An Investigation of Different Image Encryption Techniques based on Hill Cipher

Authors

  • Manju Sharma  Lecturer (Sel. Grade) Govt. Women polytechnic College, Ajmer, Rajasthan, India
  • Manju Meena  Lecturer Govt. Women polytechnic College, Ajmer, Rajasthan, India

Keywords:

Image Encryption, Hill Cipher, Symmetric Key Cryptography, Asymmetric Key Cryptography

Abstract

In recent times, security of multimedia data is an important issue. With the advancement and easier availability of internet at low cost, as lead to increased use of multimedia data. Till date large number of image encryption methodologies have been proposed to protect image data from unauthorized use. In this paper we review different image encryption techniques using hill cipher & compare the results obtained from different techniques.

References

  1. Bibhudendra Acharya, Girija Sankar Rath, Sarat Kumar Patra, Saroj Kumar Panigrahy. 2007. "Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm", International Journal of Security, Vol 1, Issue 1, 2007, pp. 14-21.
  2. Bibhudendra Acharya, Saroj Kumar Panigrahy, Sarat Kumar Patra, Ganpati Panda. 2009. "Image Encryption Using Advanced Hill Cipher Algorithm", International Journal of Recent Trends in Engineering, Vol 1, No. 1, May 2009.
  3. Stallings, W. Cryptography and Network Security.2005. 4th Edition, Prentice Hall.
  4. Sheetal Khobrekar, Nayanashenvi.2016. "Effect of K- Modulus Method on JPEG Compression and Hill Cipher Encryption", International Journal of Technology and science, Issue 1, 2016 pp. 13-16
  5. K. Mani, M. Viswambari, 2017. "Generation of Key Matrix for Hill Cipher using Magic Rectangle". Advance in Computational Science and Technology, Volume 10, Number 5 (2017) pp. 1081-1090
  6. Panduranga H T , Naveen Kumar S K .2012. "Advanced Partial Image Encryption using Two- Stage Hill Cipher technique". International Journal of Computer Applications( 0975-8887) Volume 60-no. 16 December 2012
  7. M.G Vara Prasad, P. Sundarayya. "Generalized Self-Invertiblekey Generation Algorithm by using Reflection Matrix in Hill Cipher and Affine Hill Cipher". International journal of pharmacy & Technology. ISSN; 0975-766X, 2016
  8. Rakesh Ranjan, R. K Sharma and M.Hanmandlu . "Color Image Encryption and decryption using Hill Cipher associated with Arnold Transform". Application and applied Mathematics an International Journal. Vol. 11, Issue 1 (June 2016), pp. 45-60
  9. M.D Randeri, S.D. Degadwala , A. Mahajan. "A Study on Image Encryption Using Key Matrix Generation from Biometric Mixed Fingerprint Image for Two Level Security". International Journal of Scientific Research in Computer Science, Engineering and Information Technology. Volume 2, issue 6.
  10. Andysah Putera Utama Siahaan , "Genetic Algorithm in Hill Cipher Encryption", American International Journal of research in Science, Technology, Engineering & Mathematics.
  11. Rakesh Kumar Jangid, Noor Mohmmad, Abhishek Didel, Swapnesh Taterh.Hybrid . "Approach of Image Encryption Using DNA Cryptography and TF Cipher Algorithm", International conference on communication and Signal Processing, April 3-5, 2014
  12. Mohammad Hadi Valizadeh . "Healing the Hill Cipher, Improved Approach to Secure Modified Hill against Zero-plaintext Attack".
  13. Subhas Barman, Debasis Samanta and Samiran Chattopadhyay. "Fingerprint-based Crypto-Biometric System for Network Security". Journal on Information security (2015).
  14. Bibhudenra Acharya, Debasish Jena, sarat Kumar Patra, and Ganapati Panda. "Invertible, Involutory and Permutation Matrix generation Method for Hill Cipher System". International Conference on Advanced Computer Control.
  15. V.U.K Sastry and V.Janaki . "Modified Hill Cipher with Key Dependent Permutation and Circular Rotation", Journal of Computer Science, Volume 3(9).2007.
  16. Abd Manaf et al. "On the affine Ciphers in Cryptogarphy" Springer-Verlag Berlin Heidelberg 2011,pp. 185-199.
  17. Goutham L, Mahendra M S, Manasa A p, Mr. Prajwalasimha S N4, " Modified Hill Cipher Based Image Encryption Technique" .(IJRASET), Volume 5 Issue IV, April 2017.
  18. Sharda Singh, Dr. J. A. Laxminarayana, "RSA Key Generation Using Combination of Fingerprints", IOSR Journal of computer Engineering (IOSR-JCE), e- ISSN: 2278-0661, (AETM’15).
  19. Liu Z, Xu L, Liu T, Chen H, Li P, Lin C, Liu S. "Color image encryption by using Arnold Transform and Color-blend Operation in Discrete Cosine Transform Domains", Optics Communication, 2011; 284: 123-8
  20. Analysis and Design of Affine and Hill Cipher, Journal of Mathematics Research Vol. 4, No. 1; February 2012.
  21. Firas A. Jassim , "Increasing Compression Ratio in PNG Images by K-Modulus Method for image Transformation".
  22. Saroj Kumar Panigrahy , "Image Encryption using Self- Invertible Key Matrix of Hill Cipher Algorithm".
  23. Lerma, M.A., 2005. Modular Arithmatic. http://www.math.northwestern.edu/`mlerma/problem_solving/results/modular_airth.pdf.

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
Manju Sharma, Manju Meena, " An Investigation of Different Image Encryption Techniques based on Hill Cipher, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 1, pp.1581-1586, January-February-2018.