions on Computer, 43(12), 1346–1357.CrossRef Nandi, S., Kar, B., & Chaudhuri, P. (1994). Theory and applications of cellular automata in cryptography. IEEE Transactions on Computer, 43(12), 1346–1357.CrossRef
24.
Zurück zum Zitat FIPS PUB 46-3: Data encryption standard (DES), 1999. FIPS PUB 46-3: Data encryption standard (DES), 1999.
25.
Zurück zum Zitat Daemen, J., & Rijmen, V. (2000). The block cipher Rijndael. In: Smart card research and applications. Lecture notes in computer science (pp. 277–284). Berlin: Springer. Daemen, J., & Rijmen, V. (2000). The block cipher Rijndael. In: Smart card research and applications. Lecture notes in computer science (pp. 277–284). Berlin: Springer.
26.
Zurück zum Zitat Kamali, S., Shakerian, R., Hedayati, M., & Rahmani, M. (2010). A new modified version of advanced encryption standard based algorithm for image encryption. In International conference on electronics and information engineering, Kyoto, Japan. Kamali, S., Shakerian, R., Hedayati, M., & Rahmani, M. (2010). A new modified version of advanced encryption standard based algorithm for image encryption. In International conference on electronics and information engineering, Kyoto, Japan.
27.
Zurück zum Zitat Grangetto, M., Magli, E., & Olmo, G. (2006). Multimedia selective encryption by means of randomized arithmetic coding. IEEE Transactions on Multimedia, 8(5), 905–917.CrossRef Grangetto, M., Magli, E., & Olmo, G. (2006). Multimedia selective encryption by means of randomized arithmetic coding. IEEE Transactions on Multimedia, 8(5), 905–917.CrossRef
28.
Zurück zum Zitat Wadi, S., & Zainal, N. (2013). A low cost implementation of modified advanced encryption standard algorithm using 8085A microprocessor. Journal of Engineering Science and Technology, 8(4), 406–415. Wadi, S., & Zainal, N. (2013). A low cost implementation of modified advanced encryption standard algorithm using 8085A microprocessor. Journal of Engineering Science and Technology, 8(4), 406–415.
29.
Zurück zum Zitat Huang C. W., Tu Y. H., Yeh H. C., Liu S. H., & Chang C. J. (2011). Image observation on the modified ECB operations in Advanced Encryption Standard. In International conference in information society (i-Society), London, UK. Huang C. W., Tu Y. H., Yeh H. C., Liu S. H., & Chang C. J. (2011). Image observation on the modified ECB operations in Advanced Encryption Standard. In International conference in information society (i-Society), London, UK.
30.
Zurück zum Zitat Subramanyan, B., Chhabria, V. M., & Sankarbabu, T. G. (2011). Image encryption based on AES key expansion. In IEEE computer society meeting, Kolkata, India. Subramanyan, B., Chhabria, V. M., & Sankarbabu, T. G. (2011). Image encryption based on AES key expansion. In IEEE computer society meeting, Kolkata, India.
31.
Zurück zum Zitat Fahad, M. (2013). Chaotic and AES cryptosystem for satellite imagery. Telecommunication Systems, 52(2), 573–581. Fahad, M. (2013). Chaotic and AES cryptosystem for satellite imagery. Telecommunication Systems, 52(2), 573–581.
32.
Zurück zum Zitat Tran M. T., Bui D. K., & Duong A. D. (2008). Gray S-box for advanced encryption standard. In IEEE computer society meeting, Suzhou, China. Tran M. T., Bui D. K., & Duong A. D. (2008). Gray S-box for advanced encryption standard. In IEEE computer society meeting, Suzhou, China.
33.
Zurück zum Zitat Yicheng, C., Xuecheng, Z., Zhenglin, L., Xiaofei, C., & Yu, H. (2008). Dynamic inhomogeneous S-Boxes design for efficient AES masking mechanisms. The Journal of China Universities of Posts and Telecommunications, 15(2), 72–76.CrossRef Yicheng, C., Xuecheng, Z., Zhenglin, L., Xiaofei, C., & Yu, H. (2008). Dynamic inhomogeneous S-Boxes design for efficient AES masking mechanisms. The Journal of China Universities of Posts and Telecommunications, 15(2), 72–76.CrossRef
34.
Zurück zum Zitat Bouillaguet, C., Derbez, P., Dunkelman, O., Fouque, P., Keller, N., & Rijmen, V. (2012). Low-data complexity attacks on AES. IEEE Transaction on Information Theory, 58(11), 7002–7017.MathSciNetCrossRef Bouillaguet, C., Derbez, P., Dunkelman, O., Fouque, P., Keller, N., & Rijmen, V. (2012). Low-data complexity attacks on AES. IEEE Transaction on Information Theory, 58(11), 7002–7017.MathSciNetCrossRef
35.
Zurück zum Zitat Dunkelman, O., & Keller, N. (2010). The effects of the omission of last rounds mixcolumns on AES. Information Processing Letters, 110(8–9), 304308.MathSciNet Dunkelman, O., & Keller, N. (2010). The effects of the omission of last rounds mixcolumns on AES. Information Processing Letters, 110(8–9), 304308.MathSciNet
36.
Zurück zum Zitat Announcing the Advanced Encryption Standard (AES), Federal Information Processing Standards Publication 197, 26 of November, 2001. Announcing the Advanced Encryption Standard (AES), Federal Information Processing Standards Publication 197, 26 of November, 2001.
37.
Zurück zum Zitat Gonzalez, R., Woods, E., & Eddins, L. (2008). Digital image processing using Matlab. NJ: Gatesmark LLC. Gonzalez, R., Woods, E., & Eddins, L. (2008). Digital image processing using Matlab. NJ: Gatesmark LLC.
Metadaten
Titel
High Definition Image Encryption Algorithm Based on AES Modification
verfasst von
Salim Muhsin Wadi
Nasharuddin Zainal
Publikationsdatum
01.11.2014
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2014
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-014-1888-7

Weitere Artikel der Ausgabe 2/2014

Wireless Personal Communications 2/2014 Zur Ausgabe

Neuer Inhalt