131
Views
3
CrossRef citations to date
0
Altmetric
Research Articles

Modified Symmetric Image Encryption Approach Based on Mixed Column and Substitution Box

ORCID Icon, ORCID Icon & ORCID Icon

References

  • Abikoye, O. C., Haruna, A. D., Abubakar, A., Akande, N. O., & Asani, E. O. (2019). Modified advanced encryption standard algorithm for information security. Symmetry, 11(12), 1484. https://doi.org/10.3390/sym11121484
  • Ajish, S., & AnilKumar, K. S. (2021). Secure mobile internet voting system using biometric authentication and wavelet based AES. Journal of Information Security and Applications, 61(September), 102908. https://doi.org/10.1016/j.jisa.2021.102908
  • Alamsyah, A. B., & Adji, T. B. (2017). AES S-box construction using different irreducible polynomial and constant 8-bit vector [Paper presentation]. 2017 IEEE Conference on Dependable and Secure Computing (pp. 366–369). https://doi.org/10.1109/DESEC.2017.8073857
  • Al-Hazaimeh, O., Al-Jamal, M., Alomari, A. K., Bawaneh, M., Tahat, N., & Alomar, M. (2022). Image encryption using anti-synchronisation and Bogdanov transformation map. International Journal of Computing Science and Mathematics, 15(1), 43–59. https://doi.org/10.1504/IJCSM.2022.10046284
  • Al-Hazaimeh, O., Nouh & Hayajneh, A., & Sofyan & Almomani, D. (2014). HANON chaotic map-based new digital image encryption algorithm. MAGNT Research Report, 2, 261–266.
  • Babrahem, A. S., & Monowar, M. M. (2021). Preserving confidentiality and privacy of the patient’s EHR using the OrBAC and AES in cloud environment. International Journal of Computers and Applications, 43(1), 50–61. https://doi.org/10.1080/1206212X.2018.1505025
  • Basu, S., Karuppiah, M., Rajkumar, S., & Niranchana, R. (2018). Modification of AES using genetic algorithms for high-definition image encryption. International Journal of Intelligent Systems Technologies and Applications, 17(4), 452. https://doi.org/10.1504/IJISTA.2018.095106
  • Bhavani, Y., Puppala, S. S., Krishna, B. J., & Madarapu, S. (2019). Modified AES using Dynamic S-Box and DNA Cryptography [Paper presentation]. 2019 Third International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC) (pp. 164–168). https://doi.org/10.1109/I-SMAC47947.2019.9032516
  • Brahim, A. H., Pacha, A. A., & Said, N. H. (2021). A new image encryption scheme based on a hyperchaotic system & multi specific S-boxes. Information Security Journal: A Global Perspective, 1–17. https://doi.org/10.1080/19393555.2021.1943572
  • Chauhan, Y. S., & Sasamal, T. N. (2019). Enhancing security of AES using key dependent dynamic Sbox. IEEE Xplore, July 1.
  • Chowdhary, C. L., Patel, P. V., Kathrotia, K. J., Attique, M., Perumal, K., & Ijaz, M. F. (2020). Analytical study of hybrid techniques for image encryption and decryption. Sensors, 20(18), 5162. https://doi.org/10.3390/s20185162
  • Chowdhury, A. R., Mahmud, J., Kamal, A. R. M., & Hamid, M. A. (2018). MAES: Modified advanced encryption standard for resource constraint environments [Paper presentation]. 2018 IEEE Sensors Applications Symposium (SAS) (pp. 1–6). https://doi.org/10.1109/SAS.2018.8336747
  • Dara, M., & Manochehri, K. (2014). Using RC4 and AES key schedule to generate dynamic S-Box in AES. Information Security Journal: A Global Perspective, 23(1–2), 1–9. https://doi.org/10.1080/19393555.2013.877541
  • Das, S., & Ghosh, R. (2015). Study of randomness in AES ciphertexts produced by various types of dynamic S-boxes. International Journal of Information and Communication Technology, 7(6), 537–561. https://doi.org/10.1504/IJICT.2015.072037
  • De, S., & Bhaumik, J. (2014). TBLT-AES: A robust image encryption scheme. Journal of Discrete Mathematical Sciences and Cryptography, 17(3), 273–288. https://doi.org/10.1080/09720529.2014.927645
  • Gupta, A., & Agrawal, A. (2022). Advanced encryption standard algorithm with optimal S-box and automated key generation [Paper presentation]. 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE) (pp. 2112–2115). https://doi.org/10.1109/ICACITE53722.2022.9823662
  • Hu, Q., Fan, X., & Zhang, Q. (2019). An effective differential power attack method for advanced encryption standard [Paper presentation]. 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC) (pp. 58–61). https://doi.org/10.1109/CyberC.2019.00019
  • Islam, M. R., Tanni, T. R., Parvin, S., Sultana, M. J., & Siddiqa, A. (2021). A modified LSB image steganography method using filtering algorithm and stream of password. Information Security Journal: A Global Perspective, 30(6), 359–370. https://doi.org/10.1080/19393555.2020.1854902
  • Joshy, A., Amitha Baby, K. X., Padma, S., & Fasila, K. A. (2017). Text to image encryption technique using RGB substitution and AES [Paper presentation]. 2017 International Conference on Inventive Computing and Informatics (ICICI) (pp. 1133–1136). https://doi.org/10.1109/ICICI.2017.8365317
  • Kareem, S. M., & Rahma, A. M. S. (2021). New method for improving add round key in the advanced encryption standard algorithm. Information Security Journal: A Global Perspective, 30(6), 371–383. https://doi.org/10.1080/19393555.2020.1859654
  • Khan, M., & Munir, N. (2019). A novel image encryption technique based on generalized advanced encryption standard based on field of any characteristic. Wireless Personal Communications, 109(2), 849–867. https://doi.org/10.1007/s11277-019-06594-6
  • Lavanya, R., & Karpagam, M. (2020). Enhancing the security of AES through small scale confusion operations for data communication. Microprocessors and Microsystems, 75(June), 103041. https://doi.org/10.1016/j.micpro.2020.103041
  • Liu, Y., Gong, W., & Fan, W. (2018). Application of AES and RSA hybrid algorithm in E-mail [Paper presentation]. 2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS) (pp. 701–703). https://doi.org/10.1109/ICIS.2018.8466380
  • Malek, J., Machhout, M., Hafsa, A., Sghaier, A., & Zeghid, M. (2020). An improved co-designed AES-ECC cryptosystem for secure data transmission. International Journal of Information and Computer Security, 13(1), 118. https://doi.org/10.1504/IJICS.2020.10028859
  • Manjula, G., & Mohan, H. S. (2018). Improved dynamic S-Box generation using Hash function for AES and its performance analysis [Paper presentation]. 2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT) (pp. 109–115). https://doi.org/10.1109/ICGCIoT.2018.8753074
  • Mehta, D., Jha, M., Suhagiya, H., & Mangrulkar, R. (2022). DieRoll: A unique key generation and encryption technique. Journal of Applied Security Research, 1–28. https://doi.org/10.1080/19361610.2022.2124589
  • Mhatre, M., Kashid, H., Jain, T., & Chavan, P. (2022). BCPIS: Blockchain-based counterfeit product identification system. Journal of Applied Security Research, 1–26. https://doi.org/10.1080/19361610.2022.2086784
  • Patel, H., & Baldwin, R. (2014). Random forest profiling attack on advanced encryption standard. International Journal of Applied Cryptography, 3(2), 181. https://doi.org/10.1504/IJACT.2014.062740
  • Quenaya, M. R., Villa-Herrera, A.-A., Chambi Ytusaca, S. F., Yauri Ituccayasi, J. E., Velazco-Paredes, Y., & Flores-Quispe, R. (2021). Image encryption using an image pattern based on advanced encryption standard [Paper presentation]. 2021 IEEE Colombian Conference on Communications and Computing (COLCOM) (pp. 1–6). https://doi.org/10.1109/COLCOM52710.2021.9486298
  • Santhosh Kumar, B. J., Roshni Raj, V. K., & Nair, A. (2017). Comparative study on AES and RSA algorithm for medical images [Paper presentation]. 2017 International Conference on Communication and Signal Processing (ICCSP) (pp. 501–504). https://doi.org/10.1109/ICCSP.2017.8286408
  • Singh, A., Agarwal, P., & Chand, M. (2019). Image encryption and analysis using dynamic AES [Paper presentation]. 2019 5th International Conference on Optimization and Applications (ICOA) (pp. 1–6). https://doi.org/10.1109/ICOA.2019.8727711
  • Sultan, I., Mir, B. J., & Banday, M. T. (2020). Analysis and optimization of advanced encryption standard for the internet of things [Paper presentation]. 2020 7th International Conference on Signal Processing and Integrated Networks (SPIN) (pp. 571–575). https://doi.org/10.1109/SPIN48934.2020.9071380
  • Thinn, A. A., & Thwin, M. M. S. (2019). Modification of AES algorithm by using second key and modified subbytes operation for text encryption. In R. Alfred, Y. Lim, A. Ibrahim, & P. Anthony (Eds.), Computational science and technology. Lecture notes in electrical engineering (Vol. 481). Springer. https://doi.org/10.1007/978-981-13-2622-6_42
  • Yu, L., Zhang, D., Wu, L., Xie, S., Su, D., & Wang, X. (2018). AES design improvements towards information security considering scan attack [Paper presentation]. 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE) (pp. 322–326). https://doi.org/10.1109/TrustCom/BigDataSE.2018.00056

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.