Abstract
In this article, a high-speed and highly restricted encryption algorithm is proposed to cipher high-definition (HD) images based on the modified advanced encryption standard (AES) algorithm. AES is a well-known block cipher algorithm and has several advantages, such as high-level security and implementation ability. However, AES has some drawbacks, including high computation costs, pattern appearance, and high hardware requirements. The aforementioned problems become more complex when the AES algorithm ciphers an image, especially HD images. Three modifications are proposed in this paper to improve AES algorithm performance through, decreasing the computation costs, decreasing the hardware requirements, and increasing the security level. First, modification was conducted using MixColumn transformation in 5 rounds instead of 10 rounds in the original AES-128 to decrease the encryption time. Security is enhanced by improving the key schedule operation by adding MixColumn transformation to this operation as second modification. In addition, to decrease the hardware requirements, S-box and Inv. S-box in the original AES are replaced by one simple S-box used for encryption and decryption in the proposed method. The proposed AES version conducts one of the ciphering modes to solve the appearance pattern problem. Experimental results indicate that the proposed modifications to the AES algorithm made the algorithm more compatible with HD image encryption.
Similar content being viewed by others
References
Jong-Wook, H., Choon-Sik, P., Dae-Hyun, R., & Eun-Soo, K. (1999). Optical image encryption based on XOR operations. Optical Engineering, 38(1), 47–54.
Daesung, M., Yongwha, C., Sung, P., Kiyoung, M., & Kyo, C. (2006). An efficient selective encryption of fingerprint images for embedded processors. ETRI Journal, 28(4), 444–452.
Shahram, B., & Mohammad, E. (2013). Chaotic image encryption system using phase-magnitude transformation and pixel substitution. Telecommunication Systems, 52(2), 525–537.
Nanrun, Z., Yixian, W., & Lihua, G. (2011). Novel optical image encryption scheme based on fractional Mellin transform. Optics Communications, 284(13), 3234–3242.
Fan, G., Linfei, C., & Daomu, Z. (2008). A half-blind color image hiding and encryption method in fractional Fourier domains. Optics Communications, 281(17), 4254–4260.
Shahram, B. (2000). Speech encryption based on fast Fourier transform permutation. In 7th IEEE international conference on electronics, circuits and systems. Jounieh, Lebanon.
Zhengjun, L., Lie, X., Ting, L., Hang, C., Pengfei, L., Chuang, L., et al. (2011). Color image encryption by using Arnold transform and color-blend operation in discrete cosine transform domains. Optics Communications, 284(1), 123–128.
Hsuan, C., Hone-Ene, H., & Cheng-Ling, L. (2011). Position multiplexing multiple-image encryption using cascaded phase-only masks in Fresnel transform domain. Optics Communications, 284(18), 4146–4151.
Hwang, H. (2011). An optical image cryptosystem based on Hartley transform in the Fresnel transform domain. Optics Communications, 284(13), 3243–3247.
Akhshani, A., Behnia, S., Akhava, A., Abu Hassan, H., & Hassan, Z. (2010). A novel scheme for image encryption based on 2D piecewise chaotic maps. Optics Communications, 283(17), 3259–3266.
Fu, C., Lin, B., Miao, Y., Xiao, L., & Jun-jie, C. (2011). A novel chaos-based bit-level permutation scheme for digital image encryption. Optics Communications, 284(23), 5415–5423.
Liu, H., & Wang, X. (2011). Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Optics Communications, 284(16–17), 3895–3903.
Akhavan, A., Samsudin, A., & Akhshani, A. (2011). A symmetric image encryption scheme based on combination of nonlinear chaotic maps. Journal of the Franklin Institute, 348(8), 1797–1813.
Ruisong, Y. (2011). A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism. Optics Communications, 284(22), 5290–5298.
Zhi-liang, Z., Wei, Z., Kwok-wo, W., & Hai, Y. (2011). A chaos-based symmetric image encryption scheme using a bit-level permutation. Information Sciences, 181(6), 1171–1186.
Alexander, P., & Massimiliano, Z. (2012). Chaotic map cryptography and security. In Encryption: methods, software and security (pp. 301–332). Nova Science Publishers.
Jiancheng, Z., Rabab, W., & Dongxu, Q. (2004). A new digital image scrambling method based on Fibonacci numbers. In International conference on circuits and systems, Vancouver, Canada.
Jiancheng, Z., Rabab, W., & Dongxu, Q. (2004). The generalized Fibonacci transformations and application to image scrambling. In IEEE international conference on acoustics, speech, and signal processing, Montreal, Canada.
Linfei, C., Daomu, Z., & Fan, G. (2013). Image encryption based on singular value decomposition and Arnold transform in fractional domain. Optics Communications, 291, 98–103.
Qiudong, S., Wenying, Y., Jiangwei, H., & Wenxin, M. (2012). Image encryption based on bit-plane decomposition and random scrambling. In 2nd International conference on consumer electronics, communications and networks, Hubei, China.
Yicong, Z., Karen, P., & Sos, A. (2009). Image encryption algorithms based on generalized P-Gray code bit plane decomposition. In Conference record of the forty-third Asilomar conference on signals, systems and computers, CA, USA.
Zheng, W., Cheng, Z., & Cui, Y. (2008). Image data encryption and hiding based on wavelet packet transform and bit planes decomposition. In 4th International conference on wireless communications, networking and mobile computing, Dalian, China.
Nandi, S., Kar, B., & Chaudhuri, P. (1994). Theory and applications of cellular automata in cryptography. IEEE Transactions on Computer, 43(12), 1346–1357.
FIPS PUB 46-3: Data encryption standard (DES), 1999.
Daemen, J., & Rijmen, V. (2000). The block cipher Rijndael. In: Smart card research and applications. Lecture notes in computer science (pp. 277–284). Berlin: Springer.
Kamali, S., Shakerian, R., Hedayati, M., & Rahmani, M. (2010). A new modified version of advanced encryption standard based algorithm for image encryption. In International conference on electronics and information engineering, Kyoto, Japan.
Grangetto, M., Magli, E., & Olmo, G. (2006). Multimedia selective encryption by means of randomized arithmetic coding. IEEE Transactions on Multimedia, 8(5), 905–917.
Wadi, S., & Zainal, N. (2013). A low cost implementation of modified advanced encryption standard algorithm using 8085A microprocessor. Journal of Engineering Science and Technology, 8(4), 406–415.
Huang C. W., Tu Y. H., Yeh H. C., Liu S. H., & Chang C. J. (2011). Image observation on the modified ECB operations in Advanced Encryption Standard. In International conference in information society (i-Society), London, UK.
Subramanyan, B., Chhabria, V. M., & Sankarbabu, T. G. (2011). Image encryption based on AES key expansion. In IEEE computer society meeting, Kolkata, India.
Fahad, M. (2013). Chaotic and AES cryptosystem for satellite imagery. Telecommunication Systems, 52(2), 573–581.
Tran M. T., Bui D. K., & Duong A. D. (2008). Gray S-box for advanced encryption standard. In IEEE computer society meeting, Suzhou, China.
Yicheng, C., Xuecheng, Z., Zhenglin, L., Xiaofei, C., & Yu, H. (2008). Dynamic inhomogeneous S-Boxes design for efficient AES masking mechanisms. The Journal of China Universities of Posts and Telecommunications, 15(2), 72–76.
Bouillaguet, C., Derbez, P., Dunkelman, O., Fouque, P., Keller, N., & Rijmen, V. (2012). Low-data complexity attacks on AES. IEEE Transaction on Information Theory, 58(11), 7002–7017.
Dunkelman, O., & Keller, N. (2010). The effects of the omission of last rounds mixcolumns on AES. Information Processing Letters, 110(8–9), 304308.
Announcing the Advanced Encryption Standard (AES), Federal Information Processing Standards Publication 197, 26 of November, 2001.
Gonzalez, R., Woods, E., & Eddins, L. (2008). Digital image processing using Matlab. NJ: Gatesmark LLC.
Acknowledgments
The authors would like to thank the editor-in-chief and anonymous reviewers for helpful comments and suggestions that improved the quality and readability of the paper. The authors would also like to thank Universiti Kebangsaan Malaysia for supporting this work under UKM-GUP-2011-060 grant funds. Also the corresponding author would like to thanks the Foundation of Technical Education-Baghdad for supporting him by 7-17-20066 Grant scholarship.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wadi, S.M., Zainal, N. High Definition Image Encryption Algorithm Based on AES Modification. Wireless Pers Commun 79, 811–829 (2014). https://doi.org/10.1007/s11277-014-1888-7
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-014-1888-7