A NEW APPROACH FOR THE IMAGE ENCRYPTION USING AES CIPHER IN ECB MODE
Main Article Content
Abstract
The field of secure digital communication and data security has placed significant emphasis on the issue of image encryption. The present work introduces a unique methodology for improving image encryption by utilizing the Advanced Encryption Standard (AES) cipher in the Electronic Codebook (ECB) mode. The suggested methodology leverages the inherent resilience of AES while integrating a novel DNA-segment-based augmentation to reinforce the encryption process. This technique aims to mitigate the constraints associated with the Electronic Codebook (ECB) mode in picture encryption, with the ultimate goal of attaining an elevated standard of security and confidentiality. The efficacy of the suggested methodology is assessed through extensive experimentation, illuminating its potential to offer a sophisticated kind of image encryption that is well-suited for contemporary data security concerns.
Downloads
Metrics
Article Details
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.
References
K. D. Patel and S. Belani, "Image encryption using different techniques: A review," International Journal of Emerging Technology and Advanced Engineering, vol. 1, pp. 30-34, 2011.
M. Kaur and V. Kumar, "A comprehensive review on image encryption techniques," Archives of Computational Methods in Engineering, vol. 27, pp. 15-43, 2020.
M. Zeghid, M. Machhout, L. Khriji, A. Baganne, and R. Tourki, "A modified AES based algorithm for image encryption," International Journal of Computer and Information Engineering, vol. 1, pp. 745-750, 2007.
S. M. Wadi and N. Zainal, "High definition image encryption algorithm based on AES modification," Wireless personal communications, vol. 79, pp. 811-829, 2014.
S. De and J. Bhaumik, "An aes-based robust image encryption scheme," International Journal of Computer Applications, vol. 109, pp. 29-34, 2015.
J. Watada and R. binti abu Bakar, "DNA computing and its applications," in 2008 Eighth international conference on intelligent systems design and applications, 2008, pp. 288-294.
V. Kolate and R. Joshi, "An information security using DNA cryptography along with AES algorithm," Turkish Journal of Computer and Mathematics Education, vol. 12, pp. 183-192, 2021.
M. Sabry, M. Hashem, T. Nazmy, and M. E. Khalifa, "Design of DNA-based advanced encryption standard (AES)," in 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS), 2015, pp. 390-397.
J. Kh-Madhloom, M. K. A. Ghani, and M. R. Baharon, "ECG Encryption Enhancement Technique with Multiple Layers of AES and DNA Computing," Intelligent Automation & Soft Computing, vol. 28, 2021.
K. Sajisha and S. Mathew, "An encryption based on DNA cryptography and steganography," in 2017 international conference of electronics, communication and aerospace technology (ICECA), 2017, pp. 162-167.
Q. S. Alsaffar, H. N. Mohaisen, and F. N. Almashhdini, "An encryption based on DNA and AES algorithms for hiding a compressed text in colored Image," in IOP Conference Series: Materials Science and Engineering, 2021, p. 012048.
S. Sadeg, M. Gougache, N. Mansouri, and H. Drias, "An encryption algorithm inspired from DNA," in 2010 International Conference on Machine and Web Intelligence, 2010, pp. 344-349.
A. Kumar, "Data Security and Privacy using DNA Cryptography and AES Method in Cloud Computing," in 2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), 2021, pp. 1529-1535.
P. Radhadevi and P. Kalpana, "Secure image encryption using AES," International Journal of Research in Engineering and Technology, vol. 1, pp. 115-117, 2012.
I. Ozturk and I. Sogukpinar, "Analysis and comparison of image encryption algorithms," International Journal of Information Technology, vol. 1, pp. 108-111, 2004.
S. Heron, "Advanced encryption standard (AES)," Network Security, vol. 2009, pp. 8-12, 2009.
A. M. Abdullah, "Advanced encryption standard (AES) algorithm to encrypt and decrypt data," Cryptography and Network Security, vol. 16, p. 11, 2017.
D. Blazhevski, A. Bozhinovski, B. Stojchevska, and V. Pachovski, "Modes of operation of the AES algorithm," 2013.
S. Almuhammadi and I. Al-Hejri, "A comparative analysis of AES common modes of operation," in 2017 IEEE 30th Canadian conference on electrical and computer engineering (CCECE), 2017, pp. 1-4.
J. A. Artiles, D. P. Chaves, and C. Pimentel, "Image encryption using block cipher and chaotic sequences," Signal processing: image communication, vol. 79, pp. 24-31, 2019.
B. Schneier, "Algorithm Types and Modes," Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C, pp. 189-211, 2015.
H. S. Mohan and A. R. Reddy, "Revised aes and its modes of operation," International Journal of Information Technology, vol. 5, pp. 31-36, 2012.
C.-W. Huang, Y.-H. Tu, H.-C. Yeh, S.-H. Liu, and C.-J. Chang, "Image observation on the modified ECB operations in Advanced Encryption Standard," in International Conference on Information Society (i-Society 2011), 2011, pp. 264-269.
M. Hassan and M. Hussein, "NETWORK SECURITY BY BLOCK CIPHERS," Journal of Al-Azhar University Engineering Sector, vol. 15, pp. 981-991, 2020.
B. T. Hammad, A. M. Sagheer, I. T. Ahmed, and N. Jamil, "A comparative review on symmetric and asymmetric DNA-based cryptography," Bulletin of Electrical Engineering and Informatics, vol. 9, pp. 2484-2491, 2020.
A. Gehani, T. LaBean, and J. Reif, "DNA-based cryptography," Aspects of molecular computing: essays dedicated to tom head, on the occasion of his 70th birthday, pp. 167-188, 2004.
S. Cresci, R. Di Pietro, M. Petrocchi, A. Spognardi, and M. Tesconi, "Exploiting digital DNA for the analysis of similarities in Twitter behaviours," in 2017 IEEE International Conference on Data Science and Advanced Analytics (DSAA), 2017, pp. 686-695.
A. JarJar, "Two advanced classics exploiting DNA and RNA characteristics to encrypt a color image," Multimedia Tools and Applications, vol. 80, pp. 24603-24629, 2021.
H. Liu and X. Wang, "Image encryption using DNA complementary rule and chaotic maps," Applied Soft Computing, vol. 12, pp. 1457-1466, 2012.
X.-Y. Wang, P. Li, Y.-Q. Zhang, L.-Y. Liu, H. Zhang, and X. Wang, "A novel color image encryption scheme using DNA permutation based on the Lorenz system," Multimedia Tools and Applications, vol. 77, pp. 6243-6265, 2018.