Secure Multimedia Data Transmission Using AES-Based Encryption with Dummy Image Concealment for Attack Mitigation

Authors

  • A. Nesarani Associate professor, Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vadeeswaram, Guntur, Andra Pradesh,India
  • B. Ramesh Assistant professor, Department of Electronics and Communication Engineering, Dr.M.G.R. Educational and Research Institute Maduravoyal, Chennai, Tamilnadu,India
  • P. Keerthana Assistant Professor, Department of Information Technology, Sri Krishna College of Engineering and Technology, Coimbatore, Tamilnadu, India
  • R. Deepa Professor Department of Electronics and Communication Engineering Nehru Institute of Engineering and Technology, Coimbatore, Tamilnadu, India
  • T. Jayaprakash Professor in Physics (S&H), Department of Science and Humanities, Nehru Institute of Technology Coimbatore, Tamilnadu, India

DOI:

https://doi.org/10.22399/ijcesen.2508

Keywords:

Federated Learning (FL), Distributed Systems, Differential Privacy, Cryptography

Abstract

In the image processing, while transferring multimedia data in the network there may occur some attacks. To prevent our encrypted data from attacks, we use Advanced Encryption Standard (AES). In this method we use a secured encrypted and decrypted data here; we explain with the help of two images for encryption the original image is covered inside the dummy image while decrypting data the original image will be displayed. If an attacks or intermediates a data the dummy image will be displayed. The original image is encrypted and decrypted with the help of secret key generation. No matters what the arrangements of permuted elements are, any permutation-only encrypted algorithm without change their histogram. The client can send and receive the data with full security.

References

[1] Hayder Raheem Hashima, Irtifaa Abdalkadum Neamaab (2014). Image Encryption and Decryption in A Modification of ElGamal Cryptosystem in MATLAB. hayderr.almuswi@uokufa.edu.iq. Basic and Applied Research (IJSBAR) Vol 14(2), 141-147.

[2] Jyotika Kapur (2013). Security using image processing jyotikakapur18@gmail.co, baregar1611@gmail.com (IJMIT) Vol.5(2), May.

[3] H.B.Kekre, Archana Athawale and Pallavi N. Halarnkar (2009). Polynomial Transformation to improve Capacity of Cover Image for Information Hiding in Multiple LSBs, International Journal of Engineering Research and Industrial Applications (IJERIA), Ascent Publications, Vol 2, March, Pune.

[4] G. Ye (2010), Image scrambling encryption algorithm of pixel bit based on chaos map, Pattern Recognition Letters, vol. 31(5), 347–354.

[5] L. Zhao, A. Adhikari, D. Xiao, and K. Sakurai (2012), On the security analysis of an image scrambling encryption of pixel bit and its improved scheme based on self-correlation encryption, Communications ion Nonlinear Science and Numerical Simulation, vol. 17(8), 3303–3327.

[6] X. Ge, B. Lu, F. Liu, and D. Gong(2016), An image encryption algorithm based on information hiding, International Journal of Bifurcation and Chaos, vol. 26, p. art. no. 1650192.

[7] A. Jolfaei, X.-W. Wu, and V. Muthukkumarasamy(2016), On the security of permutation-only image encryption schemes, IEEE Transactions on Information Forensics and Security, vol. 11(2), 235–246.

Downloads

Published

2025-06-18

How to Cite

A. Nesarani, B. Ramesh, P. Keerthana, R. Deepa, & T. Jayaprakash. (2025). Secure Multimedia Data Transmission Using AES-Based Encryption with Dummy Image Concealment for Attack Mitigation. International Journal of Computational and Experimental Science and Engineering, 11(3). https://doi.org/10.22399/ijcesen.2508

Issue

Section

Research Article