SlideShare a Scribd company logo
1 of 7
Download to read offline
Bulletin of Electrical Engineering and Informatics
Vol. 8, No. 4, December 2019, pp. 1461~1467
ISSN: 2302-9285, DOI: 10.11591/eei.v8i4.1317  1461
Journal homepage: http://beei.org/index.php/EEI
Developing a secured image file management system using
modified AES
Heidilyn V. Gamido1
, Marlon V. Gamido2
, Ariel M. Sison3
1,2
Tarlac State University, Tarlac City, Philippines
3
Emilio Aguinaldo College, Manila, Philippines
Article Info ABSTRACT
Article history:
Received Aug 30, 2018
Revised Nov 22, 2018
Accepted Jul 10, 2019
Images are a means to share and convey relevant data in today’s digital
world. This paper presents an image file management system to provide a
platform for distributing and viewing images in a secured manner. The
shared image files are stored in the server in an encrypted manner to provide
additional security to the owner of the file. A modified AES algorithm using
bit permutation was used to encrypt the image files. Based on the
experimental result, image files were successfully encrypted in the server and
can only be decrypted by the intended recipient of the file providing an
efficient and reliable way of exchanging images.
Keywords:
AES
Encryption
File management system
Image file encryption
Copyright © 2019 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
Heidilyn V. Gamido,
Tarlac State University,
Tarlac City, Philippines.
Email: htvgamido@tsu.edu.ph
1. INTRODUCTION
In today’s digital world, the use of images as a means to disseminate and convey relevant
information becomes a normal practice [1, 2]. With the advancement of technologies, the continuing increase
in information sharing using images imposes challenges in capturing, displaying, sharing and archiving
image as well as prone to security threats [3]. Image sharing is important in the fields of medical processing
[4, 5], remote sensing [6], government documents [7], military and other similar fields [8, 9].
The common practice of using physical storage like CDs and USB flash drives are used to transport
images to hand-carry digital images from one destination to the next. This practice may be convenient if the
recipient is near to the sender. Another problem that may arise from transporting images using portable
devices is the accidental write or erase processes [10], vulnerability to virus [11] and hardware failure.
If an organization has an extensive range of images captured and shared within the organization, a
system is needed to manage and secure the collection of image files. Development of an Image File
Management System (IFMS) will provide a platform to share, distribute and view images in a secured
manner by encrypting these files in the central storage. The implementation of an image management system
will improve internal communication and can be used in organizations such as clinics, hospitals, schools, and
government institutions and will increase staff efficiency and process workflow.
The objective of this paper is to introduce an image file management system that can be used to
store, view and share images. The use of the modified AES provides an additional level of security to the
sender or owner of the image. The file to be shared is encrypted using the modified AES algorithm, providing
additional protection to the owner of the image. The encrypted image is received, viewed and downloaded
only by the intended recipient. Encrypting a file in the server provides an efficient and reliable way of
exchanging and sharing images for transmission over a network infrastructure [12].
 ISSN: 2302-9285
Bulletin of Electr Eng and Inf, Vol. 8, No. 4, December 2019 : 1461 – 1467
1462
2. REVIEW OF RELATED LITERATURE
This section presents some available file-sharing applications like documents management system,
medical image management system and image management system.
2.1. Electronic document management systems (EDMS)
An Electronic Document Management System prepares the documents for uploading and sharing the
document with different users and ends with archiving said document [13]. Due to bulk use of documents in
several types, the use of EDMS in Universities also provide a various advantage in reducing the operational
cost in producing, sharing, and copying the document. EDMS also shortened the time in document accessing
and archiving, provided higher work efficiency because multiple users are enabled to work on the same
document and connection can be established easily between different documents [13].
An electronic management system (EDMS) presented by [14] showed an increase in the efficiency
of an organization by reducing cost and increasing the result. EDMS provided more income to an
organization because of lesser spending cost in paper documents, overhead staff time and changes
corporate culture.
An implementation of EDMS, a system for the management of documents, provided an advantage in
the administrative work in government [7]. The use of such management system increased the operational
effectiveness of governments on a daily basis such as document storage and retrieval, workflow facilities,
auditing, searching, and publishing.
2.2. Medical image management system (MIMS)
The medical image management systems [15] enable the transmission of chest x-ray images in a
hospital. The implementation of MIMS in hospital replaces the conventional equipment and film-handling
schemes in hospitals. This system acquires medical images, transmit them, store and archive them using
magnetic disk and viewed in a physician and radiologist station. The MIMS provided the convenience of
having images available earlier, lessening the need to visit the radiology department. The exchange and
sharing of medical images provided compelling values such as cost reduction, improved collaboration and
patient care which increased patient satisfaction the use of such system streamlining an important process
that has been facilitated with the use of physical devices or any insecure methods of communication [16].
2.3. Picture/image library software
The paper of [17] described the role of software like SharePoint Foundation 2010 Picture Library in
locating and creating photo database. The implementation of such software provided searchable photo
database and provided success to both end users and contributors because photos are no longer missing and
users spend less time searching appropriate photos. With this, the developed system is also capable of
searching the database of shared images for easy retrieval of images.
2.4. Image management system
The University of Duckham implements an Image Management System to help departments,
colleges, and units across the University access existing University-wide images, and to provide users of the
system the option to upload and store their images, creating a central source for all University images [18].
The proposed system is a LAN-based system used implemented in a University to share image files across
the organization, and the files are encrypted in the server side. The user also has the option to select the
recipient/s who will receive, view, and download the image file.
3. PROPOSED METHOD
This section explains the methods used in developing the system. Figure 1 shows the operational
framework of the proposed IFMS. Users of the system log in using their correct credentials-username and
password. The sender of the image selects the image file to be shared to intended recipients. The file will be
encrypted using the Modified AES algorithm [19] shown in Figure 2, and the encrypted file is stored at the
server. The shared file is received once the recipient logs in the system, and the recipient can view the
decrypted file once the file is clicked. The recipient can save the decrypted image in another location if the
recipient needs to use it for other purposes.
Bulletin of Electr Eng and Inf ISSN: 2302-9285 
Developing a secured image file management… (Heidilyn V. Gamido)
1463
Figure 1. Operational design of the proposed application
Figure 2. Proposed modified AES algorithm
3.1. Modified AES algorithm
A modified AES algorithm [19] is used to encrypt the files to secure the image file in the server. Bit
Permutation Transformation replaces the MixColumns Transformation in AES. The bit permutation
transformation does not have complex mathematical computation [20] but only involves shifting of the
 ISSN: 2302-9285
Bulletin of Electr Eng and Inf, Vol. 8, No. 4, December 2019 : 1461 – 1467
1464
position of bits of every state. To perform the bit permutation for the encryption process, the state in Shift
Rows is carried out in this transformation and follow the steps below.
a. Take the state value per column, for example, column 0.
b. Column 0 has four rows, and each state in (x,0) is composed of 8 bits resulting in a 4x8 matrix. ((x,0),
b) represents the row, column and bit number in each state.
c. The 4x8 matrix can also be represented by a
d. Next step is to get the transpose of each block matrix.
e. The value of a’(x,y), is a row-wise concatenation of the bit values of the transposed block, where
x=column value in ShiftRows and y=block number in the 4x2 partitioned matrix.
4. RESULTS AND ANALYSIS
4.1. System development
The Image File Management System was developed using Visual Studio C#, and the system
database was designed using MS SQL 2016. The developed system was tested in the local area network of
Tarlac State University.
4.2. System module
4.2.1. Login module
To be able to access the designed system, users need to register to the system. Registration of users
is to be performed by the administrator of the system. Correct credentials such as username and password are
to be supplied to use the system. Registered users can share, search, view, download files from the system
show in Figure 4.
Figure 4. Login module
4.2.2. File module
The file module enables the user to add a file, view the uploaded files and search for files. The files
from this module can be shared by the owner to intended users show in Figure 5.
Bulletin of Electr Eng and Inf ISSN: 2302-9285 
Developing a secured image file management… (Heidilyn V. Gamido)
1465
Figure 5. Sharing image file
Once the sender clicks the share this file menu, he selects the desired recipient of the file based from
the group settings (for multiple sending) or to an individual user. Figure 6(a), Figure 6(b) shows that the
intended recipient has received the shared file once the user logs into the system. A highlighted message
means that the receiver has not opened the file (Figure 6a). If the receiver has opened the message, the
highlighted message is removed (Figure 6b).
(a)
(b)
Figure 6. (a) Received shared file, (b) Received shared file
4.2.3. Setup module
The setup module is used to add users, group and modify the user information such as password,
name, and role show in Figure 7.
 ISSN: 2302-9285
Bulletin of Electr Eng and Inf, Vol. 8, No. 4, December 2019 : 1461 – 1467
1466
Figure 7. Setup module
4.2.4. Encrypted database
Figure 8 shows the database of the IFMS. Fields like a reference, subject, and the file content have
been encrypted to provide additional security to the file. The fields are encrypted using the modified
AES algorithm.
Figure 8. Encrypted database
5. CONCLUSION
This paper presented an image file management system to provide an avenue for sharing,
distributing and viewing image files in a secured manner. A modified AES algorithm was used to encrypt the
file and other relevant information to provide additional security to the owner of the file. The image file
management system has successfully shared and distributed files among users and has successfully encrypted
the file in the server using the modified algorithm. In the future, other file types, such as a document, audio,
and video, can be used to share and distribute using the application.
ACKNOWLEDGMENT
The authors gratefully acknowledge the Commission on Higher Education, K-12 Project Management Unit,
Philippines for the scholarship and the Tarlac State University Management Information Systems Office for
the completion of the research.
REFERENCES
[1] D. W. Cromey, “Digital Images Are Data: And Should Be Treated as Such,” in Methods in Molecular Biology, vol.
931, no. 28, D. J. Taatjes and J. Roth, Eds. Totowa, NJ: Humana Press, 2012, pp. 1–27.
[2] A. Yudhana, Sunardi, and S. Saifullah, “Segmentation comparing eggs watermarking image and original image,”
Bulletin of Electrical Engineering and Informatics, vol. 6, no. 1, pp. 47–53, 2017.
[3] Shivaputra, H. Sheshadri, and V. Lokesha, “A Naïve Visual Cryptographic Algorithm for the Transfer of
Compressed Medical Images,” Bulletin of Electrical Engineering and Informatics, vol. 5, no. 3, pp. 347–365, 2016.
[4] K. J.-W. Kim T., Heo E., Lee M., Kim J., Yoo S., Kim S., Lee K., “Medical image exchange and sharing between
heterogeneous picture archiving and communication systems based upon international standard: pilot
implementation” 15th Int. HL7 Interoperability Conf., pp. 37–42, 2015.
[5] R. Pienaar et al., “CHIPS-A Service for Collecting, Organizing, Processing, and Sharing Medical Image Data in the
Cloud,” in Data Management and Analytics for Medicine and Healthcare, 2017, pp. 29–35.
[6] L. Zhou, N. Chen, Z. Chen, and C. Xing, “ROSCC: An Efficient Remote Sensing Observation-Sharing Method
Based on Cloud Computing for Soil Moisture Mapping in Precision Agriculture,” IEEE J. Sel. Top. Appl. Earth
Obs. Remote Sens., vol. 9, no. 12, pp. 5588–5598, 2016.
Bulletin of Electr Eng and Inf ISSN: 2302-9285 
Developing a secured image file management… (Heidilyn V. Gamido)
1467
[7] H. Abdulkadhim, M. Bahari, A. Bakri, and W. Ismail, “A research framework of electronic document management
systems (EDMS) implementation process in government,” J. Theor. Appl. Inf. Technol., vol. 81, 2015.
[8] P. K. Das, P. Kumar, and M. Sreenivasulu, “Image Cryptography : A Survey towards its Growth,” Adv. Electron.
Electr. Eng. Res. India Publ., vol. 4, no. 2, pp. 179–184, 2014.
[9] Q. Zhang and A. Qunding, “Digital image encryption based on Advanced Encryption Standard(AES) algorithm,”
5th Int. Conf. Instrum. Meas. Comput. Commun. Control. IMCCC 2015, pp. 1218–1221, 2015.
[10] O. Nekhayenko, “Preserving and accessing content stored on USB-flash-drives–a TIB workflow,” Grey J., vol. 14,
no. 2, pp. 95–101, 2017.
[11] A. Cohen and N. Nissim, “Trusted Detection of Ransomware in a Private Cloud Using Machine Learning Methods
Leveraging Meta-Features from Volatile Memory,” Expert Syst. Appl., 2018.
[12] T. F. G. Quilala, A. M. Sison, and R. P. Medina, “Securing Electronic Medical Records Using Modified Blowfish
Algorithm,” Indones. J. Electr. Eng. Informatics, vol. 6, no. 3, pp. 309–316, 2018.
[13] M. Başıbüyük and A. Ergüzen, “Electronic Document Management System for Kırıkkale University,” Unified J.
Comput. Sci. Res. Unif. J. Comp. Sci. Res, vol. 1, no. 2, pp. 8–15, 2015.
[14] I. N. Burtylev, K. V Mokhun, Y. V Bodnya, and D. N. Yukhnevich, “Development of Electronic Document
Management Systems: Advantage and Efficiency,” Sci. Technol. March, pp. 1–9, 2013.
[15] S. B. Seshadri, R. Arenson, S. Khalsa, I. Brikman, and F. van der Voorde, “Prototype Medical Image Management
System (MIMS) at the University of Pennsylvania: Software Design Considerations,” J. Digit. Imaging, vol. 16, no.
1, pp. 96–102, Mar. 2003.
[16] A. Vreeland et al., “Considerations for Exchanging and Sharing Medical Images for Improved Collaboration and
Patient Care: HIMSS-SIIM Collaborative White Paper,” J. Digit. Imaging, vol. 29, no. 5, pp. 547–558, 2016.
[17] T. Harron, “SharePoint picture library as a searchable photo database in a small library: a program description,” J.
Can. Heal. Libr. Assoc. / J. l’Association des bibliothèques la santé du Canada, vol. 36, no. 1, p. 20, 2015.
[18] “Image Management System-Durham University.” [Online]. Available:
https://www.dur.ac.uk/marketingandcommunications/marketing/images/. [Accessed: 27-Jul-2018].
[19] H. V. Gamido, A. M. Sison, and R. P. Medina, “Modified AES for Text and Image Encryption,” Indonesian
Journal of Electrical Engineering and Computer Science, vol. 11, no. 3, pp. 942–948, 2018.
[20] H. V. Gamido, A. M. Sison, and R. P. Medina, “Implementation of Modified AES as Image Encryption Scheme,”
Indonesian Journal of Electrical Engineering and Informatics, vol. 6, no. 3, pp. 301–308, 2018.
BIOGRAPHIES OF AUTHORS
Heidilyn V. Gamido is a graduate of Doctor in Information Technology at Technological
Institute of the Philippines, Quezon City under the CHED K-12 Transition Program Scholarship.
She obtained her Masters of Engineering major in Information and Communications in 2006 at
Pai Chai University, Daejeon South Korea on a scholarship. She finished her BS Information
Technology at Saint Louis University, Baguio City Philippines in 2002. She is an Associate
Professor of Tarlac State University-College of Computer Studies and designated as the Director
of the Management of Information Systems Office. Her research interests include data security,
image processing, and information system.
Marlon V. Gamido is the Dean of College of Computer Studies in Tarlac State University. He
holds a degree in MS in Information Technology from Hannam University, Daejeon Korea on
CHED Scholarship. He is currently pursuing his PhD in Educational Management at TSU. He is
also a registered Electrical Engineer. His research interests include security and
project management.
Ariel M. Sison earned his Doctor in Information Technology at the Technological Institute of the
Philippines Quezon City in 2013 and graduated with Highest Honors. He took up his master’s
degree in computer science at De La Salle University Manila in 2006 and obtained the BS
Computer Science at Emilio Aguinaldo College Manila in 1994. He is currently the dean, School
of Computer Studies, Emilio Aguinaldo College Manila. His research interests include data
mining and data security. Dr. Sison is a member of International Association of Engineers
(IAENG), Philippine Society of IT Educators and Computing Society of the Philippines.
Currently, he is a Technical Committee Member of International Academy, Research, and
Industry Association (IARIA) for International Conference on Systems (ICONS).

More Related Content

What's hot

IRJET - Calorie Detector
IRJET -  	  Calorie DetectorIRJET -  	  Calorie Detector
IRJET - Calorie DetectorIRJET Journal
 
81202015
8120201581202015
81202015IJRAT
 
An Exploration of Grid Computing to be Utilized in Teaching and Research at TU
An Exploration of Grid Computing to be Utilized in Teaching and Research at TUAn Exploration of Grid Computing to be Utilized in Teaching and Research at TU
An Exploration of Grid Computing to be Utilized in Teaching and Research at TUEswar Publications
 
Data migration system in heterogeneous database
Data migration system in heterogeneous databaseData migration system in heterogeneous database
Data migration system in heterogeneous databaseeSAT Journals
 
Data migration system in heterogeneous database
Data migration system in heterogeneous databaseData migration system in heterogeneous database
Data migration system in heterogeneous databaseeSAT Publishing House
 
Medical Image Compression with security & water marking
Medical Image Compression with security & water markingMedical Image Compression with security & water marking
Medical Image Compression with security & water markingAnkit Chaudhary
 
Concept of information system & networking..
Concept of information system & networking..Concept of information system & networking..
Concept of information system & networking..Deekshit Geddam
 
IRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Analysis of using Software Defined and Service Coherence ApproachIRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Analysis of using Software Defined and Service Coherence ApproachIRJET Journal
 
Gprs campus card system solution
Gprs campus card system solutionGprs campus card system solution
Gprs campus card system solutioncaimoremichelle
 
An efficient lossless medical image
An efficient lossless medical imageAn efficient lossless medical image
An efficient lossless medical imagecaijjournal
 
IRJET- Brain MRI Image Processing & Prediction of Cancer Stage Including ...
IRJET-  	  Brain MRI Image Processing & Prediction of Cancer Stage Including ...IRJET-  	  Brain MRI Image Processing & Prediction of Cancer Stage Including ...
IRJET- Brain MRI Image Processing & Prediction of Cancer Stage Including ...IRJET Journal
 
574An Integrated Framework for IT Infrastructure Management by Work Flow Mana...
574An Integrated Framework for IT Infrastructure Management by Work Flow Mana...574An Integrated Framework for IT Infrastructure Management by Work Flow Mana...
574An Integrated Framework for IT Infrastructure Management by Work Flow Mana...idescitation
 
The Case for Ubuntu: Linux Operating System Performance and Usability for Use...
The Case for Ubuntu: Linux Operating System Performance and Usability for Use...The Case for Ubuntu: Linux Operating System Performance and Usability for Use...
The Case for Ubuntu: Linux Operating System Performance and Usability for Use...Maurice Dawson
 
An Enhance Image Retrieval of User Interest Using Query Specific Approach and...
An Enhance Image Retrieval of User Interest Using Query Specific Approach and...An Enhance Image Retrieval of User Interest Using Query Specific Approach and...
An Enhance Image Retrieval of User Interest Using Query Specific Approach and...IJSRD
 
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical Systems
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical SystemsUpsurging Cyber-Kinetic attacks in Mobile Cyber Physical Systems
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical SystemsIRJET Journal
 
Ijarcce9 b a anjan a comparative analysis grid cluster and cloud computing
Ijarcce9 b  a  anjan a comparative analysis grid cluster and cloud computingIjarcce9 b  a  anjan a comparative analysis grid cluster and cloud computing
Ijarcce9 b a anjan a comparative analysis grid cluster and cloud computingHarsh Parashar
 
IRJET - Detection of Malaria using Image Cells
IRJET - Detection of Malaria using Image CellsIRJET - Detection of Malaria using Image Cells
IRJET - Detection of Malaria using Image CellsIRJET Journal
 

What's hot (20)

IRJET - Calorie Detector
IRJET -  	  Calorie DetectorIRJET -  	  Calorie Detector
IRJET - Calorie Detector
 
81202015
8120201581202015
81202015
 
An Exploration of Grid Computing to be Utilized in Teaching and Research at TU
An Exploration of Grid Computing to be Utilized in Teaching and Research at TUAn Exploration of Grid Computing to be Utilized in Teaching and Research at TU
An Exploration of Grid Computing to be Utilized in Teaching and Research at TU
 
Fulltext01
Fulltext01Fulltext01
Fulltext01
 
L1802028184
L1802028184L1802028184
L1802028184
 
Data migration system in heterogeneous database
Data migration system in heterogeneous databaseData migration system in heterogeneous database
Data migration system in heterogeneous database
 
Data migration system in heterogeneous database
Data migration system in heterogeneous databaseData migration system in heterogeneous database
Data migration system in heterogeneous database
 
Medical Image Compression with security & water marking
Medical Image Compression with security & water markingMedical Image Compression with security & water marking
Medical Image Compression with security & water marking
 
Concept of information system & networking..
Concept of information system & networking..Concept of information system & networking..
Concept of information system & networking..
 
IRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Analysis of using Software Defined and Service Coherence ApproachIRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Analysis of using Software Defined and Service Coherence Approach
 
Gprs campus card system solution
Gprs campus card system solutionGprs campus card system solution
Gprs campus card system solution
 
I017554954
I017554954I017554954
I017554954
 
An efficient lossless medical image
An efficient lossless medical imageAn efficient lossless medical image
An efficient lossless medical image
 
IRJET- Brain MRI Image Processing & Prediction of Cancer Stage Including ...
IRJET-  	  Brain MRI Image Processing & Prediction of Cancer Stage Including ...IRJET-  	  Brain MRI Image Processing & Prediction of Cancer Stage Including ...
IRJET- Brain MRI Image Processing & Prediction of Cancer Stage Including ...
 
574An Integrated Framework for IT Infrastructure Management by Work Flow Mana...
574An Integrated Framework for IT Infrastructure Management by Work Flow Mana...574An Integrated Framework for IT Infrastructure Management by Work Flow Mana...
574An Integrated Framework for IT Infrastructure Management by Work Flow Mana...
 
The Case for Ubuntu: Linux Operating System Performance and Usability for Use...
The Case for Ubuntu: Linux Operating System Performance and Usability for Use...The Case for Ubuntu: Linux Operating System Performance and Usability for Use...
The Case for Ubuntu: Linux Operating System Performance and Usability for Use...
 
An Enhance Image Retrieval of User Interest Using Query Specific Approach and...
An Enhance Image Retrieval of User Interest Using Query Specific Approach and...An Enhance Image Retrieval of User Interest Using Query Specific Approach and...
An Enhance Image Retrieval of User Interest Using Query Specific Approach and...
 
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical Systems
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical SystemsUpsurging Cyber-Kinetic attacks in Mobile Cyber Physical Systems
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical Systems
 
Ijarcce9 b a anjan a comparative analysis grid cluster and cloud computing
Ijarcce9 b  a  anjan a comparative analysis grid cluster and cloud computingIjarcce9 b  a  anjan a comparative analysis grid cluster and cloud computing
Ijarcce9 b a anjan a comparative analysis grid cluster and cloud computing
 
IRJET - Detection of Malaria using Image Cells
IRJET - Detection of Malaria using Image CellsIRJET - Detection of Malaria using Image Cells
IRJET - Detection of Malaria using Image Cells
 

Similar to Secured Image File Management Using Modified AES

thilaganga journal 1
thilaganga journal 1thilaganga journal 1
thilaganga journal 1thilaganga
 
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...IJERA Editor
 
Paper id 712019116
Paper id 712019116Paper id 712019116
Paper id 712019116IJRAT
 
A Reconfigurable Component-Based Problem Solving Environment
A Reconfigurable Component-Based Problem Solving EnvironmentA Reconfigurable Component-Based Problem Solving Environment
A Reconfigurable Component-Based Problem Solving EnvironmentSheila Sinclair
 
A novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data applicationA novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data applicationijmnct
 
An Enhanced trusted Image Storing and Retrieval Framework in Cloud Data Stora...
An Enhanced trusted Image Storing and Retrieval Framework in Cloud Data Stora...An Enhanced trusted Image Storing and Retrieval Framework in Cloud Data Stora...
An Enhanced trusted Image Storing and Retrieval Framework in Cloud Data Stora...IJERA Editor
 
IRJET- Framework for Dynamic Resource Allocation and Scheduling for Cloud
IRJET- Framework for Dynamic Resource Allocation and Scheduling for CloudIRJET- Framework for Dynamic Resource Allocation and Scheduling for Cloud
IRJET- Framework for Dynamic Resource Allocation and Scheduling for CloudIRJET Journal
 
Towards a distributed framework to analyze multimodal data.pdf
Towards a distributed framework to analyze multimodal data.pdfTowards a distributed framework to analyze multimodal data.pdf
Towards a distributed framework to analyze multimodal data.pdfCarlosRodrigues517978
 
Providing Secure Cloud for College Campus
Providing Secure Cloud for College CampusProviding Secure Cloud for College Campus
Providing Secure Cloud for College Campusvivatechijri
 
Video Data Visualization System : Semantic Classification and Personalization
Video Data Visualization System : Semantic Classification and Personalization  Video Data Visualization System : Semantic Classification and Personalization
Video Data Visualization System : Semantic Classification and Personalization ijcga
 
Video Data Visualization System : Semantic Classification and Personalization
Video Data Visualization System : Semantic Classification and Personalization  Video Data Visualization System : Semantic Classification and Personalization
Video Data Visualization System : Semantic Classification and Personalization ijcga
 
A Hygiene Monitoring System
A Hygiene Monitoring SystemA Hygiene Monitoring System
A Hygiene Monitoring SystemBhargaviLanka
 
A Backup and Restore Software for Android System
A Backup and Restore Software for Android SystemA Backup and Restore Software for Android System
A Backup and Restore Software for Android SystemIRJET Journal
 
Secure and efficient transmission of medical images
Secure and efficient transmission of medical imagesSecure and efficient transmission of medical images
Secure and efficient transmission of medical imageseSAT Publishing House
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGijcsit
 
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...IRJET Journal
 
Efficiency and Effectiveness: Shared services to support STEM subjects
Efficiency and Effectiveness: Shared services to support STEM subjectsEfficiency and Effectiveness: Shared services to support STEM subjects
Efficiency and Effectiveness: Shared services to support STEM subjectsJisc
 

Similar to Secured Image File Management Using Modified AES (20)

thilaganga journal 1
thilaganga journal 1thilaganga journal 1
thilaganga journal 1
 
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
 
Paper id 712019116
Paper id 712019116Paper id 712019116
Paper id 712019116
 
A Reconfigurable Component-Based Problem Solving Environment
A Reconfigurable Component-Based Problem Solving EnvironmentA Reconfigurable Component-Based Problem Solving Environment
A Reconfigurable Component-Based Problem Solving Environment
 
A novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data applicationA novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data application
 
An Enhanced trusted Image Storing and Retrieval Framework in Cloud Data Stora...
An Enhanced trusted Image Storing and Retrieval Framework in Cloud Data Stora...An Enhanced trusted Image Storing and Retrieval Framework in Cloud Data Stora...
An Enhanced trusted Image Storing and Retrieval Framework in Cloud Data Stora...
 
IRJET- Framework for Dynamic Resource Allocation and Scheduling for Cloud
IRJET- Framework for Dynamic Resource Allocation and Scheduling for CloudIRJET- Framework for Dynamic Resource Allocation and Scheduling for Cloud
IRJET- Framework for Dynamic Resource Allocation and Scheduling for Cloud
 
Towards a distributed framework to analyze multimodal data.pdf
Towards a distributed framework to analyze multimodal data.pdfTowards a distributed framework to analyze multimodal data.pdf
Towards a distributed framework to analyze multimodal data.pdf
 
Providing Secure Cloud for College Campus
Providing Secure Cloud for College CampusProviding Secure Cloud for College Campus
Providing Secure Cloud for College Campus
 
Video Data Visualization System : Semantic Classification and Personalization
Video Data Visualization System : Semantic Classification and Personalization  Video Data Visualization System : Semantic Classification and Personalization
Video Data Visualization System : Semantic Classification and Personalization
 
Video Data Visualization System : Semantic Classification and Personalization
Video Data Visualization System : Semantic Classification and Personalization  Video Data Visualization System : Semantic Classification and Personalization
Video Data Visualization System : Semantic Classification and Personalization
 
A Hygiene Monitoring System
A Hygiene Monitoring SystemA Hygiene Monitoring System
A Hygiene Monitoring System
 
A Backup and Restore Software for Android System
A Backup and Restore Software for Android SystemA Backup and Restore Software for Android System
A Backup and Restore Software for Android System
 
Secure and efficient transmission of medical images
Secure and efficient transmission of medical imagesSecure and efficient transmission of medical images
Secure and efficient transmission of medical images
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
 
Efficiency and Effectiveness: Shared services to support STEM subjects
Efficiency and Effectiveness: Shared services to support STEM subjectsEfficiency and Effectiveness: Shared services to support STEM subjects
Efficiency and Effectiveness: Shared services to support STEM subjects
 

More from journalBEEI

Square transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipherSquare transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipherjournalBEEI
 
Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...journalBEEI
 
Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...journalBEEI
 
A secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networksA secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networksjournalBEEI
 
Plant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural networkPlant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural networkjournalBEEI
 
Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...journalBEEI
 
Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...journalBEEI
 
Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...journalBEEI
 
Wireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithmWireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithmjournalBEEI
 
Implementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antennaImplementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antennajournalBEEI
 
The calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human headThe calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human headjournalBEEI
 
Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...journalBEEI
 
Design of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting applicationDesign of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting applicationjournalBEEI
 
Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...journalBEEI
 
Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)journalBEEI
 
Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...journalBEEI
 
Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...journalBEEI
 
An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...journalBEEI
 
Parking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentationParking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentationjournalBEEI
 
Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...journalBEEI
 

More from journalBEEI (20)

Square transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipherSquare transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipher
 
Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...
 
Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...
 
A secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networksA secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networks
 
Plant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural networkPlant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural network
 
Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...
 
Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...
 
Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...
 
Wireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithmWireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithm
 
Implementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antennaImplementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antenna
 
The calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human headThe calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human head
 
Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...
 
Design of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting applicationDesign of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting application
 
Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...
 
Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)
 
Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...
 
Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...
 
An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...
 
Parking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentationParking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentation
 
Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...
 

Recently uploaded

CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 

Recently uploaded (20)

CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 

Secured Image File Management Using Modified AES

  • 1. Bulletin of Electrical Engineering and Informatics Vol. 8, No. 4, December 2019, pp. 1461~1467 ISSN: 2302-9285, DOI: 10.11591/eei.v8i4.1317  1461 Journal homepage: http://beei.org/index.php/EEI Developing a secured image file management system using modified AES Heidilyn V. Gamido1 , Marlon V. Gamido2 , Ariel M. Sison3 1,2 Tarlac State University, Tarlac City, Philippines 3 Emilio Aguinaldo College, Manila, Philippines Article Info ABSTRACT Article history: Received Aug 30, 2018 Revised Nov 22, 2018 Accepted Jul 10, 2019 Images are a means to share and convey relevant data in today’s digital world. This paper presents an image file management system to provide a platform for distributing and viewing images in a secured manner. The shared image files are stored in the server in an encrypted manner to provide additional security to the owner of the file. A modified AES algorithm using bit permutation was used to encrypt the image files. Based on the experimental result, image files were successfully encrypted in the server and can only be decrypted by the intended recipient of the file providing an efficient and reliable way of exchanging images. Keywords: AES Encryption File management system Image file encryption Copyright © 2019 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Heidilyn V. Gamido, Tarlac State University, Tarlac City, Philippines. Email: htvgamido@tsu.edu.ph 1. INTRODUCTION In today’s digital world, the use of images as a means to disseminate and convey relevant information becomes a normal practice [1, 2]. With the advancement of technologies, the continuing increase in information sharing using images imposes challenges in capturing, displaying, sharing and archiving image as well as prone to security threats [3]. Image sharing is important in the fields of medical processing [4, 5], remote sensing [6], government documents [7], military and other similar fields [8, 9]. The common practice of using physical storage like CDs and USB flash drives are used to transport images to hand-carry digital images from one destination to the next. This practice may be convenient if the recipient is near to the sender. Another problem that may arise from transporting images using portable devices is the accidental write or erase processes [10], vulnerability to virus [11] and hardware failure. If an organization has an extensive range of images captured and shared within the organization, a system is needed to manage and secure the collection of image files. Development of an Image File Management System (IFMS) will provide a platform to share, distribute and view images in a secured manner by encrypting these files in the central storage. The implementation of an image management system will improve internal communication and can be used in organizations such as clinics, hospitals, schools, and government institutions and will increase staff efficiency and process workflow. The objective of this paper is to introduce an image file management system that can be used to store, view and share images. The use of the modified AES provides an additional level of security to the sender or owner of the image. The file to be shared is encrypted using the modified AES algorithm, providing additional protection to the owner of the image. The encrypted image is received, viewed and downloaded only by the intended recipient. Encrypting a file in the server provides an efficient and reliable way of exchanging and sharing images for transmission over a network infrastructure [12].
  • 2.  ISSN: 2302-9285 Bulletin of Electr Eng and Inf, Vol. 8, No. 4, December 2019 : 1461 – 1467 1462 2. REVIEW OF RELATED LITERATURE This section presents some available file-sharing applications like documents management system, medical image management system and image management system. 2.1. Electronic document management systems (EDMS) An Electronic Document Management System prepares the documents for uploading and sharing the document with different users and ends with archiving said document [13]. Due to bulk use of documents in several types, the use of EDMS in Universities also provide a various advantage in reducing the operational cost in producing, sharing, and copying the document. EDMS also shortened the time in document accessing and archiving, provided higher work efficiency because multiple users are enabled to work on the same document and connection can be established easily between different documents [13]. An electronic management system (EDMS) presented by [14] showed an increase in the efficiency of an organization by reducing cost and increasing the result. EDMS provided more income to an organization because of lesser spending cost in paper documents, overhead staff time and changes corporate culture. An implementation of EDMS, a system for the management of documents, provided an advantage in the administrative work in government [7]. The use of such management system increased the operational effectiveness of governments on a daily basis such as document storage and retrieval, workflow facilities, auditing, searching, and publishing. 2.2. Medical image management system (MIMS) The medical image management systems [15] enable the transmission of chest x-ray images in a hospital. The implementation of MIMS in hospital replaces the conventional equipment and film-handling schemes in hospitals. This system acquires medical images, transmit them, store and archive them using magnetic disk and viewed in a physician and radiologist station. The MIMS provided the convenience of having images available earlier, lessening the need to visit the radiology department. The exchange and sharing of medical images provided compelling values such as cost reduction, improved collaboration and patient care which increased patient satisfaction the use of such system streamlining an important process that has been facilitated with the use of physical devices or any insecure methods of communication [16]. 2.3. Picture/image library software The paper of [17] described the role of software like SharePoint Foundation 2010 Picture Library in locating and creating photo database. The implementation of such software provided searchable photo database and provided success to both end users and contributors because photos are no longer missing and users spend less time searching appropriate photos. With this, the developed system is also capable of searching the database of shared images for easy retrieval of images. 2.4. Image management system The University of Duckham implements an Image Management System to help departments, colleges, and units across the University access existing University-wide images, and to provide users of the system the option to upload and store their images, creating a central source for all University images [18]. The proposed system is a LAN-based system used implemented in a University to share image files across the organization, and the files are encrypted in the server side. The user also has the option to select the recipient/s who will receive, view, and download the image file. 3. PROPOSED METHOD This section explains the methods used in developing the system. Figure 1 shows the operational framework of the proposed IFMS. Users of the system log in using their correct credentials-username and password. The sender of the image selects the image file to be shared to intended recipients. The file will be encrypted using the Modified AES algorithm [19] shown in Figure 2, and the encrypted file is stored at the server. The shared file is received once the recipient logs in the system, and the recipient can view the decrypted file once the file is clicked. The recipient can save the decrypted image in another location if the recipient needs to use it for other purposes.
  • 3. Bulletin of Electr Eng and Inf ISSN: 2302-9285  Developing a secured image file management… (Heidilyn V. Gamido) 1463 Figure 1. Operational design of the proposed application Figure 2. Proposed modified AES algorithm 3.1. Modified AES algorithm A modified AES algorithm [19] is used to encrypt the files to secure the image file in the server. Bit Permutation Transformation replaces the MixColumns Transformation in AES. The bit permutation transformation does not have complex mathematical computation [20] but only involves shifting of the
  • 4.  ISSN: 2302-9285 Bulletin of Electr Eng and Inf, Vol. 8, No. 4, December 2019 : 1461 – 1467 1464 position of bits of every state. To perform the bit permutation for the encryption process, the state in Shift Rows is carried out in this transformation and follow the steps below. a. Take the state value per column, for example, column 0. b. Column 0 has four rows, and each state in (x,0) is composed of 8 bits resulting in a 4x8 matrix. ((x,0), b) represents the row, column and bit number in each state. c. The 4x8 matrix can also be represented by a d. Next step is to get the transpose of each block matrix. e. The value of a’(x,y), is a row-wise concatenation of the bit values of the transposed block, where x=column value in ShiftRows and y=block number in the 4x2 partitioned matrix. 4. RESULTS AND ANALYSIS 4.1. System development The Image File Management System was developed using Visual Studio C#, and the system database was designed using MS SQL 2016. The developed system was tested in the local area network of Tarlac State University. 4.2. System module 4.2.1. Login module To be able to access the designed system, users need to register to the system. Registration of users is to be performed by the administrator of the system. Correct credentials such as username and password are to be supplied to use the system. Registered users can share, search, view, download files from the system show in Figure 4. Figure 4. Login module 4.2.2. File module The file module enables the user to add a file, view the uploaded files and search for files. The files from this module can be shared by the owner to intended users show in Figure 5.
  • 5. Bulletin of Electr Eng and Inf ISSN: 2302-9285  Developing a secured image file management… (Heidilyn V. Gamido) 1465 Figure 5. Sharing image file Once the sender clicks the share this file menu, he selects the desired recipient of the file based from the group settings (for multiple sending) or to an individual user. Figure 6(a), Figure 6(b) shows that the intended recipient has received the shared file once the user logs into the system. A highlighted message means that the receiver has not opened the file (Figure 6a). If the receiver has opened the message, the highlighted message is removed (Figure 6b). (a) (b) Figure 6. (a) Received shared file, (b) Received shared file 4.2.3. Setup module The setup module is used to add users, group and modify the user information such as password, name, and role show in Figure 7.
  • 6.  ISSN: 2302-9285 Bulletin of Electr Eng and Inf, Vol. 8, No. 4, December 2019 : 1461 – 1467 1466 Figure 7. Setup module 4.2.4. Encrypted database Figure 8 shows the database of the IFMS. Fields like a reference, subject, and the file content have been encrypted to provide additional security to the file. The fields are encrypted using the modified AES algorithm. Figure 8. Encrypted database 5. CONCLUSION This paper presented an image file management system to provide an avenue for sharing, distributing and viewing image files in a secured manner. A modified AES algorithm was used to encrypt the file and other relevant information to provide additional security to the owner of the file. The image file management system has successfully shared and distributed files among users and has successfully encrypted the file in the server using the modified algorithm. In the future, other file types, such as a document, audio, and video, can be used to share and distribute using the application. ACKNOWLEDGMENT The authors gratefully acknowledge the Commission on Higher Education, K-12 Project Management Unit, Philippines for the scholarship and the Tarlac State University Management Information Systems Office for the completion of the research. REFERENCES [1] D. W. Cromey, “Digital Images Are Data: And Should Be Treated as Such,” in Methods in Molecular Biology, vol. 931, no. 28, D. J. Taatjes and J. Roth, Eds. Totowa, NJ: Humana Press, 2012, pp. 1–27. [2] A. Yudhana, Sunardi, and S. Saifullah, “Segmentation comparing eggs watermarking image and original image,” Bulletin of Electrical Engineering and Informatics, vol. 6, no. 1, pp. 47–53, 2017. [3] Shivaputra, H. Sheshadri, and V. Lokesha, “A Naïve Visual Cryptographic Algorithm for the Transfer of Compressed Medical Images,” Bulletin of Electrical Engineering and Informatics, vol. 5, no. 3, pp. 347–365, 2016. [4] K. J.-W. Kim T., Heo E., Lee M., Kim J., Yoo S., Kim S., Lee K., “Medical image exchange and sharing between heterogeneous picture archiving and communication systems based upon international standard: pilot implementation” 15th Int. HL7 Interoperability Conf., pp. 37–42, 2015. [5] R. Pienaar et al., “CHIPS-A Service for Collecting, Organizing, Processing, and Sharing Medical Image Data in the Cloud,” in Data Management and Analytics for Medicine and Healthcare, 2017, pp. 29–35. [6] L. Zhou, N. Chen, Z. Chen, and C. Xing, “ROSCC: An Efficient Remote Sensing Observation-Sharing Method Based on Cloud Computing for Soil Moisture Mapping in Precision Agriculture,” IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens., vol. 9, no. 12, pp. 5588–5598, 2016.
  • 7. Bulletin of Electr Eng and Inf ISSN: 2302-9285  Developing a secured image file management… (Heidilyn V. Gamido) 1467 [7] H. Abdulkadhim, M. Bahari, A. Bakri, and W. Ismail, “A research framework of electronic document management systems (EDMS) implementation process in government,” J. Theor. Appl. Inf. Technol., vol. 81, 2015. [8] P. K. Das, P. Kumar, and M. Sreenivasulu, “Image Cryptography : A Survey towards its Growth,” Adv. Electron. Electr. Eng. Res. India Publ., vol. 4, no. 2, pp. 179–184, 2014. [9] Q. Zhang and A. Qunding, “Digital image encryption based on Advanced Encryption Standard(AES) algorithm,” 5th Int. Conf. Instrum. Meas. Comput. Commun. Control. IMCCC 2015, pp. 1218–1221, 2015. [10] O. Nekhayenko, “Preserving and accessing content stored on USB-flash-drives–a TIB workflow,” Grey J., vol. 14, no. 2, pp. 95–101, 2017. [11] A. Cohen and N. Nissim, “Trusted Detection of Ransomware in a Private Cloud Using Machine Learning Methods Leveraging Meta-Features from Volatile Memory,” Expert Syst. Appl., 2018. [12] T. F. G. Quilala, A. M. Sison, and R. P. Medina, “Securing Electronic Medical Records Using Modified Blowfish Algorithm,” Indones. J. Electr. Eng. Informatics, vol. 6, no. 3, pp. 309–316, 2018. [13] M. Başıbüyük and A. Ergüzen, “Electronic Document Management System for Kırıkkale University,” Unified J. Comput. Sci. Res. Unif. J. Comp. Sci. Res, vol. 1, no. 2, pp. 8–15, 2015. [14] I. N. Burtylev, K. V Mokhun, Y. V Bodnya, and D. N. Yukhnevich, “Development of Electronic Document Management Systems: Advantage and Efficiency,” Sci. Technol. March, pp. 1–9, 2013. [15] S. B. Seshadri, R. Arenson, S. Khalsa, I. Brikman, and F. van der Voorde, “Prototype Medical Image Management System (MIMS) at the University of Pennsylvania: Software Design Considerations,” J. Digit. Imaging, vol. 16, no. 1, pp. 96–102, Mar. 2003. [16] A. Vreeland et al., “Considerations for Exchanging and Sharing Medical Images for Improved Collaboration and Patient Care: HIMSS-SIIM Collaborative White Paper,” J. Digit. Imaging, vol. 29, no. 5, pp. 547–558, 2016. [17] T. Harron, “SharePoint picture library as a searchable photo database in a small library: a program description,” J. Can. Heal. Libr. Assoc. / J. l’Association des bibliothèques la santé du Canada, vol. 36, no. 1, p. 20, 2015. [18] “Image Management System-Durham University.” [Online]. Available: https://www.dur.ac.uk/marketingandcommunications/marketing/images/. [Accessed: 27-Jul-2018]. [19] H. V. Gamido, A. M. Sison, and R. P. Medina, “Modified AES for Text and Image Encryption,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 11, no. 3, pp. 942–948, 2018. [20] H. V. Gamido, A. M. Sison, and R. P. Medina, “Implementation of Modified AES as Image Encryption Scheme,” Indonesian Journal of Electrical Engineering and Informatics, vol. 6, no. 3, pp. 301–308, 2018. BIOGRAPHIES OF AUTHORS Heidilyn V. Gamido is a graduate of Doctor in Information Technology at Technological Institute of the Philippines, Quezon City under the CHED K-12 Transition Program Scholarship. She obtained her Masters of Engineering major in Information and Communications in 2006 at Pai Chai University, Daejeon South Korea on a scholarship. She finished her BS Information Technology at Saint Louis University, Baguio City Philippines in 2002. She is an Associate Professor of Tarlac State University-College of Computer Studies and designated as the Director of the Management of Information Systems Office. Her research interests include data security, image processing, and information system. Marlon V. Gamido is the Dean of College of Computer Studies in Tarlac State University. He holds a degree in MS in Information Technology from Hannam University, Daejeon Korea on CHED Scholarship. He is currently pursuing his PhD in Educational Management at TSU. He is also a registered Electrical Engineer. His research interests include security and project management. Ariel M. Sison earned his Doctor in Information Technology at the Technological Institute of the Philippines Quezon City in 2013 and graduated with Highest Honors. He took up his master’s degree in computer science at De La Salle University Manila in 2006 and obtained the BS Computer Science at Emilio Aguinaldo College Manila in 1994. He is currently the dean, School of Computer Studies, Emilio Aguinaldo College Manila. His research interests include data mining and data security. Dr. Sison is a member of International Association of Engineers (IAENG), Philippine Society of IT Educators and Computing Society of the Philippines. Currently, he is a Technical Committee Member of International Academy, Research, and Industry Association (IARIA) for International Conference on Systems (ICONS).