A Novel Cryptographic Encryption Technique for Securing Digital Images in the Cloud Using AES and RGB Pixel Displacement

In today's cyberspace, Information security plays an active role in ensuring confidentiality, integrity, and authenticity of data transmission or storage. One of the foremost fears with the rapid increment of adoption of data storage in the cloud environment is data security. Media contents such as images and video recordings needed to be highly encrypted without any loss of information during the encryption and the decryption process. Contents such as medical images, surveillance images, personal photos, etc needed to be well protected. This paper proposes a hybrid approach of encryption of images using an Advanced Encryption Standard (AES) and an RGB cryptographic technique. The Method made use of AES for the generation of a shared secret key which is then used by the visual cryptographic algorithm for the encryption process. The encryption is done solely based on RGB pixel shuffling and displacement. At the end of the process, there was no pixel expansion hence there was no loss in image quality. The programming and simulation of the processes as well as the analysis of the results were done using MATLAB.

[1]  Panagiotis Kalagiakos,et al.  Cloud Computing learning , 2011, 2011 5th International Conference on Application of Information and Communication Technologies (AICT).

[2]  D. Manimegalai,et al.  A secure software implementation of nonlinear AES S-box with the enhancement of biometrics , 2012, 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET).

[3]  Ruby B. Lee,et al.  Characterizing hypervisor vulnerabilities in cloud computing servers , 2013, Cloud Computing '13.

[4]  Wen-Guey Tzeng,et al.  A New Approach for Visual Cryptography , 2002, Des. Codes Cryptogr..

[5]  Khalfan AlMarashda,et al.  On the security of inclusion or omission of MixColumns in AES cipher , 2011, 2011 International Conference for Internet Technology and Secured Transactions.

[6]  R. V. Kshirsagar,et al.  FPGA Implementation of High Speed VLSI Architectures for AES Algorithm , 2012, 2012 Fifth International Conference on Emerging Trends in Engineering and Technology.

[7]  Marine Minier,et al.  A Collision Attack on 7 Rounds of Rijndael , 2000, AES Candidate Conference.

[8]  W. Wan,et al.  Research and realization based on hybrid encryption algorithm of improved AES and ECC , 2010, 2010 International Conference on Audio, Language and Image Processing.

[9]  Zhi Zhou,et al.  Halftone visual cryptography , 2006, IEEE Transactions on Image Processing.

[10]  Cheng-Wen Wu,et al.  Single- and Multi-core Configurable AES Architectures for Flexible Security , 2010, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[11]  Debdeep Mukhopadhyay,et al.  A Differential Fault Analysis on AES Key Schedule Using Single Fault , 2011, 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography.

[12]  Noémie Floissac,et al.  From AES-128 to AES-192 and AES-256, How to Adapt Differential Fault Analysis Attacks on Key Expansion , 2011, 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography.

[13]  K. M. Koumadi,et al.  Cryptographie technique for image encryption based on the RGB pixel displacement , 2012, 2012 IEEE 4th International Conference on Adaptive Science & Technology (ICAST).

[14]  Gábor Erdélyi,et al.  Quantum cryptography: A survey , 2007, CSUR.

[15]  Serge Vaudenay,et al.  Proving the Security of AES Substitution-Permutation Network , 2005, Selected Areas in Cryptography.

[16]  Feng Liu,et al.  Improving the visual quality of size invariant visual cryptography scheme , 2012, J. Vis. Commun. Image Represent..

[17]  Chong Hee Kim,et al.  Differential Fault Analysis against AES-192 and AES-256 with Minimal Faults , 2010, 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography.

[18]  Mengmeng Wang,et al.  Digital image encryption algorithm based on pixels , 2010, 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems.

[19]  Heung-Kyu Lee,et al.  Color Extended Visual Cryptography Using Error Diffusion , 2011, IEEE Transactions on Image Processing.

[20]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[21]  Habibullah Jamal,et al.  An 8-bit systolic AES architecture for moderate data rate applications , 2009, Microprocess. Microsystems.

[22]  A. Goel,et al.  A Technique for Image Encryption Based on Explosive n*n Block Displacement Followed by Inter-pixel Displacement of RGB Attribute of a Pixel , 2012, 2012 International Conference on Communication Systems and Network Technologies.

[23]  Wen-Ai Jackson,et al.  Projective aspects of the AES inversion , 2007, Des. Codes Cryptogr..

[24]  M.B. Vishnu,et al.  Security enhancement of digital motion image transmission using hybrid AES-DES algorithm , 2008, 2008 14th Asia-Pacific Conference on Communications.

[25]  Feng Liu,et al.  Colour visual cryptography schemes , 2008, IET Inf. Secur..

[26]  T. Jamil The Rijndael algorithm , 2004, IEEE Potentials.

[27]  Farzad Sabahi,et al.  Cloud computing security threats and responses , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.

[28]  Xiang Li,et al.  The architecture design of micro-learning platform based on cloud computing , 2011, ICCC '11.