Image observation on the modified ECB operations in advanced encryption standard

Chi-Wu Huang, Ying Hao Tu, Hsing Chang Yeh, Shih Hao Liu, Chi Jeng Chang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Abstract

This paper presents an image encryption instead of text to observe the modified ECB mode operations in AES processing. If a plaint image contains some groups of identical colors, then the encrypted cipher image may appear some kinds of patterns at the related areas. This is a limitation of AES in ECB mode. To overcome the limitation, a straight forward approach is to make those identical colors different or to remove them. For making those inputs different before encryption, three number sequences, which are the sequential number from counter output, the non-sequential number from accumulator output and the random numbers generated from cipher function itself, are added to the image inputs. By using the different numbers and the different ways of addition, the modifications result in obtaining seven modes of operation, and four of them were defined in NIST publications. To remove the identical inputs, image compression before encryption is used. Though by adding compression and decompression seems to make the whole process more complicated, yet the processing time decreases due to the shrinking file size after image compression. These two approaches to modify ECB operation work very well as shown in the experiments.

Original languageEnglish
Title of host publicationInternational Conference on Information Society, i-Society 2011
Pages264-269
Number of pages6
Publication statusPublished - 2011 Sep 14
EventInternational Conference on Information Society, i-Society 2011 - London, United Kingdom
Duration: 2011 Jun 272011 Jun 29

Publication series

NameInternational Conference on Information Society, i-Society 2011

Other

OtherInternational Conference on Information Society, i-Society 2011
CountryUnited Kingdom
CityLondon
Period11/6/2711/6/29

Fingerprint

European Central Bank
Cryptography
Image compression
Color
Processing
experiment
Experiments
Group

Keywords

  • AES
  • ECB
  • Entropy
  • Image processing

ASJC Scopus subject areas

  • Information Systems
  • Social Sciences (miscellaneous)

Cite this

Huang, C-W., Tu, Y. H., Yeh, H. C., Liu, S. H., & Chang, C. J. (2011). Image observation on the modified ECB operations in advanced encryption standard. In International Conference on Information Society, i-Society 2011 (pp. 264-269). [5978449] (International Conference on Information Society, i-Society 2011).

Image observation on the modified ECB operations in advanced encryption standard. / Huang, Chi-Wu; Tu, Ying Hao; Yeh, Hsing Chang; Liu, Shih Hao; Chang, Chi Jeng.

International Conference on Information Society, i-Society 2011. 2011. p. 264-269 5978449 (International Conference on Information Society, i-Society 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Huang, C-W, Tu, YH, Yeh, HC, Liu, SH & Chang, CJ 2011, Image observation on the modified ECB operations in advanced encryption standard. in International Conference on Information Society, i-Society 2011., 5978449, International Conference on Information Society, i-Society 2011, pp. 264-269, International Conference on Information Society, i-Society 2011, London, United Kingdom, 11/6/27.
Huang C-W, Tu YH, Yeh HC, Liu SH, Chang CJ. Image observation on the modified ECB operations in advanced encryption standard. In International Conference on Information Society, i-Society 2011. 2011. p. 264-269. 5978449. (International Conference on Information Society, i-Society 2011).
Huang, Chi-Wu ; Tu, Ying Hao ; Yeh, Hsing Chang ; Liu, Shih Hao ; Chang, Chi Jeng. / Image observation on the modified ECB operations in advanced encryption standard. International Conference on Information Society, i-Society 2011. 2011. pp. 264-269 (International Conference on Information Society, i-Society 2011).
@inproceedings{78f196d1ff82472880aba7a7966cf368,
title = "Image observation on the modified ECB operations in advanced encryption standard",
abstract = "This paper presents an image encryption instead of text to observe the modified ECB mode operations in AES processing. If a plaint image contains some groups of identical colors, then the encrypted cipher image may appear some kinds of patterns at the related areas. This is a limitation of AES in ECB mode. To overcome the limitation, a straight forward approach is to make those identical colors different or to remove them. For making those inputs different before encryption, three number sequences, which are the sequential number from counter output, the non-sequential number from accumulator output and the random numbers generated from cipher function itself, are added to the image inputs. By using the different numbers and the different ways of addition, the modifications result in obtaining seven modes of operation, and four of them were defined in NIST publications. To remove the identical inputs, image compression before encryption is used. Though by adding compression and decompression seems to make the whole process more complicated, yet the processing time decreases due to the shrinking file size after image compression. These two approaches to modify ECB operation work very well as shown in the experiments.",
keywords = "AES, ECB, Entropy, Image processing",
author = "Chi-Wu Huang and Tu, {Ying Hao} and Yeh, {Hsing Chang} and Liu, {Shih Hao} and Chang, {Chi Jeng}",
year = "2011",
month = "9",
day = "14",
language = "English",
isbn = "9780956426383",
series = "International Conference on Information Society, i-Society 2011",
pages = "264--269",
booktitle = "International Conference on Information Society, i-Society 2011",

}

TY - GEN

T1 - Image observation on the modified ECB operations in advanced encryption standard

AU - Huang, Chi-Wu

AU - Tu, Ying Hao

AU - Yeh, Hsing Chang

AU - Liu, Shih Hao

AU - Chang, Chi Jeng

PY - 2011/9/14

Y1 - 2011/9/14

N2 - This paper presents an image encryption instead of text to observe the modified ECB mode operations in AES processing. If a plaint image contains some groups of identical colors, then the encrypted cipher image may appear some kinds of patterns at the related areas. This is a limitation of AES in ECB mode. To overcome the limitation, a straight forward approach is to make those identical colors different or to remove them. For making those inputs different before encryption, three number sequences, which are the sequential number from counter output, the non-sequential number from accumulator output and the random numbers generated from cipher function itself, are added to the image inputs. By using the different numbers and the different ways of addition, the modifications result in obtaining seven modes of operation, and four of them were defined in NIST publications. To remove the identical inputs, image compression before encryption is used. Though by adding compression and decompression seems to make the whole process more complicated, yet the processing time decreases due to the shrinking file size after image compression. These two approaches to modify ECB operation work very well as shown in the experiments.

AB - This paper presents an image encryption instead of text to observe the modified ECB mode operations in AES processing. If a plaint image contains some groups of identical colors, then the encrypted cipher image may appear some kinds of patterns at the related areas. This is a limitation of AES in ECB mode. To overcome the limitation, a straight forward approach is to make those identical colors different or to remove them. For making those inputs different before encryption, three number sequences, which are the sequential number from counter output, the non-sequential number from accumulator output and the random numbers generated from cipher function itself, are added to the image inputs. By using the different numbers and the different ways of addition, the modifications result in obtaining seven modes of operation, and four of them were defined in NIST publications. To remove the identical inputs, image compression before encryption is used. Though by adding compression and decompression seems to make the whole process more complicated, yet the processing time decreases due to the shrinking file size after image compression. These two approaches to modify ECB operation work very well as shown in the experiments.

KW - AES

KW - ECB

KW - Entropy

KW - Image processing

UR - http://www.scopus.com/inward/record.url?scp=80052601860&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=80052601860&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:80052601860

SN - 9780956426383

T3 - International Conference on Information Society, i-Society 2011

SP - 264

EP - 269

BT - International Conference on Information Society, i-Society 2011

ER -