Online ISSN: 2515-8260

Keywords : AES


IMAGE ENCRYPTION USING AES FEATURE EXTRACTION AND RANDOM NO. GENERATION

Dr.M.Rajaiah, Mr. Syed Akthar Basha,, Mr.D.Hidayathulla, Mr.V.Anirudh Reddy, Ms.S.Kusuma,, Mr.S.Ansar Ahammad, .

European Journal of Molecular & Clinical Medicine, 2023, Volume 10, Issue 2, Pages 453-460

During data transmission, data can be transmitted in the form of text, image, audio and video, hence securing all kinds of data is most essential in today’s era. With the advent of internet technology, the number of unauthorized users to access the data increases.so, the transmission of information through imagesbecomes more. And it also becomes a more reliable form to transmit data. There are a number of algorithms available to solve this problem. One of the efficient methods is to use the AES (Advanced Encryption Standard) algorithm, the most notable and extensively used cryptographic algorithm because itis six times faster than 3- DES and much faster than the RSA algorithm. In this paper we proposed an image encryption and decryption algorithm using AES in which encryption contains a random image and decryption contains the original image. The efficiency of AES is compared using image and text and it is analyzed. The result thus shows that the sharing of information through image is much more reliable and efficient than sharing information as text. Index Terms: AES, Cryptography, Decryption, Encryption, Image.

A Review Paper On Concepts Of Cryptography And Cryptographic Hash Function

Dr. R.K Gupta

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 7, Pages 3397-3408

We start with basic concepts of cryptography and move towards its history. Main concentration is on various algorithms including DES, RSA. Here we also discussed cryptographic hash functions- MD family, SHA family and RIPEMD, BLAKE and WHILPOOL families also and finally we wind up the paper comparison