2011 Second International Conference on Emerging Applications of Information Technology 2011
DOI: 10.1109/eait.2011.60
|View full text |Cite
|
Sign up to set email alerts
|

Image Encryption Based on AES Key Expansion

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
19
0
2

Year Published

2012
2012
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 40 publications
(21 citation statements)
references
References 6 publications
0
19
0
2
Order By: Relevance
“…Laiphrakpam Dolendro Singh et al [12] proposed an image encryption using Elliptic Curve Cryptography based on pixel grouping to reduce the number of computation. The group of pixels are transformed into big integer, these big integer values are paired and given as input in ECC operation.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Laiphrakpam Dolendro Singh et al [12] proposed an image encryption using Elliptic Curve Cryptography based on pixel grouping to reduce the number of computation. The group of pixels are transformed into big integer, these big integer values are paired and given as input in ECC operation.…”
Section: Related Workmentioning
confidence: 99%
“…In our proposed method, nine input images with an image size of m*m pixels are taken for integration with block size of 4*4 is applied to test the performance. The JPEG Compression, Interleaving with Pixel based Integration and the Elliptic Curve Cryptography [12] algorithm is used on the number of images to generate encrypted image, decryption process is done by selection of the key. The entropy and correlation of the encrypted images are calculated and evaluated.…”
Section: Introductionmentioning
confidence: 99%
“…Recently, many algorithms have been created (RC4 (Rivest Cypher 4), RC5 (Rivest Cypher 5), RSA (Rivest Shami Adleman) …), but very few are viable with RTA. [7]. In addition, it is difficult to use encryption techniques directly in multimedia data because of the large volumes, and require real-time interactions.…”
Section: Related Workmentioning
confidence: 99%
“…In [18], author presents an algorithm based on AES Key Expansion in which the encryption process is a bit wise exclusive OR operation of a set of image pixels along with the 128 bit key which changes for every set of pixels . In this paper the keys to be used are generated independently at the sender and receiver side based on AES Key Expansion process.…”
Section: Rc6mentioning
confidence: 99%