Image Encryption Approach using the MAES Algorithm
Abstract
In today's life it is crucial to shield the private picture information from unapproved access. In this paper we examine the Modified Advanced Encryption Standard (MAES) with the change plot and to guarantee enhancing the encryption execution, chiefly for pictures described by lessening entropy. Nitty gritty results as far as security examination and usage are given.Comparative study with conventional encryption calculation is demonstrated the predominance of the Modified calculation.
Full Text:
PDFReferences
Shtewi, A.M. An efficent modified advanced encryption standard (MAES) adapted for image cryptosystems. IJCSNS International Journal of Computer Science and Network Security. 2010; 10(2): 226–232p.
HuagC.W.,TuY.H.,YehH.C., et al. Image observation on the modified ECB operations in advanced encryption standard.In Information Society (i-society). International Conference. 2011; 264–269p.
Lian S. Multimedia, Content Encryption: Techniques and Applications: CRC Press; 2008.
Neil F. Johnson, SushilOiJajodia. Steanalysis: The investigation of hidden information technology. 1998; 113–116p.
A. Mitra, Y. V. Subbarao, S.R.M Prasanna. A new image encryption approach using combinational permutation techniques. Journal of Computer Science. 2006; 1(1): 127p.
William Stalling. Cryptography and network security: Principles and Practices. 4th ed. Prentice Hall; 2006.
Bruce Schneier. Applied Cryptography. John Wiley & Sons Publisher; 2009. ISBN:9780471117094.
Gurjeevan Singh, Ashwani Kumar Singla, K.S. Sandha. Through put analysis of various encryption algorithms.IJCST. 2(3).
Shannon CE. Communication theory of secrecy system. Bell Syst. Tech J. 1949; 28:656 –715p.
G.Chen,Y.Mao,C.K.Chui. A Symmetric image encryption scheme based on 3D chaotic catmaps. Chao, Solitons& Fractals. 2004;21(3):749–61p.
Refbacks
- There are currently no refbacks.