We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

An Improved Cryptographic Technique to Encrypt Images using Extended Hill Cipher

by Yashpalsingh Rajput, A K. Gulve
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 83 - Number 13
Year of Publication: 2013
Authors: Yashpalsingh Rajput, A K. Gulve
10.5120/14506-2326

Yashpalsingh Rajput, A K. Gulve . An Improved Cryptographic Technique to Encrypt Images using Extended Hill Cipher. International Journal of Computer Applications. 83, 13 ( December 2013), 4-8. DOI=10.5120/14506-2326

@article{ 10.5120/14506-2326,
author = { Yashpalsingh Rajput, A K. Gulve },
title = { An Improved Cryptographic Technique to Encrypt Images using Extended Hill Cipher },
journal = { International Journal of Computer Applications },
issue_date = { December 2013 },
volume = { 83 },
number = { 13 },
month = { December },
year = { 2013 },
issn = { 0975-8887 },
pages = { 4-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume83/number13/14506-2326/ },
doi = { 10.5120/14506-2326 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:59:15.294116+05:30
%A Yashpalsingh Rajput
%A A K. Gulve
%T An Improved Cryptographic Technique to Encrypt Images using Extended Hill Cipher
%J International Journal of Computer Applications
%@ 0975-8887
%V 83
%N 13
%P 4-8
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This work proposes an improved scheme to encrypt the digital image for its security. The proposed system is divided into 3 main phases. In first phase, the single digit number into which the given digital image can be divided is calculated. In the second phase, bit rotation, reversal & randomization method is applied on each block of the image. In the third phase, the extended hill cipher technique is applied on the image which is an output of second phase. At the receiver end, if the receiver has appropriate decryption key, he can generate the image similar to the original image. This paper is organized into following sections. Section 1 contains a general introduction to the cryptography, image encryption and hill cipher. Section 2 contains literature review on some existing image encryption research papers. Section 3 contains description of the proposed system. Finally paper is concluded in the Section 4.

References
  1. Abhinav Srivastava, "A survey report on Different Techniques of Image Encryption", International Journal of Emerging Technology and Advanced Engineering, ISSN 2250-2459, Vol. 2, Issue 6, June 2012, pp. 163 - 167.
  2. Rajinder Kaur, Er. Kanwalpreet Singh, "Comparative Analysis and Implementation of Image Encryption Algorithms", International Journal of Computer Science and Mobile Computing, Vol. 2, Issue 4, April 2013, pp. 170 – 176.
  3. Somdip Dey, "SD-AI: A Cryptographic Technique to Encrypt Images", International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 26-28 June 2012, pp. 28 - 32.
  4. Chin-Chen Chang, Min-Shian Hwang, Tung-Shou Chen, "A New Encryption Algorithm for Image Cryptosystems", The Journal of Systems and Software, Vol. 58, 2001, pp. 83 – 91.
  5. Garry C. Kessler, "An Overview of Cryptography", http://www. garykessler. net/library/crypto. html#intro
  6. "Practical Cryptography - HILL CIPHER", http://practicalcryptography. com/ciphers/hill-cipher/
  7. Vidit kumar Singh, "Hill Cipher–Essays-Vidschauhan", http://www. studymode. com/essays/Hill-Cipher-1592453. html
  8. S. S. Maniccam, N. G. Bourbakis, "Lossless Image Compression and Encryption Using SCAN", Pattern Recognition, Vol. 34, 2001, pp. 1229 - 1245.
  9. Aloka Sinha and Kehar Singh. , "Technique for Image Encryption Using Digital Signatures", Optics Communications, ARTICLE IN PRESS, 2003, pp. 1 - 6, www. elsevier. com/locate/optcom
  10. Chang-Mok Shin, Dong-Hoan Seo, Kyu-Bo Cho, Ha-Woo Lee and Soo-Joong Kim, "Multi-Level Image Encryption by Binary Phase XOR Operations", The 5th Pacific Rim Conference on Lasers and Electro-Optics, CLEO/Pacific Rim 2003, Taipei 106, Taiwan, 15-19 Dec. 2003.
  11. Mohammad Ali Bani Younes and Aman, "Image Encryption Using Block-Based Transformation Algorithm", in IAENG International Journal of Computer Science, 35:1, IJCS_35_1_03, February 2008.
  12. Bibhudendra Acharya, Saroj Kumar Panigrahy, Sarat Kumar Patra, and Ganapati Panda, "Image Encryption Using Advanced Hill Cipher Algorithm", International Journal of Recent Trends in Engineering, Vol. 1, No. 1, May 2009, pp. 663 - 667.
  13. Amitava Nag, Jyoti Prakash Singh, Srabani Khan, Saswati Ghosh, Sushanta Biswas, D. Sarkar and Partha Pratim Sarkar, "Image Encryption Using Affine Transform and XOR Operation", International Conference on Signal Processing, Communication, Computing and Networking Technologies, 2011, pp. 309 - 312.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Image Key Encryption Decryption Hill Cipher