A SECURE BSS-BASED ENCRYPTION SCHEME USING AES KEY EXPANSION APPROACH

被引:0
|
作者
Okhovat, Raziyeh Sadat [1 ]
Sadr, Ali [1 ]
机构
[1] Iran Univ Sci & Technol, Dept Elect Engn, Tehran, Iran
来源
THIRD INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY (ICCET 2011) | 2011年
关键词
Cryptography; Blind Source Separation; Advanced Encryption Standard; Key Expansion;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, a secure BSS-based cryptosystem has been proposed for encryption of images. Conventional BSS-based encryption scheme is not secure especially against differential attack. The main reason is due to the fixed key which is applied to encrypt all images. Here we have exploited the AES key expansion to produce a different key for transmitting each confidential image. Our simulations and also calculations based on correlation coefficient confirm that the proposed algorithm has effectively enhanced the level of security.
引用
收藏
页码:277 / +
页数:2
相关论文
共 50 条
  • [21] A Secure Partial Encryption Scheme Based on Bit Plane Manipulation
    Mondal, Bhaskar
    Mandal, Tarni
    Kumar, Punj
    Biswas, Neel
    2017 7TH INTERNATIONAL SYMPOSIUM ON EMBEDDED COMPUTING AND SYSTEM DESIGN (ISED), 2017,
  • [22] A Lightweight Image Encryption Algorithm Based on Secure Key Generation
    Ali, A'Laa Hussein
    Gbashi, Ekhlas Khalaf
    Alaskar, Haya
    Hussain, Abir Jaafar
    IEEE ACCESS, 2024, 12 : 95871 - 95883
  • [23] A Fingerprint Encryption Scheme Based on Irreversible Function and Secure Authentication
    Yang, Yijun
    Yu, Jianping
    Zhang, Peng
    Wang, Shulan
    COMPUTATIONAL AND MATHEMATICAL METHODS IN MEDICINE, 2015, 2015
  • [24] Image Encryption Method Using Differential Expansion Technique, AES and RSA Algorithm
    Mahalakshmi, B.
    Deshmukh, Ganesh
    Murthy, V. N. L. N.
    2019 FIFTH INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP 2019), 2019, : 363 - 366
  • [25] RGB Component Encryption of Video Using AES-256 Bit Key
    Geetha, N.
    Mahesh, K.
    PROCEEDING OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS, BIG DATA AND IOT (ICCBI-2018), 2020, 31 : 693 - 700
  • [26] Secure key sharing scheme using Hamiltonian path
    Deshmukh M.
    Rawat A.S.
    International Journal of Information Technology, 2023, 15 (8) : 4141 - 4147
  • [27] Secure Key Authentication Scheme Based on Discrete Logarithms
    Yoon, Eun-Jun
    Yoo, Kee-Young
    NWESP 2007: THIRD INTERNATIONAL CONFERENCE ON NEXT GENERATION WEB SERVICES PRACTICES, PROCEEDINGS, 2007, : 73 - +
  • [28] A secure image encryption scheme based on chaotic maps and affine transformation
    Jawad Ahmad
    Seong Oun Hwang
    Multimedia Tools and Applications, 2016, 75 : 13951 - 13976
  • [29] A secure image encryption scheme based on chaotic maps and affine transformation
    Ahmad, Jawad
    Hwang, Seong Oun
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (21) : 13951 - 13976
  • [30] PUF-Based Key Generation Scheme for Secure Group Communication Using MEMS
    Mehdi, Mubarak
    Ajani, Muhammad Taha
    Tahir, Hasan
    Tahir, Shahzaib
    Alizai, Zahoor
    Khan, Fawad
    Riaz, Qaiser
    Hussain, Mehdi
    ELECTRONICS, 2021, 10 (14)