High Definition Image Encryption Algorithm Based on AES Modification

In this article, a high-speed and highly restricted encryption algorithm is proposed to cipher high-definition (HD) images based on the modified advanced encryption standard (AES) algorithm. AES is a well-known block cipher algorithm and has several advantages, such as high-level security and implementation ability. However, AES has some drawbacks, including high computation costs, pattern appearance, and high hardware requirements. The aforementioned problems become more complex when the AES algorithm ciphers an image, especially HD images. Three modifications are proposed in this paper to improve AES algorithm performance through, decreasing the computation costs, decreasing the hardware requirements, and increasing the security level. First, modification was conducted using MixColumn transformation in 5 rounds instead of 10 rounds in the original AES-128 to decrease the encryption time. Security is enhanced by improving the key schedule operation by adding MixColumn transformation to this operation as second modification. In addition, to decrease the hardware requirements, S-box and Inv. S-box in the original AES are replaced by one simple S-box used for encryption and decryption in the proposed method. The proposed AES version conducts one of the ciphering modes to solve the appearance pattern problem. Experimental results indicate that the proposed modifications to the AES algorithm made the algorithm more compatible with HD image encryption.

[1]  Fan Ge,et al.  A half-blind color image hiding and encryption method in fractional Fourier domains , 2008 .

[2]  Zheng Wei,et al.  Image Data Encryption and Hiding Based on Wavelet Packet Transform and Bit Planes Decomposition , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[3]  Chi-Jeng Chang,et al.  Image observation on the modified ECB operations in Advanced Encryption Standard , 2011, International Conference on Information Society (i-Society 2011).

[4]  Wei Zhang,et al.  A chaos-based symmetric image encryption scheme using a bit-level permutation , 2011, Inf. Sci..

[5]  Shahram Etemadi Borujeni,et al.  Speech encryption based on fast Fourier transform permutation , 2000, ICECS 2000. 7th IEEE International Conference on Electronics, Circuits and Systems (Cat. No.00EX445).

[6]  Nasharuddin Zainal,et al.  A low cost implementation of modified advanced encryption standard algorithm using 8085A microprocessor , 2013 .

[7]  Mohsen Rahmani,et al.  A new modified version of Advanced Encryption Standard based algorithm for image encryption , 2010, 2010 International Conference on Electronics and Information Engineering.

[8]  Hone-Ene Hwang An optical image cryptosystem based on Hartley transform in the Fresnel transform domain , 2011 .

[9]  Mohammad Eshghi,et al.  Chaotic image encryption system using phase-magnitude transformation and pixel substitution , 2011, Telecommunication Systems.

[10]  Minh-Triet Tran,et al.  Gray S-Box for Advanced Encryption Standard , 2008, 2008 International Conference on Computational Intelligence and Security.

[11]  Vincent Rijmen,et al.  The Block Cipher Rijndael , 1998, CARDIS.

[12]  Amir Akhavan,et al.  A novel scheme for image encryption based on 2D piecewise chaotic maps , 2010 .

[13]  Yu Han,et al.  Dynamic inhomogeneous S-Boxes design for efficient AES masking mechanisms , 2008 .

[14]  Fahad Bin Muhaya,et al.  Chaotic and AES cryptosystem for satellite imagery , 2013, Telecommun. Syst..

[15]  Xiao Liu,et al.  A novel chaos-based bit-level permutation scheme for digital image encryption , 2011 .

[16]  Amir Akhavan,et al.  A symmetric image encryption scheme based on combination of nonlinear chaotic maps , 2011, J. Frankl. Inst..

[17]  Re Gonzalez,et al.  R.C. Eddins, Digital image processing using MATLAB, vol. Gatesmark Publishing Knoxville , 2009 .

[18]  Enrico Magli,et al.  Multimedia Selective Encryption by Means of Randomized Arithmetic Coding , 2006, IEEE Transactions on Multimedia.

[19]  Vincent Rijmen,et al.  Low-Data Complexity Attacks on AES , 2012, IEEE Transactions on Information Theory.

[20]  Qiudong Sun,et al.  Image encryption based on bit-plane decomposition and random scrambling , 2012, 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet).

[21]  Ruisong Ye,et al.  A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism , 2011 .

[22]  Hone-Ene Hwang,et al.  Position multiplexing multiple-image encryption using cascaded phase-only masks in Fresnel transform domain , 2011 .

[23]  Sung Bum Pan,et al.  An Efficient Selective Encryption of Fingerprint Images for Embedded Processors , 2006 .

[24]  Parimal Pal Chaudhuri,et al.  Theory and Applications of Cellular Automata in Cryptography , 1994, IEEE Trans. Computers.

[25]  Orr Dunkelman,et al.  The effects of the omission of last round's MixColumns on AES , 2010, Inf. Process. Lett..

[26]  Rabab Kreidieh Ward,et al.  A new digital image scrambling method based on Fibonacci numbers , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).

[27]  Ting Liu,et al.  Color image encryption by using Arnold transform and color-blend operation in discrete cosine transform domains , 2011 .

[28]  Linfei Chen,et al.  Image encryption based on singular value decomposition and Arnold transform in fractional domain , 2013 .

[29]  Xingyuan Wang,et al.  Color image encryption using spatial bit-level permutation and high-dimension chaotic system , 2011 .

[30]  Eun-Soo Kim,et al.  Optical image encryption based on XOR operations , 1999 .

[31]  Li-Hua Gong,et al.  Novel optical image encryption scheme based on fractional Mellin transform , 2011 .

[32]  Rafael C. González,et al.  Digital image processing using MATLAB , 2006 .

[33]  Yicong Zhou,et al.  Image encryption algorithms based on Generalized P-Gray Code bit plane decomposition , 2009, 2009 Conference Record of the Forty-Third Asilomar Conference on Signals, Systems and Computers.

[34]  B. Subramanyan,et al.  Image Encryption Based on AES Key Expansion , 2011, 2011 Second International Conference on Emerging Applications of Information Technology.

[35]  Rabab Kreidieh Ward,et al.  The generalized Fibonacci transformations and application to image scrambling , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.