Skip to main content
Log in

High Definition Image Encryption Algorithm Based on AES Modification

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In this article, a high-speed and highly restricted encryption algorithm is proposed to cipher high-definition (HD) images based on the modified advanced encryption standard (AES) algorithm. AES is a well-known block cipher algorithm and has several advantages, such as high-level security and implementation ability. However, AES has some drawbacks, including high computation costs, pattern appearance, and high hardware requirements. The aforementioned problems become more complex when the AES algorithm ciphers an image, especially HD images. Three modifications are proposed in this paper to improve AES algorithm performance through, decreasing the computation costs, decreasing the hardware requirements, and increasing the security level. First, modification was conducted using MixColumn transformation in 5 rounds instead of 10 rounds in the original AES-128 to decrease the encryption time. Security is enhanced by improving the key schedule operation by adding MixColumn transformation to this operation as second modification. In addition, to decrease the hardware requirements, S-box and Inv. S-box in the original AES are replaced by one simple S-box used for encryption and decryption in the proposed method. The proposed AES version conducts one of the ciphering modes to solve the appearance pattern problem. Experimental results indicate that the proposed modifications to the AES algorithm made the algorithm more compatible with HD image encryption.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. Jong-Wook, H., Choon-Sik, P., Dae-Hyun, R., & Eun-Soo, K. (1999). Optical image encryption based on XOR operations. Optical Engineering, 38(1), 47–54.

    Article  Google Scholar 

  2. Daesung, M., Yongwha, C., Sung, P., Kiyoung, M., & Kyo, C. (2006). An efficient selective encryption of fingerprint images for embedded processors. ETRI Journal, 28(4), 444–452.

    Article  Google Scholar 

  3. Shahram, B., & Mohammad, E. (2013). Chaotic image encryption system using phase-magnitude transformation and pixel substitution. Telecommunication Systems, 52(2), 525–537.

    Google Scholar 

  4. Nanrun, Z., Yixian, W., & Lihua, G. (2011). Novel optical image encryption scheme based on fractional Mellin transform. Optics Communications, 284(13), 3234–3242.

    Article  Google Scholar 

  5. Fan, G., Linfei, C., & Daomu, Z. (2008). A half-blind color image hiding and encryption method in fractional Fourier domains. Optics Communications, 281(17), 4254–4260.

    Article  Google Scholar 

  6. Shahram, B. (2000). Speech encryption based on fast Fourier transform permutation. In 7th IEEE international conference on electronics, circuits and systems. Jounieh, Lebanon.

  7. Zhengjun, L., Lie, X., Ting, L., Hang, C., Pengfei, L., Chuang, L., et al. (2011). Color image encryption by using Arnold transform and color-blend operation in discrete cosine transform domains. Optics Communications, 284(1), 123–128.

    Article  Google Scholar 

  8. Hsuan, C., Hone-Ene, H., & Cheng-Ling, L. (2011). Position multiplexing multiple-image encryption using cascaded phase-only masks in Fresnel transform domain. Optics Communications, 284(18), 4146–4151.

    Article  Google Scholar 

  9. Hwang, H. (2011). An optical image cryptosystem based on Hartley transform in the Fresnel transform domain. Optics Communications, 284(13), 3243–3247.

    Article  Google Scholar 

  10. Akhshani, A., Behnia, S., Akhava, A., Abu Hassan, H., & Hassan, Z. (2010). A novel scheme for image encryption based on 2D piecewise chaotic maps. Optics Communications, 283(17), 3259–3266.

    Article  Google Scholar 

  11. Fu, C., Lin, B., Miao, Y., Xiao, L., & Jun-jie, C. (2011). A novel chaos-based bit-level permutation scheme for digital image encryption. Optics Communications, 284(23), 5415–5423.

    Article  Google Scholar 

  12. Liu, H., & Wang, X. (2011). Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Optics Communications, 284(16–17), 3895–3903.

    Article  Google Scholar 

  13. Akhavan, A., Samsudin, A., & Akhshani, A. (2011). A symmetric image encryption scheme based on combination of nonlinear chaotic maps. Journal of the Franklin Institute, 348(8), 1797–1813.

    Article  MathSciNet  Google Scholar 

  14. Ruisong, Y. (2011). A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism. Optics Communications, 284(22), 5290–5298.

    Article  Google Scholar 

  15. Zhi-liang, Z., Wei, Z., Kwok-wo, W., & Hai, Y. (2011). A chaos-based symmetric image encryption scheme using a bit-level permutation. Information Sciences, 181(6), 1171–1186.

    Article  Google Scholar 

  16. Alexander, P., & Massimiliano, Z. (2012). Chaotic map cryptography and security. In Encryption: methods, software and security (pp. 301–332). Nova Science Publishers.

  17. Jiancheng, Z., Rabab, W., & Dongxu, Q. (2004). A new digital image scrambling method based on Fibonacci numbers. In International conference on circuits and systems, Vancouver, Canada.

  18. Jiancheng, Z., Rabab, W., & Dongxu, Q. (2004). The generalized Fibonacci transformations and application to image scrambling. In IEEE international conference on acoustics, speech, and signal processing, Montreal, Canada.

  19. Linfei, C., Daomu, Z., & Fan, G. (2013). Image encryption based on singular value decomposition and Arnold transform in fractional domain. Optics Communications, 291, 98–103.

    Article  Google Scholar 

  20. Qiudong, S., Wenying, Y., Jiangwei, H., & Wenxin, M. (2012). Image encryption based on bit-plane decomposition and random scrambling. In 2nd International conference on consumer electronics, communications and networks, Hubei, China.

  21. Yicong, Z., Karen, P., & Sos, A. (2009). Image encryption algorithms based on generalized P-Gray code bit plane decomposition. In Conference record of the forty-third Asilomar conference on signals, systems and computers, CA, USA.

  22. Zheng, W., Cheng, Z., & Cui, Y. (2008). Image data encryption and hiding based on wavelet packet transform and bit planes decomposition. In 4th International conference on wireless communications, networking and mobile computing, Dalian, China.

  23. Nandi, S., Kar, B., & Chaudhuri, P. (1994). Theory and applications of cellular automata in cryptography. IEEE Transactions on Computer, 43(12), 1346–1357.

    Article  Google Scholar 

  24. FIPS PUB 46-3: Data encryption standard (DES), 1999.

  25. Daemen, J., & Rijmen, V. (2000). The block cipher Rijndael. In: Smart card research and applications. Lecture notes in computer science (pp. 277–284). Berlin: Springer.

  26. Kamali, S., Shakerian, R., Hedayati, M., & Rahmani, M. (2010). A new modified version of advanced encryption standard based algorithm for image encryption. In International conference on electronics and information engineering, Kyoto, Japan.

  27. Grangetto, M., Magli, E., & Olmo, G. (2006). Multimedia selective encryption by means of randomized arithmetic coding. IEEE Transactions on Multimedia, 8(5), 905–917.

    Article  Google Scholar 

  28. Wadi, S., & Zainal, N. (2013). A low cost implementation of modified advanced encryption standard algorithm using 8085A microprocessor. Journal of Engineering Science and Technology, 8(4), 406–415.

    Google Scholar 

  29. Huang C. W., Tu Y. H., Yeh H. C., Liu S. H., & Chang C. J. (2011). Image observation on the modified ECB operations in Advanced Encryption Standard. In International conference in information society (i-Society), London, UK.

  30. Subramanyan, B., Chhabria, V. M., & Sankarbabu, T. G. (2011). Image encryption based on AES key expansion. In IEEE computer society meeting, Kolkata, India.

  31. Fahad, M. (2013). Chaotic and AES cryptosystem for satellite imagery. Telecommunication Systems, 52(2), 573–581.

    Google Scholar 

  32. Tran M. T., Bui D. K., & Duong A. D. (2008). Gray S-box for advanced encryption standard. In IEEE computer society meeting, Suzhou, China.

  33. Yicheng, C., Xuecheng, Z., Zhenglin, L., Xiaofei, C., & Yu, H. (2008). Dynamic inhomogeneous S-Boxes design for efficient AES masking mechanisms. The Journal of China Universities of Posts and Telecommunications, 15(2), 72–76.

    Article  Google Scholar 

  34. Bouillaguet, C., Derbez, P., Dunkelman, O., Fouque, P., Keller, N., & Rijmen, V. (2012). Low-data complexity attacks on AES. IEEE Transaction on Information Theory, 58(11), 7002–7017.

    Article  MathSciNet  Google Scholar 

  35. Dunkelman, O., & Keller, N. (2010). The effects of the omission of last rounds mixcolumns on AES. Information Processing Letters, 110(8–9), 304308.

    MathSciNet  Google Scholar 

  36. Announcing the Advanced Encryption Standard (AES), Federal Information Processing Standards Publication 197, 26 of November, 2001.

  37. Gonzalez, R., Woods, E., & Eddins, L. (2008). Digital image processing using Matlab. NJ: Gatesmark LLC.

    Google Scholar 

Download references

Acknowledgments

The authors would like to thank the editor-in-chief and anonymous reviewers for helpful comments and suggestions that improved the quality and readability of the paper. The authors would also like to thank Universiti Kebangsaan Malaysia for supporting this work under UKM-GUP-2011-060 grant funds. Also the corresponding author would like to thanks the Foundation of Technical Education-Baghdad for supporting him by 7-17-20066 Grant scholarship.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Salim Muhsin Wadi.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wadi, S.M., Zainal, N. High Definition Image Encryption Algorithm Based on AES Modification. Wireless Pers Commun 79, 811–829 (2014). https://doi.org/10.1007/s11277-014-1888-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-014-1888-7

Keywords

Navigation