International Journals of Advanced Research in Computer Science and Software Engineering ISSN: 2277-128X (Volume-7, Issue-6) Research Article June 2017 © www.ijarcsse.com , All Rights Reserved Page | 134 An Enhanced AES based Secure Image Processing Framework Bhavana Verma * Mtech Scholar, UIET, Kurukshetra University, Kurukshetra, Haryana, India Sona Malhotra Assistant Professor, UIET, Kurukshetra University, Kurukshetra, Haryana, India DOI: 10.23956/ijarcsse/V7I6/0234 Abstract- In recent years demand of security in image processing is increases because user wants to share images in digital form from one place to another so when an image is transferred between different users than security leakage chances increases. To overcome this kind of challenge number of cryptographic algorithm has been used by different researchers in their work out of them AES is much better and more secure than other algorithms. In this paper we propose an enhanced AES based mechanism for secure transmission of images. We implement proposed mechanism using MATLAB and uses different metrics like histogram and correlation. Keywords- Image processing, AES, histogram, correlation and Digital image. I. INTRODUCTION Image processing is a processing of images in which an image is converted into digital form by using some mathematical operations so that some operations like image enhancing, image extraction and many more can be performed for getting the useful information. In image processing, the input is in the form of video frames, photographs and output is also in the form of image but have some different characteristics. [1] Image processing can be done in analog and digital form or it can be done in two form analog and digital. In analog processing, hard copies are used where various visual techniques can applied so that the analyzer can apply its knowledge and collateral data for processing an image. In Digital form, raw data can processed in computers. For this purpose techniques like preprocessing, enhancement, compression, and extraction can be used. It can be defined as in the form of dimensions like two- dimension. [2]When the matrix is defined in the two dimension, function f(x, y) can be used to represent the function coordinates and the function f represents the amplitude which can be called or named as gray level of image. An image is said to be a digital image when it functions are finite or discrete. A gray scale image can ranges between 0 to 255 with 8 bits representation. An image can be expressed in many formats like: Gif, Jpeg, tiff, etc. [3] In this paper five sections are presented. In section 1, introduction of image processing has been discussed. In section 2, related work has been presented in which existing techniques for secure image processing has been presented. In section 3, different cryptography algorithm has been discussed. In section 4, Proposed work and in section 5 results has been showed. Conclusion should be described in section 6. II. RELATED WORK Li et al. [4] made the underlying endeavor to embrace riotous tent maps (CTM) for picture encryption calculation plan. This framework was simple to the point that its encryption speed is very quick. As a result, it has favorable circumstances in managing expansive number of information and diminishing excess data, contrasted and the regular picture encryption calculations. Be that as it may, some conspicuous deformities can likewise be found in this immaculate CTM-based plan as takes after. In the first place, this cryptosystem just included the diffusing stage, and changed structure has been excluded. Besides, while encoding shading pictures, this plan just scrambles every segment of the shading picture separately, which demonstrates no flexibility from scrambling a dim picture to a shading one. Zhang et al. [5] researched the security of an exemplary dispersion system (and of its variations) utilized as the center cryptographic primitive in some picture cryptosystems in view of the previously mentioned complex dynamic marvels. Gonçalves and Costa[6] overviewed late advancements in encryption and protection in remote sensor systems sent for transmissions of picture depictions, surveying imaginative ways to deal with give distinctive levels of security. Promising exploration headings were likewise talked about. Radhadevi and Kalpana [7] displayed a use of AES (Advanced Encryption Standard) operations in picture encryption and decryption. The encoded figure pictures dependably show the consistently appropriated RGB pixels. Proposed approach offers upgraded security, it expects to give client fulfillment by transmitting individual and delicate picture information safely. The Advanced Encryption Standard offers the adaptability of permitting distinctive key sizes 128 piece, 192 piece and 256-piece key and the security depends on the different random key determinations, diverse S-box and solid changes. Padate and Patel [8] depicted an outline of viable security for correspondence by AES calculation for encryption and decryption. It depended on AES Key Expansion in which the encryption procedure was somewhat savvy selective or operation of an arrangement of picture pixels alongside the 128 piece key which changes for each arrangement of pixels. Zeghid et al. [9] adjusted variant of AES, to outline a safe symmetric picture encryption strategy, has been proposed. The AES was stretched out to bolster a key stream generator for picture encryption which can conquer the issue of finished zones existing in other known encryption calculations.