A SECURE BSS-BASED ENCRYPTION SCHEME USING AES KEY EXPANSION APPROACH

被引:0
|
作者
Okhovat, Raziyeh Sadat [1 ]
Sadr, Ali [1 ]
机构
[1] Iran Univ Sci & Technol, Dept Elect Engn, Tehran, Iran
来源
THIRD INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY (ICCET 2011) | 2011年
关键词
Cryptography; Blind Source Separation; Advanced Encryption Standard; Key Expansion;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, a secure BSS-based cryptosystem has been proposed for encryption of images. Conventional BSS-based encryption scheme is not secure especially against differential attack. The main reason is due to the fixed key which is applied to encrypt all images. Here we have exploited the AES key expansion to produce a different key for transmitting each confidential image. Our simulations and also calculations based on correlation coefficient confirm that the proposed algorithm has effectively enhanced the level of security.
引用
收藏
页码:277 / +
页数:2
相关论文
共 50 条
  • [31] Hybrid Secure Cloud Storage data based on improved Encryption Scheme
    Deepthi, B.
    Ramani, G.
    Deepika, R.
    Shabbeer, Md
    2021 INTERNATIONAL CONFERENCE ON EMERGING SMART COMPUTING AND INFORMATICS (ESCI), 2021, : 776 - 779
  • [32] FPGA implementation of an optimized key expansion module of AES algorithm for secure transmission of personal ECG signals
    Thanikodi Manoj Kumar
    Palanivel Karthigaikumar
    Design Automation for Embedded Systems, 2018, 22 : 13 - 24
  • [33] An Efficient Forward-Secure Public-Key Encryption Scheme without Random Oracles
    Lu, Yang
    Li, Jiguo
    THIRD INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY WORKSHOPS (ISECS 2010), 2010, : 22 - 25
  • [34] FPGA implementation of an optimized key expansion module of AES algorithm for secure transmission of personal ECG signals
    Kumar, Thanikodi Manoj
    Karthigaikumar, Palanivel
    DESIGN AUTOMATION FOR EMBEDDED SYSTEMS, 2018, 22 (1-2) : 13 - 24
  • [35] A novel encryption scheme based on timestamp in gigabit Ethernet passive optical network using AES-128
    Yin, Aihan
    Wang, Shengkai
    OPTIK, 2014, 125 (03): : 1361 - 1365
  • [36] Secure SCADA communication by using a modified key management scheme
    Rezai, Abdalhossein
    Keshavarzi, Parviz
    Moravej, Zahra
    ISA TRANSACTIONS, 2013, 52 (04) : 517 - 524
  • [37] A novel AES and Chacha based block level processing oriented image encryption scheme
    Karthika S.K.
    Prasad Jones Christydass S.
    International Journal of Information Technology, 2023, 15 (8) : 4085 - 4095
  • [38] Modification of AES Algorithm by Using Second Key and Modified SubBytes Operation for Text Encryption
    Thinn, Aye Aye
    Thwin, Mie Mie Su
    COMPUTATIONAL SCIENCE AND TECHNOLOGY, 2019, 481 : 435 - 444
  • [39] A Secure and Efficient Color Image Encryption Scheme based on Two Chaotic Systems and Advanced Encryption Standard
    Nayak, Pragyanshree
    Nayak, Sanjeet Kumar
    Das, Satyabrata
    2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2018, : 412 - 418
  • [40] An Approach to Protect Private Key using Fingerprint Biometric Encryption Key in BioPKI based Security System
    Nguyen Thi Hoang Lan
    Nguyen Thi Thu Hang
    2008 10TH INTERNATIONAL CONFERENCE ON CONTROL AUTOMATION ROBOTICS & VISION: ICARV 2008, VOLS 1-4, 2008, : 1595 - 1599