A SECURE BSS-BASED ENCRYPTION SCHEME USING AES KEY EXPANSION APPROACH

被引:0
|
作者
Okhovat, Raziyeh Sadat [1 ]
Sadr, Ali [1 ]
机构
[1] Iran Univ Sci & Technol, Dept Elect Engn, Tehran, Iran
来源
THIRD INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY (ICCET 2011) | 2011年
关键词
Cryptography; Blind Source Separation; Advanced Encryption Standard; Key Expansion;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, a secure BSS-based cryptosystem has been proposed for encryption of images. Conventional BSS-based encryption scheme is not secure especially against differential attack. The main reason is due to the fixed key which is applied to encrypt all images. Here we have exploited the AES key expansion to produce a different key for transmitting each confidential image. Our simulations and also calculations based on correlation coefficient confirm that the proposed algorithm has effectively enhanced the level of security.
引用
收藏
页码:277 / +
页数:2
相关论文
共 50 条
  • [41] An Improved Secure Code Encryption Approach Based on Indexed Table
    Sasirekha, N.
    Hemalatha, M.
    PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI'12), 2012, : 1136 - 1142
  • [42] A symmetric probabilistic encryption scheme based on CHNN without data expansion
    Leung, K. C.
    Li, S. L.
    Cheng, L. M.
    Chan, C. K.
    NEURAL PROCESSING LETTERS, 2006, 24 (02) : 93 - 105
  • [43] A lattice-based revocable adaptive-ID secure encryption scheme
    State Key Laboratory of Integrated Service Networks, Xidian University, Xi'an
    710071, China
    Dianzi Yu Xinxi Xuebao, 2 (423-428): : 423 - 428
  • [44] A Symmetric Probabilistic Encryption Scheme Based On CHNN Without Data Expansion
    K. C. Leung
    S. L. Li
    L. M. Cheng
    C. K. Chan
    Neural Processing Letters, 2006, 24 : 93 - 105
  • [45] A generalized scheme for data encryption technique using a randomized matrix key
    Krishna, A. V. N.
    Pandit, S. N. N.
    Babu, A. Vinaya
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2007, 10 (01) : 73 - 81
  • [46] An improved chaos-based secure communication technique using a novel encryption function with an embedded cipher key
    Zaher, Ashraf A.
    CHAOS SOLITONS & FRACTALS, 2009, 42 (05) : 2804 - 2814
  • [47] Security Enhancement of AES Based Encryption Using Dynamic Salt Algorithm
    Bachtiar, Mochamad Mobed
    Wasista, Sigit
    Ditanaya, Thiar Hasbiya
    Perdana, Reinaldo Riant Kurnia
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON APPLIED ENGINEERING (ICAE), 2018,
  • [48] Robust encryption method based on AES-CBC using elliptic curves Diffie–Hellman to secure data in wireless sensor networks
    Adoté François-Xavier Ametepe
    Arnaud S. R. M. Ahouandjinou
    Eugène C. Ezin
    Wireless Networks, 2022, 28 : 991 - 1001
  • [49] Efficient chosen-ciphertext secure public-key encryption scheme with high leakage-resilience
    Qin, Baodong
    Liu, Shengli
    Chen, Kefei
    IET INFORMATION SECURITY, 2015, 9 (01) : 32 - 42
  • [50] A Blockchain-Based Secure Key Management Scheme With Trustworthiness in DWSNs
    Tian, Youliang
    Wang, Zuan
    Xiong, Jinbo
    Ma, Jianfeng
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (09) : 6193 - 6202