Secure Multimedia Data Transmission Using AES-Based Encryption with Dummy Image Concealment for Attack Mitigation
DOI:
https://doi.org/10.22399/ijcesen.2508Keywords:
Federated Learning (FL), Distributed Systems, Differential Privacy, CryptographyAbstract
In the image processing, while transferring multimedia data in the network there may occur some attacks. To prevent our encrypted data from attacks, we use Advanced Encryption Standard (AES). In this method we use a secured encrypted and decrypted data here; we explain with the help of two images for encryption the original image is covered inside the dummy image while decrypting data the original image will be displayed. If an attacks or intermediates a data the dummy image will be displayed. The original image is encrypted and decrypted with the help of secret key generation. No matters what the arrangements of permuted elements are, any permutation-only encrypted algorithm without change their histogram. The client can send and receive the data with full security.
References
[1] Hayder Raheem Hashima, Irtifaa Abdalkadum Neamaab (2014). Image Encryption and Decryption in A Modification of ElGamal Cryptosystem in MATLAB. hayderr.almuswi@uokufa.edu.iq. Basic and Applied Research (IJSBAR) Vol 14(2), 141-147.
[2] Jyotika Kapur (2013). Security using image processing jyotikakapur18@gmail.co, baregar1611@gmail.com (IJMIT) Vol.5(2), May.
[3] H.B.Kekre, Archana Athawale and Pallavi N. Halarnkar (2009). Polynomial Transformation to improve Capacity of Cover Image for Information Hiding in Multiple LSBs, International Journal of Engineering Research and Industrial Applications (IJERIA), Ascent Publications, Vol 2, March, Pune.
[4] G. Ye (2010), Image scrambling encryption algorithm of pixel bit based on chaos map, Pattern Recognition Letters, vol. 31(5), 347–354.
[5] L. Zhao, A. Adhikari, D. Xiao, and K. Sakurai (2012), On the security analysis of an image scrambling encryption of pixel bit and its improved scheme based on self-correlation encryption, Communications ion Nonlinear Science and Numerical Simulation, vol. 17(8), 3303–3327.
[6] X. Ge, B. Lu, F. Liu, and D. Gong(2016), An image encryption algorithm based on information hiding, International Journal of Bifurcation and Chaos, vol. 26, p. art. no. 1650192.
[7] A. Jolfaei, X.-W. Wu, and V. Muthukkumarasamy(2016), On the security of permutation-only image encryption schemes, IEEE Transactions on Information Forensics and Security, vol. 11(2), 235–246.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 International Journal of Computational and Experimental Science and Engineering

This work is licensed under a Creative Commons Attribution 4.0 International License.