A Modified AES Based Algorithm for Image Encryption

With the fast evolution of digital data exchange, security information becomes much important in data storage and transmission. Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. In this paper, we analyze the Advanced Encryption Standard (AES), and we add a key stream generator (A5/1, W7) to AES to ensure improving the encryption performance; mainly for images characterised by reduced entropy. The implementation of both techniques has been realized for experimental purposes. Detailed results in terms of security analysis and implementation are given. Comparative study with traditional encryption algorithms is shown the superiority of the modified algorithm.




References:
[1] N. Bourbakis, A. Dollas, Scan-based compression-encryption hiding for
video on demand. IEEE Multimedia Mag. 10, 79-87, 2003.
[2] A. Canteaut and E. Filiol, "Ciphertext Only Reconstruction of LFSRbased
Stream Ciphers ", Institut national de recherche en informatique et
en automatique (INRIA), Technical report No 3887, Feb. 2000 Theme
2.
[3] H. Cheng, L. Xiaobo, Partial encryption of compressed images and
videos. IEEE Trans. Signal Process. 48 (8), 2439-2451, 2000.
[4] J. Daemen, V. Rijmen, "The block cipher Rijindael", Proceedings of the
Third International Conference on smart card Research and
Applications, CARDIS-98, Lecture Notes in computer Science, vol.1820,
Springer, Berlin, 2000, pp.277_284.
[5] N. Ferguson, J. Kelsey, S. Lucks, B. Schneier, M. Stay, D. Wagner, D.
Wagner, and D. Whiting. Improved cryptanalysis of Rijndael. In Bruce
Schneier, editor, Proceedings of Fast Software Encryption - FSE-00,
number 1978 in Lecture Notes in Computer Science, pages 213-230.
Springer-Verlag, 2000.
[6] Federal Information Processing Standards Publications (FIPS 197),
"Advanced Encryption Standard (AES) ", 26 Nov. 2001.
[7] K. Gaj, P.Chodowiec, "Fast implementation and fair comparison of the
final candidates for advanced encryption standard using field
programmable gate arrays", in : CT-RSA 2001, pp.84-99.
[8] M.D. Galanis, P. Kitsos, G. Kostopoulos, N. Sklavos, O. Koufopavlou,
and C.E. Goutis, "Comparison of the hardware architectures and FPGA
implementations of stream ciphers" in Proceedings of 11th IEEE
International Conference on Electronics, Circuits and Systems
(ICECS'04), Dec. 13-15, 2004.
[9] J.J. Amador, R. W.Green "Symmetric-Key Block Cipher for Image and
Text Cryptography": International Journal of Imaging Systems and
Technology, No. 3, 2005, pp. 178-188.
[10] H. Gilbert, M. Minier. A collision attack on 7 rounds of Rijndael. In The
third Advanced Encryption Standard Candidate Conference, pages 230-
241, NIST, April 2000. See http://www.nist.gov/aes.
[11] A. Hodjat, I. Verbauwhede, "A 21.54 Gbits/s Fully Pipelined AES
Processor on FPGA". Proceedings of the 12th Annual IEEE Symposium
on Field-Programmable Custom Computing Machines (FCCM-04).
[12] K. Janvinen, M. Tominisko, J. Skytta, "A fully pipelined memorlyess 17,
8 Gpbs AES-128 encryptor", in International symposium of Field
programmable Gate arrays, 2003, pp.207-215.
[13] S.S. Maniccama, N.G. Bourbakis, "Image and video encryption using
SCAN patterns", in Pattern Recognition 37 (2004), pp 725 - 737.
[14] L.M. Marvel, G.G. Boncelet, C.T. Retter, Spread spectrum image
steganography, IEEE Trans. Image Process, 8 (8), 1075-1083, 1999.
[15] M. Mclone, J.V. McCanny, "Rijindael FPGA implementations utilizing
look-up tables", J.VLSI signal process, syst. 34(3)(2003)261-275.
[16] R. C.-W. Phan, "Impossible differential cryptanalysis of 7-round
Advanced Encryption Standard (AES)", Information processing letters
91(2004) 33-38.
[17] B. Schneier, Applied Cryptography: Protocols, Algorithms and Source
Code in C. John Wiley and Sons, 1996.
[18] C.E. Shannon, "Communication theory of secrecy system", Bell syst
Tech,, 1949; 28; 656-715.
[19] L. Shiguo, S. Jinsheny, W. Zhiquan, "A block cipher based a suitable of
the chaotic standard map", chaos, solutions and fractals 26(2005) 117-
129.
[20] L. Shujun, Z. Xuan, M. Xuanqin, C. Yuanlong, "chaotic encryption
scheme for real time digital video", SPIE vol.4666,p.149-160, Real-Time
Imaging, March 2002.