Open Access   Article Go Back

A Parallel AES of Faster Image Transfer Using Genetic Algorithm Key Generation

Suvarna Patil1

Section:Research Paper, Product Type: Journal Paper
Volume-3 , Issue-5 , Page no. 283-287, May-2015

Online published on May 30, 2015

Copyright © Suvarna Patil . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Suvarna Patil, “A Parallel AES of Faster Image Transfer Using Genetic Algorithm Key Generation,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.283-287, 2015.

MLA Style Citation: Suvarna Patil "A Parallel AES of Faster Image Transfer Using Genetic Algorithm Key Generation." International Journal of Computer Sciences and Engineering 3.5 (2015): 283-287.

APA Style Citation: Suvarna Patil, (2015). A Parallel AES of Faster Image Transfer Using Genetic Algorithm Key Generation. International Journal of Computer Sciences and Engineering, 3(5), 283-287.

BibTex Style Citation:
@article{Patil_2015,
author = {Suvarna Patil},
title = {A Parallel AES of Faster Image Transfer Using Genetic Algorithm Key Generation},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2015},
volume = {3},
Issue = {5},
month = {5},
year = {2015},
issn = {2347-2693},
pages = {283-287},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=519},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=519
TI - A Parallel AES of Faster Image Transfer Using Genetic Algorithm Key Generation
T2 - International Journal of Computer Sciences and Engineering
AU - Suvarna Patil
PY - 2015
DA - 2015/05/30
PB - IJCSE, Indore, INDIA
SP - 283-287
IS - 5
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2618 2290 downloads 2523 downloads
  
  
           

Abstract

Now exponentially increased the use of information exchange and the multimedia applications. Security is the essential criterion in cryptography for the transmission of data or message in the secured form in all the applications. For preserving the privacy of data onto different applications encryption is a crucial technique. Advanced Encryption Standard algorithm is used for encrypting the image. The genetic algorithm is an important method of solving the optimization problem. This paper is based on the genetic algorithm used for making the encryption key stronger. Using parallel AES algorithm the experimental results show that it improves the fastness of the AES algorithm and meet the security demand.

Key-Words / Index Term

AES, Genetic Algorithm, Cryptography, HD Image, Security

References

[1] Bhavin Patel, Neha Pandya, “Data Transfer Security Solution for Wireless Sensor Network”, International Journal of Computer Application Technology and Research Volume-2, Issue 01, 63-66, 213.
[2] Divyani UdayKumar Singh et al, “Separable Reversible Data Hiding in Image Using Advanced Encryption Standard with Fake Data Generation”, International Journal of Computer Science and Information Technologies, Volume 5(3), 214.
[3] Sourabh Singh, Anurag Jain, “An Enhanced Text to Image Encryption Technique using RGB Substitution and AES”, International Journal of Engineering Trends and Technology (IJETT) – Volume 04, 213.
[4] Salim M. Wadi, Nasharuddin Zainal, “Rapid Encryption Method Based on AES Algorithm for Grey Scale HD Image Encryption”, International Conference on Electrical Engineering and Informatics (ICEEI), 213.
[5] K. Brindha, G. Ramya, Rajpal Amit Jayantila, “Secured Data Transfer in Wireless Networks Using Hybrid Cryptography”, International Journal of Advanced Research in Computer Science and Software Engineering , Volume 03, 213.
[6] Adam Berent, “Advanced Encryption Standard by Example”.
[7] Kamali S. H., Shakerian R., Hedayati M., Rahmani M., “A New Modified Version of Advanced Encryption Standard Based Algorithm for Image Encryption”, International Conference on Electronics and Information Engineering, 210.
[8] NIST, Advanced Encryption Standard (AES), Federal Information Processing Standards Publication 197, 202.
[9] Ahmed Bashir Abugharsa, Abd Samad Bin Basari, Hasan Hamida Almangush, “A New Image Encryption Approach using The Integration of A Shifting Technique and The Aes Algorithm”, International Journal of Computer Applications (0975-8887), Volume 42- No.09, March 212.
[10] M. I .Youssef, A. E. Emam, S. M. Saafan, M. Abd Elghany, “Secured Image Encryption Scheme Using both Residue Number System and DNA Sequence”, International Journal of Emerging Science and Engineering (IJESE) ISSN: 2319-6378,Volume 01, Issue12, October 213.
[11] Aarti Soni, Suyash Agrawal, “Key Generation Using Genetic Algorithm for Image Encryption”, International Journal of Computer Science and Mobile Computing (IJCSMC,), Volume 02, Issue. 06, June 213.
[12] Dr. Poornima G. Naik, Girish R. Naik, “Asymmetric Key Encryption using Genetic Algorithm”, International Journal of Latest Trends in Engineering and Technology (IJLTET), ISSN: 2278-621X, Volume 03, Issue 03, January 214.
[13] Somalina Chowdhury, Sisir Kumar Das, Annapurna Das, “Application of Genetic Algorithm in Communication Network Security”, International Journal of Innovative Research in Computer and Communication Engineering, Volume 03, Issue 01, January 215.
[14] Vijaya Madhavi Lakshmi. Challa, Manasa. Bezawada, Anusha. Tenali, “An Image encryption Approach using Multilayer Crossover and Mutation Procedures”, International Journal of Advanced Research in Computer Science and Software Engineering, ISSN: 2277 128X, Volume 05, Issue 02, February 215.
[15] Sliman Arrag, Abdellatif Hamdoun, Abderrahim Tragha and Salah eddine Khamlich, “Replace AES Key Expansion Algorithm By Modified Genetic Algorithm”, Applied Mathematical Sciences, no. 144, 7161 – 7171, Volume 07, 213.
[16] Sonia Goyat, “Genetic Key Generation for Public Key Cryptography”, International Journal of Soft Computing and Engineering (IJSCE), ISSN: 2231-2307, Volume 02, Issue 03, July 212.
[17] Roza Afarin, Saeed Mozaffari, “Gray Level Image Encryption”, International Journal of Computer, Control, Quantum and Information Engineering, Volume 08, No:06, 214.
[18] Aarti Soni, Suyash Agrawal, “Using Genetic Algorithm for Symmetric key Generation in Image Encryption”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), ISSN: 2278 – 1323, Volume 01, Issue 10, December 212.
[19] Ankita Agarwal, “Secret Key Encryption Algorithm Using Genetic Algorithm”, International Journal of Advanced Research in Computer Science and Software Engineering, ISSN: 2277 128X, Volume 02, Issue 04, April 212.
[20] Suvarna Patil, Rahul Patil, “Faster Transfer of AES Encrypted Data over Network”, International Journal of Computer Science and Information Technologies (IJCSIT), 7674-7676, Volume 5(6), 2014.
[21] R. Kanimozhi, “A Novel Secure Multimedia message Hiding Algorithm behind the Image” SSRG International Journal of Computer Science and Engineering (SSRG-IJCSE), ISSN-2348-8387, Volume 01, Issue 08, October 214.