We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Advanced Partial Image Encryption using Two-Stage Hill Cipher Technique

by Panduranga H T, Naveen Kumar S K
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 60 - Number 16
Year of Publication: 2012
Authors: Panduranga H T, Naveen Kumar S K
10.5120/9775-4341

Panduranga H T, Naveen Kumar S K . Advanced Partial Image Encryption using Two-Stage Hill Cipher Technique. International Journal of Computer Applications. 60, 16 ( December 2012), 14-19. DOI=10.5120/9775-4341

@article{ 10.5120/9775-4341,
author = { Panduranga H T, Naveen Kumar S K },
title = { Advanced Partial Image Encryption using Two-Stage Hill Cipher Technique },
journal = { International Journal of Computer Applications },
issue_date = { December 2012 },
volume = { 60 },
number = { 16 },
month = { December },
year = { 2012 },
issn = { 0975-8887 },
pages = { 14-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume60/number16/9775-4341/ },
doi = { 10.5120/9775-4341 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:07:07.361881+05:30
%A Panduranga H T
%A Naveen Kumar S K
%T Advanced Partial Image Encryption using Two-Stage Hill Cipher Technique
%J International Journal of Computer Applications
%@ 0975-8887
%V 60
%N 16
%P 14-19
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Information security is a fast growing research field which includes numerous problems in it. Partial image encryption is one of the important problems in the field of image information security. This paper describes the partial image encryption in two ways using hill cipher technique. First encryption technique uses two slightly different keys to construct two self-invertible matrices, which are used in two different stages to get partially encrypted image. Second encryption technique useone key to construct one self-invertible matrix and it is used in first stage. In second stage same key matrix along with few modification in diagonal values are used to construct another self-invertible matrix which leads to partial image encryption. Reverse process is employed to reconstruct the original image. Experiment is conducted for different images with different combinations of passwords to obtain partially encrypted image.

References
  1. BibhudendraAcharya, GirijaSankarRath, Sarat Kumar Patra, Saroj Kumar Panigrahy. "Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm", International Journal of Security, Vol 1, Issue 1, pp. 14-21, 2007.
  2. BibhudendraAcharyaet. al, "Involutory, permuted and reiterative key matrix generation method for hill cipher system", International journal of recent trends in engineering, Vol. 1, No. 4, pp. 106-108, May 2009.
  3. BibhudendraAcharyaet. al, "Image encryption using Advanced hill cipher algorithm", International journal of recent trends in engineering, Vol. 1, No. 1, pp. 663-667, May 2009.
  4. Han Shuihunaet. al, "An asymmemtric Image Encryption Based on Matrix Transformation", ECTI Transaction on computer and information technology, Vol. 1, No. 2, pp 126-133, November 2005.
  5. H. S. kwok, Wallace k. S. Tang, "A fast image encryption system based on chaotic maps with finite precision representation", Chaos, Solitons and Fractals 32 (2007) 1518-1529.
  6. Qu Wang , QingGuo , JinyunZhou , Double image encryption based on linear blend operation and random phase encoding in fractional Fourier domain, Optics Communications.
  7. Jun Li , Tao Zheng, Qing-zhi Liu, Rong Li, Double-image encryption on joint transform correlator using two-step-only quadrature phase-shifting digital holography, Optics Communications 285 (2012) 1704–1709.
  8. Panduranga H. T, Naveenkumar S. K, "A novel image encryption method using 4outof8 code", proc. CommV?09, pp 460 -462, 2009.
  9. GauravBhatnagar , Q. M. Jonathan Wu, Selective image encryption based on pixels of interest and singular value decomposition, Digital Signal Processing 22 (2012) 648–663.
  10. SapnaSasidharan and DeepuSleeba Philip, A Fast Partial Image Encryption Scheme With Wavelet Transform And Rc4, International Journal of Advances in Engineering & Technology, Sept 2011.
  11. Xiongjun Li, A New Measure of Image Scrambling Degree Based on Grey Level Difference and Information Entropy, International Conference on Computational Intelligence and Security 2008.
  12. YueWu,Joseph P. Noonan and SosAgaian, NPCR and UACI Randomness Tests for Image Encryption, yber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), April Edition, 2011
Index Terms

Computer Science
Information Sciences

Keywords

Partial encryption hill cipher carrier image self-invertible matrix