Open Access   Article Go Back

Image Encryption and Decryption System Using AES for Secure Transmission

P. Thakkar1 , H.K. Mishra2 , Z. Shaikh3 , D. Sharma4

  1. Department of Computer Engineering, K J Somaiya College of Engineering, Mumbai, India.
  2. Department of Computer Engineering, K J Somaiya College of Engineering, Mumbai, India.
  3. Department of Computer Engineering, K J Somaiya College of Engineering, Mumbai, India.
  4. Department of Computer Engineering, K J Somaiya College of Engineering, Mumbai, India.

Correspondence should be addressed to: pranay.thakkar@somaiya.edu.

Section:Research Paper, Product Type: Journal Paper
Volume-5 , Issue-5 , Page no. 109-114, May-2017

Online published on May 30, 2017

Copyright © P. Thakkar, H.K. Mishra, Z. Shaikh, D. Sharma . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: P. Thakkar, H.K. Mishra, Z. Shaikh, D. Sharma, “Image Encryption and Decryption System Using AES for Secure Transmission,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.5, pp.109-114, 2017.

MLA Style Citation: P. Thakkar, H.K. Mishra, Z. Shaikh, D. Sharma "Image Encryption and Decryption System Using AES for Secure Transmission." International Journal of Computer Sciences and Engineering 5.5 (2017): 109-114.

APA Style Citation: P. Thakkar, H.K. Mishra, Z. Shaikh, D. Sharma, (2017). Image Encryption and Decryption System Using AES for Secure Transmission. International Journal of Computer Sciences and Engineering, 5(5), 109-114.

BibTex Style Citation:
@article{Thakkar_2017,
author = { P. Thakkar, H.K. Mishra, Z. Shaikh, D. Sharma},
title = {Image Encryption and Decryption System Using AES for Secure Transmission},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2017},
volume = {5},
Issue = {5},
month = {5},
year = {2017},
issn = {2347-2693},
pages = {109-114},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1273},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1273
TI - Image Encryption and Decryption System Using AES for Secure Transmission
T2 - International Journal of Computer Sciences and Engineering
AU - P. Thakkar, H.K. Mishra, Z. Shaikh, D. Sharma
PY - 2017
DA - 2017/05/30
PB - IJCSE, Indore, INDIA
SP - 109-114
IS - 5
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
874 556 downloads 540 downloads
  
  
           

Abstract

Internet is the greatest blessing for all the people over the world. Large amount of data is constantly transmitted over the internet. Data means any image, videos, audio etc. Also, confidential information from Banking, Military, Government etc. are transmitted over the internet, but the security of these information is not always looked upon. Privacy and Security of information is very important in data storage and transmission. So as to secure the information, various data hiding techniques and encryption of images is done. Image Encryption can be done using various symmetric and asymmetric key algorithms. But, it is found that symmetric key algorithm is much faster and easier to implement and required less processing power as compare to asymmetric key algorithm. Therefore, we use AES Algorithm for the encryption of images. Here, the proposed system mainly deals with the encryption of image using AES algorithm to secure our data during transmission. Different image file formats are given as the input to the AES Algorithm in our system

Key-Words / Index Term

Encryption, Decryption, Image Processing, AES

References

[1] S. Mewada, P. Sharma, S. S. Gautam, “Exploration of efficient symmetric algorithms”, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, pp.663-666, 2016.
Google Scholar

[2] V. Kapoor, “Data Encryption and Decryption Using Modified RSA Cryptography Based on Multiple Public Keys and ‘n’prime Number”, International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.2, pp.35-38, 2013.
Google Scholar

[3] A. Sharma, RS Thakur, S. Jaloree, “Investigation of Efficient Cryptic Algorithm for image files Encryption in Cloud”, International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.5, pp.5-11, 2016.
Google Scholar

[4] V. Kapoor, “A New Cryptography Algorithm with an Integrated Scheme to Improve Data Security”, International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.2, pp.39-46, 2013.
Google Scholar

[5] A. Sharma, RS Thakur, S. Jaloree, “Investigation of Efficient Cryptic Algorithm for Storing Video Files in Cloud”, International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.6, pp.8-14, 2016.
Google Scholar

[6] L.R. Mathew , “A Survey on Different Cryptographic Techniques”, International Journal of Computer Sciences and Engineering, Vol.5, Issue.2, pp.27-29, 2017.
Google Scholar

[7] R. Arya, “Data Encryption Approach For Security”, International Journal of Computer Sciences and Engineering, Vol.2, Issue.5, pp.176-179, 2014.
Google Scholar

[8] Ajay Hirne, Shital Namdev, H.S. Tomar, “Secure Data Distribution in Cloud Environment Using Key Aggregation Cryptic”, International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.2, pp.15-19, 2016.
Google Scholar

[9] SO. OKOLIE, BT. ADETOBA, “Comparative Analysis of Performance Characteristics of well-known Symmetric Key Encryption Algorithms”, International Journal of Scientific Research in Network Security and Communication, Vol.4, Issue.3, pp.1-6, 2016.
Google Scholar

[10] Sachin sharma, Jeevan Singh Bisht, “Performance Analysis of Data Encryption Algorithms”, International Journal of Scientific Research in Network Security and Communication, Vol.3, Issue.1, pp.1-5, 2015.
Google Scholar