You are on page 1of 4

Image Encryption Based On AES Key Expansion

AIM: The main aim of the project is to design and implement Image Encryption Based On AES Key Expansion. ABSTRACT: The relentless growth of Internet and communication technologies has made the extensive use of images unavoidable. The specific characteristics of image like high transmission rate with limited bandwidth, redundancy, bulk capacity and correlation among pixels makes standard algorithms not suitable for image encryption. In order to overcome these limitations for real time applications, design of new algorithms that require less computational power while preserving a sufficient level of security has always been a subject of interest. This paper proposes an algorithm based on A ! "ey xpansion in which the encryption process is a bit wise exclusive or operation of a set of image pixels along with the a #$% bit key which changes for every set of pixels . The keys to be used are generated independently at the sender and receiver side based on A ! "ey xpansion process hence the initial key is alone shared rather than sharing the whole set of keys. The algorithm has been experimented with standard bench mark images proposed in &!'(!I)I database. xperimental results and security analysis of the proposed algorithm shows that the proposed algorithm offers good resistance against brute force attack, key sensitivity tests and statistical crypt analysis

V.Mallikarjuna (Project manager)

ISO: 9001- 2008 CERTIFIED COMPANY


Na'()r

Mobile No: +91-8297578555. Branch !: "#$ ra%a$ &

B OCK !IA"RAM:

*ig+ ,lock diagram for encryption and decryption process

TOO S: -ilinx ..$I! , /odelsim 0.1c.


V.Mallikarjuna (Project manager)

ISO: 9001- 2008 CERTIFIED COMPANY


Na'()r

Mobile No: +91-8297578555. Branch !: "#$ ra%a$ &

A## ICATIO$ A!%A$TA"ES: The proposed algorithm offers high encryption quality with minimal memory requirement and computational time. The key sensitivity and key space of the algorithm is very high which makes it resistant towards ,rute force attack and statistical cryptanalysis of original and encrypted images. The time taken for encryption is relatively less in comparison with the algorithms proposed in the literature. RE&ERE$CES: '.2."uo, 3ovel image ncryption Technique and its application in

progressive transmission. 2ournal of lectron imaging $1 #..4 pp 415(45#. 3.2.,ourbakis , '.Alexopoulos, )icture data encryption using !'A3 patterns. )attern 6ecognition $50 #..$ pp507 (5%#. 'hin('hen 'hang, /in(!hian 8wang, Tung(!hou 'hen, 9A new encryption algorithm for image cryptosystems:, The 2ournal of !ystems and !oftware 5% ;$<<#=, %4(.#. *ridrich 2iri, !ymmetric ciphers based on two dimensional chaotic maps, Int. 2. ,ifurcat 'haos % ;#..%= ;0=, pp. #$5.>#$%1. 2. !charinger, *ast encryption of image data using chaotic "olmogrov flow, 2. lectronic ng 7 ;#..%= ;$=, pp. 4#%>4$5.
V.Mallikarjuna (Project manager)

ISO: 9001- 2008 CERTIFIED COMPANY


Na'()r

Mobile No: +91-8297578555. Branch !: "#$ ra%a$ &

V.Mallikarjuna (Project manager)

ISO: 9001- 2008 CERTIFIED COMPANY


Na'()r

Mobile No: +91-8297578555. Branch !: "#$ ra%a$ &

You might also like