The five modes AES applications in sounds and images

Chi Wu Huang*, Chien Lun Yen, Che Hao Chiang, Kuo Huang Chang, Chi Jeng Chang

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Citations (Scopus)

Abstract

This paper presents the applications of Advanced Encryption Standard (AES) in audio and video signals. Like the ciphertext is completely different from the plaintext in AES operation, so the encrypted audio or visual signal should have the same effect. The experiments reveal the encrypted signals are so much different from the original ones that they become random noises. However, in some cases, a kind of pattern may appear within the encrypted noise in the ECB mode operation, causing a kind of sounds being heard during the play back of encrypted audio noise, or some patterns appeared amid the cipher images, due to having the same audio or video inputs which can be mostly reduced by compressing before encryption. This paper presents the ways, featured in the other four modes of AES, to make the same inputs different without compressing. The high speed parallel operations for the five modes are also discussed.

Original languageEnglish
Title of host publication2010 6th International Conference on Information Assurance and Security, IAS 2010
Pages28-31
Number of pages4
DOIs
Publication statusPublished - 2010
Event2010 6th International Conference on Information Assurance and Security, IAS 2010 - Atlanta, GA, United States
Duration: 2010 Aug 232010 Aug 25

Publication series

Name2010 6th International Conference on Information Assurance and Security, IAS 2010

Conference

Conference2010 6th International Conference on Information Assurance and Security, IAS 2010
Country/TerritoryUnited States
CityAtlanta, GA
Period2010/08/232010/08/25

Keywords

  • AES
  • Audio Signal Procesings
  • Component
  • Entropy
  • Image Processing

ASJC Scopus subject areas

  • Information Systems

Fingerprint

Dive into the research topics of 'The five modes AES applications in sounds and images'. Together they form a unique fingerprint.

Cite this