International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020


IJSTR >> Volume 8 - Issue 7, July 2019 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616

An Image Encryption & Decryption And Comparison With Text - AES Algorithm

[Full Text]



Dr. N. Suba Rani, Dr. A. Noble Mary Juliet, K. Renuka Devi



AES, Cryptography, Decryption, Encryption, Image.



With the advent of internet technology, the number of unauthorized users to access the data increases.so, the transmission of information through image becomes more. And it also becomes more reliable form to transmit data. There are number of algorithms available to solve this problem. One of the efficient method is to use AES (Advanced Encryption Standard) algorithm, the most notable and extensively used cryptographic algorithm because it is six times faster than 3-DES and much faster than RSA algorithm. In this paper we proposed an image encryption and decryption algorithm using AES in which encryption contains a random image and decryption contains original image. The algorithm is implemented in java. The efficiency of AES is compared using image and text and it is analyzed. The result thus shows that the sharing of information through image is much more reliable and efficient than sharing information as text.



[1]. William Stallings, “Cryptography and network Security:principles and practice”; Pearson Publication, london, pp. 148-183, 2011.
[2]. Mohammad Amjad, “Security Enhancement of IPV6 Using Advance Encryption Standard and Diffie Hellman”, International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.3, pp.182-187, 2017.
[3]. Roshni Padate, Aamna Patel, “Image Encryption and Decryption Using AES Algorithm”, International Journal of Electronics and Communication Engineering & Technology (IJECET), Vol.6, Issue.3, pp.23-29, 2015.
[4]. Priya Deshmukh, “An Image Encryption and Decryption Using AES Algorithm”, International Journal of Scientific & Engineering Research(IJSER), Vol.7, Issue.2, pp.210-213, 2016.
[5]. M. D. Randeri1, S. D. Degadwala, A. Mahajan, “A Study on Image Encryption Using Key Matrix Generation from Biometric Mixed Fingerprint Image for Two Level Security”, International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), Vol.2, Issue.6, pp.486-490, 2017.
[6]. Guang-liang Guo, Quan Qian, Rui Zhang, “Different Implementations of AES Cryptographic Algorithm”, In the Proceedings of the 2015 IEEE International Conference on High Performance Computing and Communications (HPCC 2015), New York, USA, pp.1848-1853, 2015.
[7]. Amina Msolli, Abdelhamid Helali, Hassen Maaref, “Image encryption with the AES algorithm in wireless sensor network”, In the Proceedings of the 2016 IEEE International Conference on Advanced Technologies for Signal and Image Processing(ATSIP 2016), Monastir, Tunisia, pp.41-45, 2016.
[8]. Siti Zarina Md Naziri, Norina Idris, “The Memory-less Method of Generating Multiplicative Inverse Values for S-box in AES Algorithm”, In the Proceedings of the 2008 IEEE International Conference on Electronic Design, Penang, Malaysia, pp.978-982, 2008.
[9]. B.Subramanyan, Vivek.M.Chhabria, T.G.Sankar babu, “Image Encryption Based On AES Key Expansion”, In the Proceedings of the 2011 Second International Conference on Emerging Applications of Information Technology, Kolkata, India, pp.217-220, 2011.
[10]. Qi Zhang, Quinding, “Digital Image Encryption Based On Advanced Encryption Standard(AES) Algorithm”, In the Proceedings of the 2015 Fifth International Conference on Instrumentation and Measurement, Computer, Communication and Control, Qinhuangdao, China, pp.1218-1221, 2015.
[11]. P. Thakkar, H.K. Mishra, Z. Shaikh, D. Sharma, “Image Encryption and Decryption System Using AES for Secure Transmission”, International Journal of Computer Sciences and Engineering(IJCSE), Vol.5, Issue.5, pp.109-114, 2017.