Image Encryption and Decryption System Using AES for Secure Transmission
P. Thakkar1 , H.K. Mishra2 , Z. Shaikh3 , D. Sharma4
- Department of Computer Engineering, K J Somaiya College of Engineering, Mumbai, India.
- Department of Computer Engineering, K J Somaiya College of Engineering, Mumbai, India.
- Department of Computer Engineering, K J Somaiya College of Engineering, Mumbai, India.
- Department of Computer Engineering, K J Somaiya College of Engineering, Mumbai, India.
Correspondence should be addressed to: pranay.thakkar@somaiya.edu.
Section:Research Paper, Product Type: Journal Paper
Volume-5 ,
Issue-5 , Page no. 109-114, May-2017
Online published on May 30, 2017
Copyright © P. Thakkar, H.K. Mishra, Z. Shaikh, D. Sharma . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Citation
IEEE Style Citation: P. Thakkar, H.K. Mishra, Z. Shaikh, D. Sharma, “Image Encryption and Decryption System Using AES for Secure Transmission,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.5, pp.109-114, 2017.
MLA Citation
MLA Style Citation: P. Thakkar, H.K. Mishra, Z. Shaikh, D. Sharma "Image Encryption and Decryption System Using AES for Secure Transmission." International Journal of Computer Sciences and Engineering 5.5 (2017): 109-114.
APA Citation
APA Style Citation: P. Thakkar, H.K. Mishra, Z. Shaikh, D. Sharma, (2017). Image Encryption and Decryption System Using AES for Secure Transmission. International Journal of Computer Sciences and Engineering, 5(5), 109-114.
BibTex Citation
BibTex Style Citation:
@article{Thakkar_2017,
author = { P. Thakkar, H.K. Mishra, Z. Shaikh, D. Sharma},
title = {Image Encryption and Decryption System Using AES for Secure Transmission},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2017},
volume = {5},
Issue = {5},
month = {5},
year = {2017},
issn = {2347-2693},
pages = {109-114},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1273},
publisher = {IJCSE, Indore, INDIA},
}
RIS Citation
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1273
TI - Image Encryption and Decryption System Using AES for Secure Transmission
T2 - International Journal of Computer Sciences and Engineering
AU - P. Thakkar, H.K. Mishra, Z. Shaikh, D. Sharma
PY - 2017
DA - 2017/05/30
PB - IJCSE, Indore, INDIA
SP - 109-114
IS - 5
VL - 5
SN - 2347-2693
ER -
![]() |
![]() |
![]() |
988 | 724 downloads | 716 downloads |




Abstract
Internet is the greatest blessing for all the people over the world. Large amount of data is constantly transmitted over the internet. Data means any image, videos, audio etc. Also, confidential information from Banking, Military, Government etc. are transmitted over the internet, but the security of these information is not always looked upon. Privacy and Security of information is very important in data storage and transmission. So as to secure the information, various data hiding techniques and encryption of images is done. Image Encryption can be done using various symmetric and asymmetric key algorithms. But, it is found that symmetric key algorithm is much faster and easier to implement and required less processing power as compare to asymmetric key algorithm. Therefore, we use AES Algorithm for the encryption of images. Here, the proposed system mainly deals with the encryption of image using AES algorithm to secure our data during transmission. Different image file formats are given as the input to the AES Algorithm in our system
Key-Words / Index Term
Encryption, Decryption, Image Processing, AES
References
[1] S. Mewada, P. Sharma, S. S. Gautam, “Exploration of efficient symmetric algorithms”, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, pp.663-666, 2016.
Google Scholar
[2] V. Kapoor, “Data Encryption and Decryption Using Modified RSA Cryptography Based on Multiple Public Keys and ‘n’prime Number”, International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.2, pp.35-38, 2013.
Google Scholar
[3] A. Sharma, RS Thakur, S. Jaloree, “Investigation of Efficient Cryptic Algorithm for image files Encryption in Cloud”, International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.5, pp.5-11, 2016.
Google Scholar
[4] V. Kapoor, “A New Cryptography Algorithm with an Integrated Scheme to Improve Data Security”, International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.2, pp.39-46, 2013.
Google Scholar
[5] A. Sharma, RS Thakur, S. Jaloree, “Investigation of Efficient Cryptic Algorithm for Storing Video Files in Cloud”, International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.6, pp.8-14, 2016.
Google Scholar
[6] L.R. Mathew , “A Survey on Different Cryptographic Techniques”, International Journal of Computer Sciences and Engineering, Vol.5, Issue.2, pp.27-29, 2017.
Google Scholar
[7] R. Arya, “Data Encryption Approach For Security”, International Journal of Computer Sciences and Engineering, Vol.2, Issue.5, pp.176-179, 2014.
Google Scholar
[8] Ajay Hirne, Shital Namdev, H.S. Tomar, “Secure Data Distribution in Cloud Environment Using Key Aggregation Cryptic”, International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.2, pp.15-19, 2016.
Google Scholar
[9] SO. OKOLIE, BT. ADETOBA, “Comparative Analysis of Performance Characteristics of well-known Symmetric Key Encryption Algorithms”, International Journal of Scientific Research in Network Security and Communication, Vol.4, Issue.3, pp.1-6, 2016.
Google Scholar
[10] Sachin sharma, Jeevan Singh Bisht, “Performance Analysis of Data Encryption Algorithms”, International Journal of Scientific Research in Network Security and Communication, Vol.3, Issue.1, pp.1-5, 2015.
Google Scholar