Secured Transmission of A Real Time Image and Text Using Advanced Encryption Standard For Military Purpose
Secured Transmission of A Real Time Image and Text Using Advanced Encryption Standard For Military Purpose
ISSN 2278-6856
Abstract
Army requires secure method which can transmit and receive
images of current location without unwanted third party
intrusion attack. This paper proposes the method in which text
and image encryption performed at the transmitter side. This
encrypted text and image can be sent through any wired or
wireless media to the receiver. At the receiver the decryption
of text and image can be performed. For both the encryption
and decryption Advanced Encryption Standard is used.
Any other available current technology either performs the
text encryption and decryption or performs the image
encryption and decryption. But this research proposes the
technology which can perform the both text as well as image
encryption decryption using the single gadget.
For text encryption and decryption 128 bit text inputs are
synthesized and simulated using simple C language code.
For image encryption and decryption any form of image input is
synthesized and simulated using simple java code.
This research uses the small gadget which comprises of two
different platforms. Each platform is used to execute either C
language Code or Java Code.
The result obtain from this research is completely intrusion free
and very fast.
1. INTRODUCTION
Encryption and decryption of information is widely used
to avoid the unwanted intrusion attack in transmission and
storage of digital media. This process can be performed by
many methods like Data Encryption Standard, Blow-fish
Algorithm, Triple DES algorithm etc. But many of these
methods are susceptible to various kinds of attacks like
Brute Force Attack, attack on reflectively weak keys,
differential cryptanalysis attack etc.
Therefore the need of most secure and flexible algorithm
arises. The National Institute of Standards and
Technology (NIST) started a search of Federal
information Processing Standard (FIPS). This standard
should be secure, fast and most flexible. This standard
2. PREVIOUS WORK
Data can be stored in many forms. For example, it is used
in the form of DBMS, ontology [7], taxonomies, etc. Data
that is decisive has to be encrypted because data is
backbone of industry.
2.1International Status
Modified AES for image encryption is proposed in [1]. In
this paper, author adds a key stream generator (A5/1, W7)
to AES. Due to this the encryption performance increases
for the images which are characterized by reduced
entropy. The detailed results shown in this paper
concludes the superiority of modified algorithm.
The enhanced model of Advanced Encryption Standard is
proposed in [2]. This model is mainly proposed for
possessing the better range of image encryption and good
level of security. By adjusting the Shift Row
Transformation the modification process can be carried
out. After the proper comparison between the original
AES encryption algorithm and the modified algorithm,
authors found that modified algorithm produces very good
encryption results focusing towards the security against
statistical attacks.
For the image security purpose the block-based
transformation algorithm is proposed in [3]. For this
transformation author uses the combination of image
transformation and image encryption techniques. This
algorithm is used prior to encryption. Purpose of this
algorithm is to confuse the relationship between the
generated image and the original image. The experimental
results in this paper show that this combinational
technique gives higher entropy value and lower
correlation value. Also it gives the more uniform
histogram and increases security of encrypted images as
compared to the Blowfish algorithm alone.
The problem related with simultaneous selective
encryption and image compression is addressed by [4].In
this paper the AES with Cipher Feedback (CFB) mode is
used to perform the selective encryption and image
compression is performed by JPEG algorithm. In this way
selective encryption and compression of images is easily
performed without affecting the compression rate and also
keeps JPEG bit stream compliance.
Text and image encryption is decryption using advanced
encryption standard is performed in [8]. In this DSP
processor and code composer studio is used for the text
encryption and decryption. For the image encryption and
ISSN 2278-6856
Security
Speed
No
attacks
have
been
reported
against
any of
the
finalists,
and no
other
properti
es have
been
reported
that
would
disqualif
y any of
them.
Enc/De
c
Key
RAM
ROM
High
Averag
e
Averag
e
Low
end
Low
end
Adequat
e
High
end
Averag
e
Averag
e
High
end
Adequat
e
High
end
High
end
High
end
High
end
Serpent
High
Low
end
Averag
e
Averag
e
Average
Twofish
High
Averag
e
High
end
High
end
Average
Mars
RC6
Rijndeal
Memory
3. SYSTEM MODEL
This project captures the image data in real time. Makes
the encryption of data using particular code word in AES
and transmit it through medium. After reception of data
same codeword should be given to decrypt the data.
Decryption gives the original image transmits from the
source. The similar process can be performed to send the
any text data from the transmitter to the receiver. This
project uses 128 bit AES algorithm is used in which each
character or space or number or symbol consists of 8 bit
binary code. Hence 128 8 = 16 characters or spaces or
symbol or number or mixture of all these can be used as
an input message or as a password.
In this way using the same gadget at the same time we can
transmit the text data as well as image data. At the
transmitter side simultaneous encryption of text and image
Page 147
ISSN 2278-6856
Image Transmission
Image Reception
Image Decryption
4. PROPOSED METHODOLOGY
Different operational modes of AES are Electronic
Codebook (ECB), Cipher Block Chaining (CBC), Output
Feedback (OFB), Cipher Feedback (CFB) and Counter
(CTR).
This research uses the modified version of AES in CBC
mode with Public Key Cryptography Standard 5
(PKCS#5) padding. Also for increasing the security salt
bytes are appended with the password. In addition to that
in this process password based encryption is performed by
MD5 and DES algorithm.
In the process of decryption appended salt bytes are
removed and decryption is performed using the same
password.
No
Is this
expected
password?
Yes
Detect and remove the appended salt bytes from the password
Make a PBE Cipher object using MD5 and DES algorithm
and initialize it to decrypt using the given password.
Decrypt the image file and text file and save it to specified
location
Decrypted Image
Page 148
ISSN 2278-6856
5.SIMULATION/EXPERIMENTAL RESULTS
In this research initially user 1 and user 2 decide two
different or the similar password for the text and image
encryption and decryption. The 128 text input and desired
captured image input is provided to the gadget. Using the
suitable platform the gadget performs the encryption of
this input. The encryption process only completed after
inserting the desired password by user 1. In this way two
separate encrypted files are generated for text input and
image input. The encrypted password protected input is
send through transmitter by using internet, Bluetooth,
NFC or any other media. At the receiver the encrypted
image files and the encrypted text file is observed to user
2. User 2 inserted the already communicated password for
the encrypted image and the text file. After inserting the
password the original decrypted image and text file can be
obtained to the user 2.
The results of text encryption and decryption are as
follows.
Input Message: Pqrstuvwxyz
128 bit key or password: ABCDEFGHIJK
Encrypted Message:
Decrypted Message: Pqrstuvwxyz
ISSN 2278-6856
6.ADVANTAGES OF AES
AES is most useful encryption decryption algorithm
because of following advantages [6]
Advantages
It is royalty free very less cost solution.
This is most secured completely intrusion free
algorithm. Therefore third party intrusion attack is
100% avoided.
This uses flexible and easy to use method.
No need of particular training to use this method.
Image Size
on Disk
66KB
512*512
258KB
2.796286ms
1024*102
3.07MB
167.11ms
Image (Size)
Lisaw (256256)
31.75 ms
Lena(256256)
31.75 ms
Cheetah(200320)
29, 25 ms
Clown (200320)
29, 25 ms
Rose (200320)
29, 25 ms
Mouse (200320)
29, 25 ms
7.CONCLUSION
The gadget used invented in this research is extremely
useful for the soldier. Because soldier can easily capture
the image of the terrorist attack and easily send it to the
battalion to take the further required actions. Also a text
data can send by the soldier. Both text and image data
send in the encrypted form and hence unwanted intrusion
attack is totally avoided.
8.FUTURE SCOPE
References
[1] M. Zeghid, M. Machhout, L. Khriji, A. Baganne, and
R. Tourki, A Modified AES Based Algorithm For
Image Encryption International Journal of Computer
Science and Engineering Volume 1 Number
[2] Seyed Hossein Kamali, Reza Shakerian, Maysam
Hedayati, Mohsen Rahmani, A New Modified
Version of Advanced Encryption Standard(AES)
Based Algorithm for Image Encryption, IEEE
Transactions on Electronics and Information
Engineering, Vol 1,pp.141-145,2010
[3] Mohammad Ali Moh'd Bani Younes, An Approach
To Enhance Image Encryption Using Block-Based
Transformation Algorithm, Thesis submitted in
fulfillment of the requirements for the degree of
Doctor of Philosophy University of Sains Malaysia,
2009.
Page 150
AUTHOR
Prof. Kundankumar Rameshwar
Saraf received his M.E. degree in
VLSI Design and Embedded System
from K.arrmveer Kakasaheb Wagh
Institute of Engineering Education &
Research (K.K. Wagh), Nashik,
Savitribai Phule Pune University in 2013. He received his
B.E. degree from Shri Shivaji Vidyaprasarak Sansthas
Bapusaheb Shivajirao Deore College of Engineering,
Dhule, North Maharashtra University in 2010. He has got
6 years of teaching experience as an Assistant Professor in
Electronics and Tele Communication Engineering. He is
now performing the research on Light Fidelity Technology
and video encryption and decryption using Advanced
Encryption Standard.
Prof. Kushal Namdeo Mandge
received his M.E. degree in E&TC
from Datta Meghe College of
Engineering, Airoli, Navi Mumbai,
Univeristy of Mumbai in 2014. He
received his B.E. degree from
SSPMs College of Engineering,
Kankavali, University of Mumbai in
ISSN 2278-6856
Page 151