Bio-Key Based AES for Personalized Image Cryptography

2019 ◽  
Vol 62 (11) ◽  
pp. 1695-1705
Author(s):  
R Vijayarajan ◽  
P Gnanasivam ◽  
R Avudaiammal

Abstract In the era of multimedia technologies and rapidly growing multimedia contents, secured information transfer needs to be ensured through robust cryptography techniques. This paper presents a bio-key-generation scheme in the local environment to transfer multimedia content over vulnerable networks. To encrypt the images, one user has to ensure his/her authentication and further needs to provide a secret key for bio-key generation. Secret key aids to fetch biometric features for key formation and key expansion. Thus, the user receives an expanded key from the template database to perform encryption of a plain image. Once the cipher image is delivered to the network, the user has to repeat the same steps for decryption. This paper experiments the proposed bio-key-generation scheme with advanced encryption standard algorithm. This encryption strategy can also be used to encrypt confidential or personal images in various digital systems such as mobile phones, personal digital gadgets and so on. Various analyses ensure the robustness and the performance of the bio-key-based AES encryption scheme. Entropy, correlation coefficient, number of pixel change rate and unified average changing intensity are evaluated to ensure the effectiveness of the proposed method over other key-based encryption techniques.

Author(s):  
Paavni Gaur

Abstract: An Image Encryption and Decryption Using AES (Advance Encryption Standard) Algorithm is proposed in the project. Due to increasing use of image in various field, it is very important to protect the confidential image data from unauthorized access. The design uses the iterative approach with block size of 128 bit and key size of 128, 192 or 256 bit. The numbers of round for key size of 256 bits is 14 , for 128 bits is 10 and for 192 bits is 12. As secret key increases the security as well as complexity of the cryptography algorithms. In this paper , an algorithm in which the image is an input to AES Encryption to get the encrypted image and then input it to AES Decryption to get the original image is proposed and explained which will further be implemented by me. The paper shows the study in which a system could be used for effective image data encryption and key generation in diversified application areas, where sensitive and confidential data needs to be transmitted along with the image.


Author(s):  
Francois Rottenberg ◽  
Trung-Hien Nguyen ◽  
Jean-Michel Dricot ◽  
Francois Horlin ◽  
Jerome Louveaux

Sign in / Sign up

Export Citation Format

Share Document