메뉴 건너뛰기




Volumn , Issue , 2013, Pages 293-298

A novel cryptographic encryption technique for securing digital images in the cloud using AES and RGB pixel displacement

Author keywords

AES; crytography; image; pixel displacement; simulation

Indexed keywords

DATA PRIVACY; DIGITAL STORAGE; MATLAB; PIXELS; VIDEO RECORDING;

EID: 84899582314     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/EMS.2013.51     Document Type: Conference Paper
Times cited : (15)

References (34)
  • 1
    • 79959557055 scopus 로고    scopus 로고
    • Addressing cloud computing security issues
    • March 2012, DOI=10 1016/j.future.2010.12.006
    • Dimitrios Zissis and Dimitrios Lekkas 2012 Addressing cloud computing security issues Future Gener Comput Svst 28, 3 (March 2012) 583-592. DOI=10 1016/j.future.2010.12.006
    • (2012) Future Gener Comput Svst , vol.28 , Issue.3 , pp. 583-592
    • Zissis, D.1    Lekkas, D.2
  • 7
    • 84862326265 scopus 로고    scopus 로고
    • A technique for image encryption based on explosive n*n block displacement followed by inter-pixel displacement of RGB attribute of a pixel
    • 888, 11-13 May, doi; 10.1109/CSN1.2012.190
    • *n Block Displacement Followed by Inter-pixel Displacement of RGB Attribute of a Pixel", Communication Systems and Network lechnologies (CSNT), 2012 International Conference on, vol., no., pp. 884, 888, 11-13 May 2012 doi; 10.1109/CSN1.2012.190.
    • (2012) Communication Systems and Network Lechnologies (CSNT), 2012 International Conference On , pp. 884
    • Goel, A.1    Chandra, N.2
  • 8
    • 84872409662 scopus 로고    scopus 로고
    • Cryptographie technique for image encryption based on the RGB pixel displacement
    • 77, 25-27 Oct., doi; 10.1109/ICAS lech.2012.6381069
    • Kester, Q.; Koumadi, K. M., "Cryptographie technique for image encryption based on the RGB pixel displacement", Adaptive Science & Technology (ICAST), 2012 IEEE 4th International Conference on, vol., no., pp. 74, 77, 25-27 Oct. 2012 doi; 10.1109/ICAS lech.2012.6381069
    • (2012) Adaptive Science & Technology (ICAST), 2012 IEEE 4th International Conference On , pp. 74
    • Kester, Q.1    Koumadi, K.M.2
  • 10
    • 33746217099 scopus 로고    scopus 로고
    • Halftone visual cryptography
    • DOI 10.1109/TIP.2006.875249
    • Zhi Zhou; Arce, G. R.; Di Crescenzo, G., "Halftone visual cryptography", Image Processing, IEEE Transactions on, vol. 15, no. 8, pp. 2441, 2453, Aug. 2006 doi; 10.1109/TIP.2006.875249 (Pubitemid 44089115)
    • (2006) IEEE Transactions on Image Processing , vol.15 , Issue.8 , pp. 2441-2453
    • Zhou, Z.1    Arce, G.R.2    Di Crescenzo, G.3
  • 11
    • 57349122990 scopus 로고    scopus 로고
    • Colour visual cryptography schemes
    • 165, December, doi; 10.1049/iet-ifs;20080066
    • Liu, F.; Wu, C.-K.; Lin, X.-J.", Colour visual cryptography schemes", Information Security, IET, vol. 2, no. 4, pp. 151, 165, December 2008 doi; 10.1049/iet-ifs;20080066
    • (2008) Information Security, IET , vol.2 , Issue.4 , pp. 151
    • Liu, F.1    Wu, C.-K.2    Lin, X.-J.3
  • 12
    • 79551542887 scopus 로고    scopus 로고
    • Color extended visual cryptography using error diffusion
    • 145, Jan., doi; 10.1109/TIP.2010.2056376
    • In Koo Kang; Arce, G. R.; Lee, Heung-Kyu, "Color Extended Visual Cryptography Using Error Diffusion,: Image Processing, fEEE iransactions on, vol. 20, no. 1, pp. 132, 145, Jan. 2011 doi; 10.1109/TIP.2010.2056376
    • (2011) Image Processing, FEEE Iransactions On , vol.20 , Issue.1 , pp. 132
    • Kang, I.1    Arce, G.R.2    Lee, H.-K.3
  • 13
    • 83455237417 scopus 로고    scopus 로고
    • Improving the visual quality of size invariant visual cryptography scheme
    • February 2012, DOI=10.1016/j.jvcir.2011.11.003
    • Feng Liu, Teng Guo, ChuanKun Wu, and Lina Qian. 2012. Improving the visual quality of size invariant visual cryptography scheme. J. Vis. Comun. Image Represent. 23, 2(February 2012), 331-342. DOI=10.1016/j.jvcir.2011.11.003
    • (2012) J. Vis. Comun. Image Represent , vol.23 , Issue.2 , pp. 331-342
    • Liu, F.1    Guo, T.2    Wu, C.3    Qian, L.4
  • 14
    • 31244432974 scopus 로고    scopus 로고
    • A new approach for visual cryptography
    • December 2002, DOI=10.1023/A; 1019939020426
    • Wen-Otuey Tzeng and Chi-Ming Hu. 2002. A New Approach for Visual Cryptography. Des. Codes Cryptography 27, 3(December 2002), 207-227. DOI=10.1023/A; 1019939020426
    • (2002) Des. Codes Cryptography , vol.27 , Issue.3 , pp. 207-227
    • Tzeng, W.-O.1    Hu, C.-M.2
  • 15
    • 0037542969 scopus 로고    scopus 로고
    • Federal Information Processing Standards Publication 197. United States National Institute of Standards and 1 echnology NIST. November 26
    • Announcing the ADVANCED ENCRYPTION STANDARD (AES). Federal Information Processing Standards Publication 197. United States National Institute of Standards and 1 echnology (NIST). November 26, 2001.
    • (2001) Announcing the ADVANCED ENCRYPTION STANDARD (AES)
  • 16
    • 0004181422 scopus 로고    scopus 로고
    • 9/04/, National Institute of Standards and Technology
    • Daemen, Joan; Rijmen, Vincent (9/04/2003). "AES Proposal; Rijndael". National Institute of Standards and Technology. p. 1.
    • (2003) AES Proposal; Rijndael , pp. 1
    • Daemen, J.1    Rijmen, V.2
  • 18
    • 77958112921 scopus 로고    scopus 로고
    • Differential fault analysis against AES-192 and AES-256 with minimal faults
    • 9, 21-21 Aug., doi; 10.1109/FD1C.2010.10
    • Chong Hee Kim, "Differential Fault Analysis against AES-192 and AES-256 with Minimal Faults", Fault Diagnosis and tolerance in Cryptography (FD1C), 2010 Workshop on, vol., no., pp. 3, 9, 21-21 Aug. 2010 doi; 10.1109/FD1C.2010.10
    • (2010) Fault Diagnosis and Tolerance in Cryptography (FD1C), 2010 Workshop On , pp. 3
    • Kim, C.H.1
  • 19
    • 83455187945 scopus 로고    scopus 로고
    • From AES-128 to AES-192 and AES-256, how to adapt differential fault analysis attacks on key expansion
    • 53, 28-28 Sept., doi; 10.1109/FD1C.2011.15
    • Floissac, N.; Lhyver, Y., "From AES-128 to AES-192 and AES-256, How to Adapt Differential Fault Analysis Attacks on Key Expansion", Fault Diagnosis and Tolerance in Cryptography (FDTC), 2011 Workshop on, vol., no., pp. 43, 53, 28-28 Sept. 2011 doi; 10.1109/FD1C.2011.15
    • (2011) Fault Diagnosis and Tolerance in Cryptography (FDTC), 2011 Workshop On , pp. 43
    • Floissac, N.1    Lhyver, Y.2
  • 20
  • 24
    • 34249710720 scopus 로고    scopus 로고
    • Projective aspects of the AES inversion
    • DOI 10.1007/s10623-007-9059-4
    • Wen-Ai Jackson and S. Murphy. 2007. Projective aspects of the AES inversion. Des. Codes Cryptography 43, 2-3(June 2007), 167-179. DOI=10.1007/s 10623-007-9059-4 (Pubitemid 46828741)
    • (2007) Designs, Codes, and Cryptography , vol.43 , Issue.2-3 , pp. 167-179
    • Jackson, W.-A.1    Murphy, S.2
  • 25
    • 33745588540 scopus 로고    scopus 로고
    • Proving the security of AES substitution-permutation network
    • Bart Preneel and Stafford favares Eds.. Springer-Verlag, Berlin, Heidelberg, DOI=10.1007/116933835
    • Thomas Baigneres and Serge Vaudenay. 2005. Proving the security of AES substitution-permutation network. In Proceedings of the 12th international conference on Selected Areas in Cryptography (SAC 05), Bart Preneel and Stafford favares (Eds.). Springer-Verlag, Berlin, Heidelberg, 65-81. DOI=10.1007/116933835
    • (2005) Proceedings of the 12th International Conference on Selected Areas in Cryptography (SAC 05) , pp. 65-81
    • Baigneres, T.1    Vaudenay, S.2
  • 26
    • 64849108004 scopus 로고    scopus 로고
    • An 8-bit systolic AES architecture for moderate data rate applications
    • May 2009, DOI=10.1016/j.micpro.2009.02.013
    • Sheikh Muhammad Farhan, Shoab A. Khan, and Habibullah Jamal. 2009. An 8-bit systolic AES architecture for moderate data rate applications. Microprocess. Microsyst. 55, 3(May 2009), 221-231. DOI=10.1016/j.micpro.2009.02. 013
    • (2009) Microprocess. Microsyst. , vol.55 , Issue.3 , pp. 221-231
    • Farhan, S.M.1    Khan, S.A.2    Jamal, H.3
  • 32
    • 79851487059 scopus 로고    scopus 로고
    • Research and realization based on hybrid encryption algorithm of improved AES and ECC
    • 400, 23-25 Nov., doi; 10.1109/ICALIP.2010.5684554
    • Xiang Li; Junli Chen; Dinghu Qin; Wanggen Wan, "Research and realization based on hybrid encryption algorithm of improved AES and ECC", Audio Language and fmage Processing (ICALIP), 2010 International Conference on, vol., no., pp. 396, 400, 23-25 Nov. 2010 doi; 10.1109/ICALIP.2010.5684554
    • (2010) Audio Language and Fmage Processing (ICALIP), 2010 International Conference On , pp. 396
    • Li, X.1    Chen, J.2    Qin, D.3    Wan, W.4
  • 33
    • 33646500392 scopus 로고    scopus 로고
    • The rijndael algorithm
    • DOI 10.1109/MP.2004.1289996
    • Jamil, T., "The Rijndael algorithm", Potentials, IEEE, vol. 23, no. 2, pp. 36, 38, April-May 2004 doi; 10.1109/MP.2004.1289996 (Pubitemid 44208047)
    • (2004) IEEE Potentials , vol.23 , Issue.2 , pp. 36-38
    • Jamil, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.