Image Encryption based on AES Algorithm and XOR Operation

Authors

  • Veman Ashqi Saeed Technical College of Administration, Information Technology Management Department, Duhok, Kurdistan Region of Iraq
  • Bareen Haval Sadiq Technical Collage of Administration, Duhok Polytechnic University, KRG - Iraq

DOI:

https://doi.org/10.25007/ajnu.v12n3a1643

Abstract

Sending digital pictures across open networks has emerged as a major privacy risk in recent years. Despite the environment's adaptability and the many benefits it offers, there are, however, a significant number of threats to one's privacy and safety. A great number of cryptosystems have been proposed in the literature on picture encryption in an effort to make communication more secure.  For the purpose of data transmission, the AES algorithm is utilized due to the increased efficiency it offers in the block. This paper proposes image encryption techniques based on the AES algorithm and Henon map. The plain image has been encrypted using the AES algorithm at the first step. Then, the Henon map is used to generate a random key which is required to provide the second step of encryption. This step of encryption has been performed using the XOR operation. The results of the studies demonstrate that the strategy proposed resolves the issues that are present in conventional techniques of encryption.   The histogram of the encryption picture is consistently spaced despite being different from the histogram of the original image. The recommended approach is extremely sensitive to the key value; even minute adjustments result in a distinct visual representation. As a result, apps that provide real-time picture encryption while operating over unsecured networks are suitable for the unique technique.

Downloads

Download data is not yet available.

References

Wu, J.; Liao, X.; Yang, B. Color image encryption based on chaotic systems and elliptic curve ElGamal scheme. Signal Process. 2017, 141, 109–124.

Amigo, J.M.; Kocarev, L.; Szczepanski, J. Theory and practice of chaotic cryptography. Phys. Lett. A 2007, 366,211–216.

Jakimoski, G.; Kocarev, L. Chaos and cryptography: Block encryption ciphers based on chaotic maps. IEEE Trans.Circuits Syst. I Fundam. Theory Appl. 2001, 48, 163–169.

Cao, C.; Sun, K.; Liu, W. A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map. SignalProcess. 2018, 143, 122–133.

Padate, R., & Patel, A. (2015). Image encryption and decryption using AES algorithm. International Journal of Electronics and Communication Engineering & Technology, 23-29.

Mellu, P., & Mali, S. (2011), AES: Asymmetric key cryptographic System II, International Journal of Information Technology and Knowledge Management, 4(1), 113-117.

Adi Shamir Ronald Rivest and Len Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, 21:120–126, 1978.

Zhang, Y.; Li, X.; Hou, W. A fast image encryption scheme based on AES. In Proceedings of the 2nd International Conference on Image, Vision and Computing (ICIVC), Chengdu, China, 2–4 June 2017; pp. 624–628.

Priya, S.; Santhi, B. A Novel Visual Medical Image Encryption for Secure Transmission of Authenticated Watermarked Medical Images. Mob. Netw. Appl. 2021, 26, 2501–2508.

Alsaffar, D. M., Almutiri, A. S., Alqahtani, B., Alamri, R. M., Alqahtani, H. F., Alqahtani, N. N., & Ali, A. A. (2020, March). Image encryption based on AES and RSA algorithms. In 2020 3rd International Conference on Computer Applications & Information Security (ICCAIS) (pp. 1-5). IEEE.

Bahrami et al, 2013. "encryption of multimedia content in partial encryption scheme of DCT transform coeffiecent using a light weight stream algorithm," optik, Elsevier, pp. 3693-3700.

Singh, A., Agarwal, P., & Chand, M. (2019, April). Image encryption and analysis using dynamic AES. In 2019 5th international conference on optimization and applications (ICOA) (pp. 1-6). IEEE.

Priynka Sharma, “A new image encryption using modified AES algorithm and its comparison with AES”, international journal of engineering research of technology (IJERT), vol.9, no. 8, august 2020.

Abhinav Gupta1 and Aayush Gupta, “A New Technique of Image Encryption using Modified AES Algorithm”, International Journal of Multidisciplinary Innovative Research. ISSN: 2583-0228 vol. 1, no.1, pp. 34-43, Jul’ 2021.

Sarah Jassim and Sarab M. Hameed, “A Modified Advanced Encryption Standard for Color Images”, Iraqi Journal of Science, vol. 63, no. 1, pp. 294-312, 2022.

Moumen, A., & Sissaoui, H. (2017). Images encryption method using steganographic LSB method, AES and RSA algorithm. Nonlinear Engineering, 6(1), 53-59.

M. He ́non, “A two-dimensional mapping with a strange attrac- tor,” Communications in Mathematical Physics, vol. 50, no. 1, pp. 69–77, 1976.

E. Lorenz, “Deterministic nonperiodic flow,” Journal of Atmo- spheric Sciences, vol. 20, no. 2, pp. 130–141, 1963.

Tamimi, A. A., & Abdalla, A. M. (2015). An image encryption algorithm with XOR and S-box. In Proceedings of the International Conference on Image Processing, Computer Vision, and Pattern Recognition (IPCV) (p. 166). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp).

C. Unal, K. Sezgin, P. Ihsan and Z. Ahmet, “Secure image encryption algorithm design using a novel chaos based S-Box,” Chaos, Solitons and Fractals, vol. 95, pp. 92-101, 2017.

Published

2023-08-30

How to Cite

Ashqi Saeed, V., & Haval Sadiq, B. (2023). Image Encryption based on AES Algorithm and XOR Operation. Academic Journal of Nawroz University, 12(3), 533–539. https://doi.org/10.25007/ajnu.v12n3a1643

Issue

Section

Articles