Syed Basha Shaik, D. S. Devi, M. Sujithra, Sarika G, Vikas Tripathi, Dhiraj Kapila
{"title":"基于混合变换和增强AES的安全图像隐写技术","authors":"Syed Basha Shaik, D. S. Devi, M. Sujithra, Sarika G, Vikas Tripathi, Dhiraj Kapila","doi":"10.1109/ICAISS55157.2022.10010850","DOIUrl":null,"url":null,"abstract":"This, work uses a hybrid technique that combines the Modified Advanced Encryption Standard (MAES) and Elliptic Curve Cryptography to encrypt medical images (ECC). This article describes a modified AES for image encryption. For the global cryptosystem, a co-design approach is employed, with MAES processing on the NIOS II processor and hardware-accelerated scalar ECC multiplication. The suggested cryptographic system executes in a significantly shorter amount of time, which is a critical consideration for real implementation. This security assessment was effective, and our trials reveal that our proposed technique simplifies and corrects cryptography's essentials. In actuality, the results of the evaluation reveal that the proposed method is efficient, rapid, and secure.","PeriodicalId":243784,"journal":{"name":"2022 International Conference on Augmented Intelligence and Sustainable Systems (ICAISS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secure Image Steganography Technique based on Hybrid Transforms and Enhanced AES\",\"authors\":\"Syed Basha Shaik, D. S. Devi, M. Sujithra, Sarika G, Vikas Tripathi, Dhiraj Kapila\",\"doi\":\"10.1109/ICAISS55157.2022.10010850\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This, work uses a hybrid technique that combines the Modified Advanced Encryption Standard (MAES) and Elliptic Curve Cryptography to encrypt medical images (ECC). This article describes a modified AES for image encryption. For the global cryptosystem, a co-design approach is employed, with MAES processing on the NIOS II processor and hardware-accelerated scalar ECC multiplication. The suggested cryptographic system executes in a significantly shorter amount of time, which is a critical consideration for real implementation. This security assessment was effective, and our trials reveal that our proposed technique simplifies and corrects cryptography's essentials. In actuality, the results of the evaluation reveal that the proposed method is efficient, rapid, and secure.\",\"PeriodicalId\":243784,\"journal\":{\"name\":\"2022 International Conference on Augmented Intelligence and Sustainable Systems (ICAISS)\",\"volume\":\"29 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Augmented Intelligence and Sustainable Systems (ICAISS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAISS55157.2022.10010850\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Augmented Intelligence and Sustainable Systems (ICAISS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAISS55157.2022.10010850","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secure Image Steganography Technique based on Hybrid Transforms and Enhanced AES
This, work uses a hybrid technique that combines the Modified Advanced Encryption Standard (MAES) and Elliptic Curve Cryptography to encrypt medical images (ECC). This article describes a modified AES for image encryption. For the global cryptosystem, a co-design approach is employed, with MAES processing on the NIOS II processor and hardware-accelerated scalar ECC multiplication. The suggested cryptographic system executes in a significantly shorter amount of time, which is a critical consideration for real implementation. This security assessment was effective, and our trials reveal that our proposed technique simplifies and corrects cryptography's essentials. In actuality, the results of the evaluation reveal that the proposed method is efficient, rapid, and secure.