Digital Image Encryption Based On Advanced Encryption Standard(AES) Algorithm

被引:32
作者
Zhang, Qi [1 ]
Qun, Ding [1 ]
机构
[1] Heilongjiang Univ, Elect Engn Coll, Harbin, Peoples R China
来源
2015 FIFTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC) | 2015年
关键词
Digital image; encryption; AES; MATLAB;
D O I
10.1109/IMCCC.2015.261
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of network and communication technology, digital image communication has become an important way of information transmission. Therefore, much more attention has been paid to the development of the digital image encryption technology. In this paper, we propose a digital image encryption technology based on AES algorithm, and the algorithm implementation in MATLAB. Then, we perform digital image processing, obtain the date that can use the AES encryption algorithm, combine both approaches. Then, the digital image can be encrypted, and the algorithm is realized in MATLAB simulation. Through the comparison of the histogram analysis and the analysis of the key, the result has showed that the method can better realize the effect of encryption and decryption.
引用
收藏
页码:1218 / 1221
页数:4
相关论文
共 10 条
  • [1] Das D., 2011, 2011 WORLD C INF COM, P1199
  • [2] Fan L. Y., 2014, IEICE ELECTRON EXPR, V11, P115
  • [3] Analysis and Implementation Hardware-Software of Rijndael Encryption
    Grediaga, A.
    Brotons, F.
    Ledesma, B.
    Crespi, F. G.
    [J]. IEEE LATIN AMERICA TRANSACTIONS, 2010, 8 (01) : 82 - 87
  • [4] Li YJ, 2011, J INF SCI ENG, V27, P2031
  • [5] Rijmen V., 2002, DESIGN RIJNDAEL AES, P55
  • [6] Stevens K., 2005, 2005 CAN C EL COMP E, P1296
  • [7] Toldinas J, 2011, ELEKTRON ELEKTROTECH, V108, P11
  • [8] T-matrix and its applications in image processing
    Zhang, MR
    Shao, GC
    Yi, KC
    [J]. ELECTRONICS LETTERS, 2004, 40 (25) : 1583 - 1584
  • [9] Scalable Compression of Stream Cipher Encrypted Images Through Context-Adaptive Sampling
    Zhou, Jiantao
    Au, Oscar C.
    Zhai, Guangtao
    Tang, Yuan Yan
    Liu, Xianming
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (11) : 1857 - 1868
  • [10] Study of the AES Realization Method on the Reconfigurable Hardware
    Zhu, Yuwen
    Zhang, Hongqi
    Bao, Yibao
    [J]. 2013 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND APPLICATIONS (CSA), 2013, : 72 - 76