International Journals of Advanced Research
in Computer Science and Software Engineering
ISSN: 2277-128X (Volume-7, Issue-6)
Research Article June
2017
© www.ijarcsse.com , All Rights Reserved Page | 134
An Enhanced AES based Secure Image Processing
Framework
Bhavana Verma
*
Mtech Scholar, UIET, Kurukshetra University,
Kurukshetra, Haryana, India
Sona Malhotra
Assistant Professor, UIET, Kurukshetra University,
Kurukshetra, Haryana, India
DOI: 10.23956/ijarcsse/V7I6/0234
Abstract- In recent years demand of security in image processing is increases because user wants to share images in
digital form from one place to another so when an image is transferred between different users than security leakage
chances increases. To overcome this kind of challenge number of cryptographic algorithm has been used by different
researchers in their work out of them AES is much better and more secure than other algorithms. In this paper we
propose an enhanced AES based mechanism for secure transmission of images. We implement proposed mechanism
using MATLAB and uses different metrics like histogram and correlation.
Keywords- Image processing, AES, histogram, correlation and Digital image.
I. INTRODUCTION
Image processing is a processing of images in which an image is converted into digital form by using some mathematical
operations so that some operations like image enhancing, image extraction and many more can be performed for getting
the useful information. In image processing, the input is in the form of video frames, photographs and output is also in
the form of image but have some different characteristics. [1] Image processing can be done in analog and digital form or
it can be done in two form analog and digital. In analog processing, hard copies are used where various visual techniques
can applied so that the analyzer can apply its knowledge and collateral data for processing an image. In Digital form, raw
data can processed in computers. For this purpose techniques like preprocessing, enhancement, compression, and
extraction can be used. It can be defined as in the form of dimensions like two- dimension. [2]When the matrix is defined
in the two dimension, function f(x, y) can be used to represent the function coordinates and the function f represents the
amplitude which can be called or named as gray level of image. An image is said to be a digital image when it functions
are finite or discrete. A gray scale image can ranges between 0 to 255 with 8 bits representation. An image can be
expressed in many formats like: Gif, Jpeg, tiff, etc. [3]
In this paper five sections are presented. In section 1, introduction of image processing has been discussed. In section 2,
related work has been presented in which existing techniques for secure image processing has been presented. In section
3, different cryptography algorithm has been discussed. In section 4, Proposed work and in section 5 results has been
showed. Conclusion should be described in section 6.
II. RELATED WORK
Li et al. [4] made the underlying endeavor to embrace riotous tent maps (CTM) for picture encryption calculation plan.
This framework was simple to the point that its encryption speed is very quick. As a result, it has favorable circumstances
in managing expansive number of information and diminishing excess data, contrasted and the regular picture encryption
calculations. Be that as it may, some conspicuous deformities can likewise be found in this immaculate CTM-based plan
as takes after. In the first place, this cryptosystem just included the diffusing stage, and changed structure has been
excluded. Besides, while encoding shading pictures, this plan just scrambles every segment of the shading picture
separately, which demonstrates no flexibility from scrambling a dim picture to a shading one.
Zhang et al. [5] researched the security of an exemplary dispersion system (and of its variations) utilized as the center
cryptographic primitive in some picture cryptosystems in view of the previously mentioned complex dynamic marvels.
Gonçalves and Costa[6] overviewed late advancements in encryption and protection in remote sensor systems sent for
transmissions of picture depictions, surveying imaginative ways to deal with give distinctive levels of security. Promising
exploration headings were likewise talked about.
Radhadevi and Kalpana [7] displayed a use of AES (Advanced Encryption Standard) operations in picture encryption and
decryption. The encoded figure pictures dependably show the consistently appropriated RGB pixels. Proposed approach
offers upgraded security, it expects to give client fulfillment by transmitting individual and delicate picture information
safely. The Advanced Encryption Standard offers the adaptability of permitting distinctive key sizes 128 piece, 192 piece
and 256-piece key and the security depends on the different random key determinations, diverse S-box and solid changes.
Padate and Patel [8] depicted an outline of viable security for correspondence by AES calculation for encryption and
decryption. It depended on AES Key Expansion in which the encryption procedure was somewhat savvy selective or
operation of an arrangement of picture pixels alongside the 128 piece key which changes for each arrangement of pixels.
Zeghid et al. [9] adjusted variant of AES, to outline a safe symmetric picture encryption strategy, has been proposed. The
AES was stretched out to bolster a key stream generator for picture encryption which can conquer the issue of finished
zones existing in other known encryption calculations.