2017
DOI: 10.21015/vtcs.v13i1.453
|View full text |Cite
|
Sign up to set email alerts
|

Digital Image Encryption Implementations Based on AES Algorithm

Abstract: Objectives: To increase needed for exchanging digital photos electronically, due to alarming demand for multimedia applications, and because of the increasing use of images in electronic processes. Hence, the need for protection by unauthorized user is necessary. Method: This paper primarily is focusing on the necessary protection of these images using a specific analyzes algorithm: Advanced Encryption Standard (AES) with a full its description, which is known as an algorithm (Rijndael). Findings: It will be d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…Here, the most important algorithms are going to address which are followed in this research. As mentioned earlier, cryptography divided into two general categories depending on the algorithms used: Symmetric key and asymmetric encryption [1,3,5].…”
Section: Overview Of Algorithmmentioning
confidence: 99%
See 4 more Smart Citations
“…Here, the most important algorithms are going to address which are followed in this research. As mentioned earlier, cryptography divided into two general categories depending on the algorithms used: Symmetric key and asymmetric encryption [1,3,5].…”
Section: Overview Of Algorithmmentioning
confidence: 99%
“…In addition to being more resistant to current attacks. The AES algorithm consists of 128 block length of bits that support other keys of length 11, 13, or 15 subkeys each of 128, 192 and 256 respectively [1,3,4,7], and 128 bits each have one subkey that corresponds to each round of AES processing; Therefore, each subkey can be indicated to as a round key. Where is the Add Round Key phase, which combines using the XOR function, and the combination of the block of the current state data and the round key matching to the specified round, then the Sub Bytes phase replaces every byte through the fixed lookup table and inserted it into it, and that is between the case data while the four bytes of case data in every row are rotated the Shift Rows phase within an array the process of performing a quad-byte conversion of the case data in every column in the case data array is in the Mixed Columns phase [7].…”
Section: B the Advanced Encryption Algorithm (Aes)mentioning
confidence: 99%
See 3 more Smart Citations