Open Access Open Access  Restricted Access Subscription or Fee Access

Security for Image Processing uses AES in MANET

N. M. Abroja, K. Shaheena Banu, R. Ambikapathy

Abstract


The Mobile adhoc network is self-configuring (a temporary network). MANET is becoming more popular due to their flexibility, low cost and ease of deployment.  Advantages of MANET are easy to install, easy to transfer data from source to destination and also easy to hack the data by hacker through MANET, image splitting, data hiding is used in image splitting processing. Data Security is the main concern for each communication system. The unremitting development of the Internet and communication skills has made the wide use of images obligatory. There are many ways to provide refuge for data that is being interconnected. This paper defines an effective security for communication by AES algorithm for encryption and decryption. It is constructed on AES Key Extension in which the encryption process is a bit wise private or operation of a set of image pixels along with the a 128 bit key which vicissitudes for every set of pixels.


Keywords


Decryption, Encryption, Image Processing, Splitting, Steganography.

Full Text:

PDF

References


“The encrypted message is embedded on to a part of the secret image” International Journal of Managing Information Technology (IJMIT) Vol.5, No.2, May 2013.

Visual Cryptography Moni Naor and Adi Shamir EUROCRYPT -1994

Resolution Variant Visual Cryptography for Street View of Google Maps Jonathan WeirWeiQi YanQueen‘s University Belfast Belfast, BT7 1NN

Koo Kang in IEEE transactions on image processing, vol. 20, no. 1, January 2011

“Dipesh Patel, Dr. Rakesh Nagi, Ad hoc Wireless Networks”, A Presentation October 17, 2001. [Courtesy of http://www.acsu.buffalo.edu/~nagi/courses/ 684/adhoc.pdf]

“Steganography Using Dictionary Sort on Vector Quantized Codebook”,Dr. H.B. Kekre, Archana Athawale, TanujaSarode, Sudeep Thepade &Kalpana Sagvekar International Journal of Computer Science and Security (IJCSS), Volume (4): Issue (4) 392

“H.B.Kekre, Archana Athawale and Pallavi N.Halarnkar,” Polynomial Transformation to improve Capacity of Cover Image For Information Hiding in Multiple LSBs, International Journal of Engineering Research and Industrial Applications (IJERIA), Ascent Publications, Volume 2,March 2009.

“Rosy and Mohamed” Performance Evaluation of Pixel Value Differencing and Kekre’s Modified Algorithm for Image Hiding in Images”, ACM International Conference on Advances in Computing, Communication and Control (ICAC3) 2009.

Proposed System for data hiding using Cryptography and Steganography for image processing in MANET.

International Journal of Engineering Research and Technology (IJERT), AES Algorithm, June 2012.

P.Karthigaikumar, Soumiya Rasheed, IJCA Special Issue on Computational Science 2011, 166-172.

Irfan AbdulGani Landge, International J. of Engg. Research & Indu. Appls. (IJERIA). ISSN 0974 (August 2011), 395-406.

J. V. Gorabal and Manjaiah D. H, “Image Encryption Approach for Security Issues” International Journal of Information Technology and Management Information Systems (IJITMIS), Volume 5, Issue 2, 2010.

B.Subramanyan, Vivek.M.Chhabria, T.G.Sankar babu, Image ncryption Based on AES Key Expansion, 2011 Second International Conference on Emerging Applications of Information Technology.

Priyanka Chauhan and Girish Chandra Thakur, “Efficient Way of Image Encryption Using Generalized Weighted Fractional Fourier Transform with Double Random Phase Encoding”, October 2006.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.