We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

A New Technique for Image Encryption using RIJNDAEL Block Cipher Algorithms

by J. Mahalakshmi, K. Kuppusamy
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 45 - Number 11
Year of Publication: 2012
Authors: J. Mahalakshmi, K. Kuppusamy
10.5120/6822-9233

J. Mahalakshmi, K. Kuppusamy . A New Technique for Image Encryption using RIJNDAEL Block Cipher Algorithms. International Journal of Computer Applications. 45, 11 ( May 2012), 7-10. DOI=10.5120/6822-9233

@article{ 10.5120/6822-9233,
author = { J. Mahalakshmi, K. Kuppusamy },
title = { A New Technique for Image Encryption using RIJNDAEL Block Cipher Algorithms },
journal = { International Journal of Computer Applications },
issue_date = { May 2012 },
volume = { 45 },
number = { 11 },
month = { May },
year = { 2012 },
issn = { 0975-8887 },
pages = { 7-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume45/number11/6822-9233/ },
doi = { 10.5120/6822-9233 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:37:20.624398+05:30
%A J. Mahalakshmi
%A K. Kuppusamy
%T A New Technique for Image Encryption using RIJNDAEL Block Cipher Algorithms
%J International Journal of Computer Applications
%@ 0975-8887
%V 45
%N 11
%P 7-10
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Visual Encryption is most important in transferring image through the communication networks to protect it against reading, alternation of its content, adding false information or deleting part of its content. The block cipher Rijndael algorithm is used to encrypt and decrypt an image with a variable block length, and a variable key length. This paper focused on the quality measurements such as the speed, Encryption Ratio, Correlation Coefficient, Visual Degradation, and Compression Friendliness of the JPEG image encryption with the existing bitmap image encryption. Since, the JPEG files are of compressed format, the compression friendliness is measured here. The result ends with the comparison of performance parameters, based on the type of file formats.

References
  1. B. Gladman, "A Specification for Rijndael, the AES algorithm",May 2003, http://fp. gladman. plus. com/Cryptography_technology/rijndeal/aes. spec. 311. pdf.
  2. H. Elkam Chouchi and M. A. Makar, "Measuring Encryption Quality of Bitmap Images Encrypted with Rijndael and Kamkar block ciphers", Twenty Second National Radio Science Conference CNRS(2005), PP. C11, Cairo, Egypt, March 15-17, 2005.
  3. Giuseppe Mastronardi, Marcello Castellano, Francescomaria Marino, "Steganography Effects in Various Formats of Images. A Preliminary Study," International Workshop on Intelligent dataAcquisition and Advanced Computing Systems: Technology and Applications, pp. 116-119, 2001
  4. Howard Cheng and Xiaobo Li, "Partial Encryption of Compressed Images and videos", "IEEE Transaction on Signal Processing", Vol. 48, No. 8, August 2000, PP 2439-2451.
  5. S. Lian,"Multimedia Content Encryption: Techniques and Applications", CRC, 2008.
  6. Lisa M. Marvel and Charles T. Retter, "A Methodlogy for Data Hiding using Images," IEEE conference on Military communication, vol. 3, Issue. 18-21, pp. 1044-1047, 1998.
  7. J. W. Lee, T. Chen and C. Chien Lee, "Improvement of an Image encryption scheme for binary Images", Pakistan Journal of Information and Technology, Vol. 2, no. 2,2003 PP. 191-200.
  8. A. Mitra, Y. V. SubbaRao and S. R. M. Prasanna, "A new image encryption approach using, combinational permutation techniques", Journal of computer Science, Vol. 1, no. 1, 2006, PP 127.
  9. Nawal El –Fishaway, And Osama M. Abu Zaid, "Quality of Encryption Measurement of Bitmap Images with RC6, MRC6 and Rijndael Block Cipher Algorithms", in International Journal of Network Security, Vol. 5, No. 3, PP. 241-251, Nov 2007.
  10. Neil F. Johnson and Sushil Jajodia,1998,, "Steganalysis: The Investigation of Hidden Information," IEEEconference on Information Technology, pp. 113-116, 1998
  11. I. Ozturk and I. Sogukpmar, "Analysis and Comparision of Image encryption Algorithms", Transactions on Engineering, Computing and Technology, Vol. 3, PP. 1305-1313, 2004
  12. V. Potdar and E. chang, "Disguising text cryptography using Image cryptography", International Network Conference in plumouth , UK, 6-9, July, 2004.
  13. M. Van Droogenbroeck and R. Benedett, "Techniques for a Selective encryption of uncompressed and compressed images", in proceedings of Advanced Concepts for Intelligent Vision Systems (ACIVS) Ghent, Belgium, September 9-11, 2002, PP. 90-97.
Index Terms

Computer Science
Information Sciences

Keywords

Visual Encryption Block Cipher Encryption Jpeg Encryption Ratio Compression Friendliness