CFP last date
20 December 2024
Reseach Article

A Comparative Performance Analysis of an Image Encryption Technique using Extended Hill Cipher

by Yashpalsingh Rajput, A K. Gulve
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 95 - Number 4
Year of Publication: 2014
Authors: Yashpalsingh Rajput, A K. Gulve
10.5120/16582-6279

Yashpalsingh Rajput, A K. Gulve . A Comparative Performance Analysis of an Image Encryption Technique using Extended Hill Cipher. International Journal of Computer Applications. 95, 4 ( June 2014), 16-20. DOI=10.5120/16582-6279

@article{ 10.5120/16582-6279,
author = { Yashpalsingh Rajput, A K. Gulve },
title = { A Comparative Performance Analysis of an Image Encryption Technique using Extended Hill Cipher },
journal = { International Journal of Computer Applications },
issue_date = { June 2014 },
volume = { 95 },
number = { 4 },
month = { June },
year = { 2014 },
issn = { 0975-8887 },
pages = { 16-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume95/number4/16582-6279/ },
doi = { 10.5120/16582-6279 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:18:32.774254+05:30
%A Yashpalsingh Rajput
%A A K. Gulve
%T A Comparative Performance Analysis of an Image Encryption Technique using Extended Hill Cipher
%J International Journal of Computer Applications
%@ 0975-8887
%V 95
%N 4
%P 16-20
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The security of digital images is concentrating much attention nowadays, and many image encryption algorithms have been proposed by different authors and researchers. In [1], an improvement over an algorithm for image encryption was proposed. This paper explains the result and analysis of the proposed algorithm in [1]. The paper also discusses about the analysis based on some performance factors. The paper is organized into different sections as follows. Section 1 contains a basic introduction to the image cryptography and hill cipher. Section 2 contains description of the proposed system. Section 3 contains performance analysis of the proposed system. Section 4 contains the conclusion of the work.

References
  1. Yashpalsingh Rajput and A K Gulve, "An Improved Cryptographic Technique to Encrypt Images using Extended Hill Cipher", International Journal of Computer Applications 83(13):4-8, December 2013. Published by Foundation of Computer Science, New York, USA
  2. Somdip Dey, "SD-AI: A Cryptographic Technique to Encrypt Images", International Conference on Cyber Security, Cyber Warfare and Digital Forensic, 26-28 June 2012, pp. 28 - 32.
  3. Garry C. Kessler, "An Overview of Cryptography", http://www. garykessler. net/library/crypto. html#intro
  4. Jolly Shah and Dr. Vikas Saxena, "Performance study on Image Encryption Schemes", International Journal Of Computer Science Issues, Vol. 8, Issue 4, No 1, July 2011, pp. 349 – 355.
  5. AL. Jeeva, Dr. V. Palanisamy, K. Kanagaram, "Comparative Analysis of Performance Efficiency and Security Measures of Some Encryption Algorithms", International Journal of Engineering Research and Applications, Vol. 2, Issue 3, May-Jun 2012, pp. 3033 – 9622.
  6. "Practical Cryptography - HILL CIPHER", http://practicalcryptography. com/ciphers/hill-cipher/
  7. Vidit Kumar Singh, "Hill Cipher–Essays-Vidschauhan", http://www. studymode. com/essays/Hill-Cipher-1592453. html
  8. Howard Cheng and Xiaobo Li, "Partial Encryption of Compressed Images and Videos," IEEE Transaction on Signal Processing, Vol. 48, No. 8, August 2000, pp. 2439- 2451.
  9. M. Podesser, H. P. Schmidt, and A. Uhl, "Selective Bitplane Encryption for Secure Transmission of Image Data in Mobile Environments," in Proceedings of the 5th Nordic Signal Processing Symposium, Tromso, Norway, October 2002.
  10. M. Van Droogenbroeck and R. Benedett, "Techniques for a selective encryption of uncompressed and compressed images", in Proceedings of Advanced Concepts for Intelligent Vision Systems, Ghent, Belgium, September 9-11, 2002, pp. 90-97.
  11. Y. V. Subba Rao, Abhijit Mitra and S. R. Mahadeva Prasanna, "A Partial Image Encryption Method with Pseudo Random Sequences", In Proceedings of International Conference on Information System Security, Kolkata, India, December 19-21, 2006, Springer LNCS 4332, pp. 315-325.
  12. Nidhi s. Kulkarni, Indra Gupta and Shailendra N. Kulkarni, "A Robust Image Encryption Technique based on Random Vector", in International Conference on Emerging Trend in Engineering and Technology, July 16-18, 2008, pp. 15-19.
  13. Shaimaa A. El-Said, Khalid F. A. Hussein and Mohammed M. Fouad, "Securing Image Transmission using In-compression Encryption Techniques", International Journal of Computer Science and Security, Vol. 4, No. 5, 2010, pp. 466-481.
  14. Kerckhoffs principle - http://www. princeton. edu/ ~achaney/tmve/wiki100k/docs/ Kerckhoffs__principle. html
  15. PSNR - http://en. wikipedia. org/wiki/Peak_signal-to-noise_ratio
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Cryptanalysis Image Key Hill Cipher