Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33122
A Modified AES Based Algorithm for Image Encryption
Authors: M. Zeghid, M. Machhout, L. Khriji, A. Baganne, R. Tourki
Abstract:
With the fast evolution of digital data exchange, security information becomes much important in data storage and transmission. Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. In this paper, we analyze the Advanced Encryption Standard (AES), and we add a key stream generator (A5/1, W7) to AES to ensure improving the encryption performance; mainly for images characterised by reduced entropy. The implementation of both techniques has been realized for experimental purposes. Detailed results in terms of security analysis and implementation are given. Comparative study with traditional encryption algorithms is shown the superiority of the modified algorithm.Keywords: Cryptography, Encryption, Advanced EncryptionStandard (AES), ECB mode, statistical analysis, key streamgenerator.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1334059
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5067References:
[1] N. Bourbakis, A. Dollas, Scan-based compression-encryption hiding for video on demand. IEEE Multimedia Mag. 10, 79-87, 2003.
[2] A. Canteaut and E. Filiol, "Ciphertext Only Reconstruction of LFSRbased Stream Ciphers ", Institut national de recherche en informatique et en automatique (INRIA), Technical report No 3887, Feb. 2000 Theme 2.
[3] H. Cheng, L. Xiaobo, Partial encryption of compressed images and videos. IEEE Trans. Signal Process. 48 (8), 2439-2451, 2000.
[4] J. Daemen, V. Rijmen, "The block cipher Rijindael", Proceedings of the Third International Conference on smart card Research and Applications, CARDIS-98, Lecture Notes in computer Science, vol.1820, Springer, Berlin, 2000, pp.277_284.
[5] N. Ferguson, J. Kelsey, S. Lucks, B. Schneier, M. Stay, D. Wagner, D. Wagner, and D. Whiting. Improved cryptanalysis of Rijndael. In Bruce Schneier, editor, Proceedings of Fast Software Encryption - FSE-00, number 1978 in Lecture Notes in Computer Science, pages 213-230. Springer-Verlag, 2000.
[6] Federal Information Processing Standards Publications (FIPS 197), "Advanced Encryption Standard (AES) ", 26 Nov. 2001.
[7] K. Gaj, P.Chodowiec, "Fast implementation and fair comparison of the final candidates for advanced encryption standard using field programmable gate arrays", in : CT-RSA 2001, pp.84-99.
[8] M.D. Galanis, P. Kitsos, G. Kostopoulos, N. Sklavos, O. Koufopavlou, and C.E. Goutis, "Comparison of the hardware architectures and FPGA implementations of stream ciphers" in Proceedings of 11th IEEE International Conference on Electronics, Circuits and Systems (ICECS'04), Dec. 13-15, 2004.
[9] J.J. Amador, R. W.Green "Symmetric-Key Block Cipher for Image and Text Cryptography": International Journal of Imaging Systems and Technology, No. 3, 2005, pp. 178-188.
[10] H. Gilbert, M. Minier. A collision attack on 7 rounds of Rijndael. In The third Advanced Encryption Standard Candidate Conference, pages 230- 241, NIST, April 2000. See http://www.nist.gov/aes.
[11] A. Hodjat, I. Verbauwhede, "A 21.54 Gbits/s Fully Pipelined AES Processor on FPGA". Proceedings of the 12th Annual IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM-04).
[12] K. Janvinen, M. Tominisko, J. Skytta, "A fully pipelined memorlyess 17, 8 Gpbs AES-128 encryptor", in International symposium of Field programmable Gate arrays, 2003, pp.207-215.
[13] S.S. Maniccama, N.G. Bourbakis, "Image and video encryption using SCAN patterns", in Pattern Recognition 37 (2004), pp 725 - 737.
[14] L.M. Marvel, G.G. Boncelet, C.T. Retter, Spread spectrum image steganography, IEEE Trans. Image Process, 8 (8), 1075-1083, 1999.
[15] M. Mclone, J.V. McCanny, "Rijindael FPGA implementations utilizing look-up tables", J.VLSI signal process, syst. 34(3)(2003)261-275.
[16] R. C.-W. Phan, "Impossible differential cryptanalysis of 7-round Advanced Encryption Standard (AES)", Information processing letters 91(2004) 33-38.
[17] B. Schneier, Applied Cryptography: Protocols, Algorithms and Source Code in C. John Wiley and Sons, 1996.
[18] C.E. Shannon, "Communication theory of secrecy system", Bell syst Tech,, 1949; 28; 656-715.
[19] L. Shiguo, S. Jinsheny, W. Zhiquan, "A block cipher based a suitable of the chaotic standard map", chaos, solutions and fractals 26(2005) 117- 129.
[20] L. Shujun, Z. Xuan, M. Xuanqin, C. Yuanlong, "chaotic encryption scheme for real time digital video", SPIE vol.4666,p.149-160, Real-Time Imaging, March 2002.