An Improved Cryptographic Technique to Encrypt Images using Extended Hill Cipher
نویسنده
چکیده
This work proposes an improved scheme to encrypt the digital image for its security. The proposed system is divided into 3 main phases. In first phase, the single digit number into which the given digital image can be divided is calculated. In the second phase, bit rotation, reversal & randomization method is applied on each block of the image. In the third phase, the extended hill cipher technique is applied on the image which is an output of second phase. At the receiver end, if the receiver has appropriate decryption key, he can generate the image similar to the original image. This paper is organized into following sections. Section 1 contains a general introduction to the cryptography, image encryption and hill cipher. Section 2 contains literature review on some existing image encryption research papers. Section 3 contains description of the proposed system. Finally paper is concluded in the Section 4.
منابع مشابه
Differential Power Analysis: A Serious Threat to FPGA Security
Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...
متن کاملImage Encryption Using Advanced Hill Cipher Algorithm
The Hill cipher algorithm is one of the symmetric key algorithms that have several advantages in data encryption. But, the inverse of the key matrix used for encrypting the plaintext does not always exist. Then if the key matrix is not invertible, then encrypted text cannot be decrypted. In the Involutory matrix generation method the key matrix used for the encryption is itself invertible. So, ...
متن کاملA Secure Iris Image Encryption Technique Using Bio-Chaotic Algorithm
Due to dramatic enhancement in computers and communications and due to huge use of electronic media, security gains more and more importance especially in those organizations where information is more critical and more important. The older techniques such as conventional cryptography use encryption keys, which are long bit strings and are very hard to memorize such a long random numbers. Also i...
متن کاملSD-AREE-I Cipher: Amalgamation of Bit Manipulation, Modified VERNAM CIPHER & Modified Caesar Cipher (SD-AREE)
This paper presents a new combined symmetric key cryptographic technique, which is generally an amalgamation of Bit Manipulation, generalized Modified Vernam Cipher, Single Bit Manipulation and Modified Caesar Cipher. The technique proposed here is basically an advanced and upgraded module of SD-AREE cryptographic method, which is based on Modified Caesar Cipher along with Bit Manipulation and ...
متن کاملA Noval Security Mechanism for Image Authentication and Copyright Protection
Encryption and watermarking are two primary and complementary technologies for protecting multimedia content. In this paper, we present a hybrid image protection scheme to establish a robust content-based authentication by using novel cryptosystem based on matrix transformation for generation of encryption key and copyright protection by using SVD based watermarking system. This paper suggests ...
متن کامل