SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
ACEEE International Journal on Signal and Image Processing Vol 1, No. 1, Jan 2010




    Image Encryption Using Advanced Hill Cipher
                     Algorithm
            Bibhudendra Acharya1, Saroj Kumar Panigrahy2, Sarat Kumar Patra3, and Ganapati Panda3
                               1
                                   Department of E & TC, NIT Raipur, Chhattisgarh-492010, India
                                                     bibhudendra@gmail.com
                                     2
                                       Department of CSE, NIT Rourkela, Orissa-769008, India
                                                       skp.nitrkl@gmail.com
                                     3
                                       Department of ECE, NIT Rourkela, Orissa-769008, India
                                                   {skpatra, gpanda}@nitrkl.ac.in


Abstract—The Hill cipher algorithm is one of the symmetric                engineering [1].
key algorithms that have several advantages in data                          Substitution cipher is one of the basic components of
encryption. But, the inverse of the key matrix used for                   classical ciphers. A substitution cipher is a method of
encrypting the plaintext does not always exist. Then if the               encryption by which units of plaintext are substituted
key matrix is not invertible, then encrypted text cannot be
decrypted. In the Involutory matrix generation method the
                                                                          with ciphertext according to a regular system; the units
key matrix used for the encryption is itself invertible. So, at           may be single letters (the most common), pairs of letters,
the time of decryption we need not to find the inverse of the             triplets of letters, mixtures of the above, and so forth. The
key matrix. The objective of this paper is to encrypt an                  receiver deciphers the text by performing an inverse
image using a technique different from the conventional Hill              substitution [8]. The units of the plaintext are retained in
Cipher. In this paper a novel advanced Hill (AdvHill)                     the same sequence as in the ciphertext, but the units
encryption technique has been proposed which uses an                      themselves are altered. There are a number of different
involutory key matrix. The scheme is a fast encryption                    types of substitution cipher. If the cipher operates on
scheme which overcomes problems of encrypting the images                  single letters, it is termed a simple substitution cipher; a
with homogeneous background. A comparative study of the
proposed encryption scheme and the existing scheme is
                                                                          cipher that operates on larger groups of letters is termed
made. The output encrypted images reveal that the                         polygraphic. A monoalphabetic cipher uses fixed
proposed technique is quite reliable and robust.                          substitution over the entire message, whereas a
                                                                          polyalphabetic cipher uses a number of substitutions at
Index Terms—Encryption, Decryption, Hill Cipher, Image                    different times in the message— such as with
Encryption, Advanced Hill Cipher.                                         homophones, where a unit from the plaintext is mapped
                                                                          to one of several possibilities in the ciphertext. Hill
                       I. INTRODUCTION                                    cipher is a type of monoalphabetic polygraphic
                                                                          substitution cipher. Hill cipher is a block cipher that has
   Owing to the advance in network technology,                            several advantages such as disguising letter frequencies
information security is an increasingly important                         of the plaintext, its simplicity because of using matrix
problem. Popular application of multimedia technology                     multiplication and inversion for enciphering and
and increasingly transmission ability of network                          deciphering, its high speed, and high throughput [5,7].
gradually leads us to acquire information directly and                       In this paper, we have proposed an advanced Hill
clearly through images. Cryptography, the science of                      (AdvHill) cipher algorithm which uses an Involutory key
encryption, plays a central role in mobile phone                          matrix for encryption [1]. The objective of this paper is to
communications, pay-TV, e-commerce, sending private                       overcome the drawback of using a random key matrix in
emails, transmitting financial information, security of                   Hill cipher algorithm for encryption, where we may not
ATM cards, computer passwords, and touches on many                        be able to decrypt the encrypted message, if the key
aspects of our daily lives. Cryptography is the art or                    matrix is not invertible. Also the computational
science encompassing the principles and methods of                        complexity can be reduced by avoiding the process of
transforming an intelligible message (plaintext) into one                 finding inverse of the matrix at the time of decryption, as
that is unintelligible (ciphertext) and then retransforming               we use Involutory key matrix for encryption. Using this
that message back to its original form. In modern times,                  key matrix we encrypted gray scale as well as color
cryptography is considered to be a branch of both                         images. Our algorithm works well for all types of gray
mathematics and computer science, and is affiliated                       scale as well as color images except for the images with
closely with information theory, computer security, and                   background of same gray level or same color.
                                                                             The organization of the paper is as follows. Following
  This research work was carried out at the Department of ECE, NIT        the introduction, the basic concept of Hill Cipher is
Rourkela, Orissa-769008, India.                                           outlined in section II. Section III discusses about the
Corresponding author: bibhudendra@gmail.com                               modular arithmetic. In section IV, a method of generating

                                                                     37
© 2010 ACEEE
DOI: 01.ijsip.01.01.08
ACEEE International Journal on Signal and Image Processing Vol 1, No. 1, Jan 2010




Involutory key matrix is explained. Section V presents                                   III. MODULAR ARITHMETIC
the proposed method of image encryption using advanced
                                                                            The arithmetic operation presented here are addition,
Hill Cipher (AdvHill) algorithm. Experimental results are
                                                                         subtraction, unary operation, multiplication and division
discussed in section VI. Finally, section VII describes the
                                                                         [9]. Based on this, the Involutory matrix for Hill cipher
concluding remarks.
                                                                         algorithm is generated. The congruence modulo operator
                                                                         has the following properties:
                        II. HILL CIPHER
   It is developed by the mathematician Lester Hill. The                   1. a ≡ b mod p if n (a − b )
core of Hill cipher is matrix manipulations. For
encryption, algorithm takes m successive plaintext
                                                                           2. (a mod p ) = (b mod p ) ⇒ a ≡ b mod p
letters and instead of that substitutes m cipher letters. In
Hill cipher, each character is assigned a numerical value
like a = 0, b = 1, ... , z = 25 [5, 9]. The substitution of
                                                                           3. a ≡ b mod p ⇒ b ≡ a mod p
ciphertext letters in the place of plaintext letters leads to
 m linear equation. For m = 3 , the system can be
                                                                           4. a ≡ b mod p and b ≡ a mod p ⇒ a ≡ c mod p

                                                                           Let Z p = [0, 1,..., p − a ] the set of residues modulo p .
described as follows:

     C1 = ( K 11 P1 + K 12 P2 + K 13 P3 ) mod 26                         If modular arithmetic is performed within this set Z p ,
     C 2 = ( K 21 P1 + K 22 P2 + K 23 P3 ) mod 26           … (1)        the following equations present the arithmetic operations:
     C1 = ( K 31 P1 + K 32 P2 + K 33 P3 ) mod 26                                                     Addition:

  This case can be expressed in terms of column vectors                           (a + b ) mod p = [(a mod p )+ (b mod p )] mod p
and matrices:
                                                                                                     Negation:
     ⎛ C1 ⎞ ⎡ K11      K12    K13 ⎤⎛ P ⎞
     ⎜ ⎟ ⎢                           ⎜ 1⎟
     ⎜ C2 ⎟ = ⎢ K 21   K 22   K 23 ⎥⎜ P2 ⎟
                                   ⎥
                                                            … (2)                          − a mod p = p − ( a mod p )
     ⎜ C ⎟ ⎢K
     ⎝ 3 ⎠ ⎣ 31        K 32   K 33 ⎥⎜ P3 ⎟
                                   ⎦⎝ ⎠
                                                                                                   Subtraction:
   or simply we can write as C = KP , where C and P
are column vectors of length 3, representing the plaintext                      (a − b ) mod p = [(a mod p ) − (b mod p )] mod p
and ciphertext respectively, and K is a 3 × 3 matrix,
which is the encryption key. All operations are performed                                         Multiplication:
mod 26 here. Decryption requires using the inverse of
                                                                                  (a ∗ b ) mod   p = [(a mod p ) ∗ (b mod p )] mod p
the matrix K . The inverse matrix K −1 of a matrix K is
defined by the equation KK -1 = K -1 K = I , where I is                                              Division:
the Identity matrix. But the inverse of the matrix does not
always exist, and when it does, it satisfies the preceding                        (a / b ) mod p = c when        a = (b ∗ c ) mod p
equation. K −1 is applied to the ciphertext, and then the
plaintext is recovered [2,6]. In general term we can write               The following exhibits the properties of modular
as follows:                                                              arithmetic.

                        For encryption:
                                                                           Commutative Law:
     C = E k ( P) = K p                                     … (3)          (ω + x ) mod p = ( x + ω ) mod p
                                                                           (ω ∗ x ) mod p = (x ∗ω ) mod p
                        For decryption:                                    Associative law:
     P = D k (C ) = K C = K K p = P
                        -1        -1
                                                            … (4)          [(ω + x ) + y ] mod p = [ω + (x + y )] mod p
                                                                           Distribution Law:
   If the block length is m, there are 26 different mm
                                                                           [ω ∗ (x + y )] mod p = [{(ω ∗ x )mod p}∗ {(ω ∗ y )mod p}]mod p
letters blocks possible, each of them can be regarded as a
letter in a 26m -letter alphabet. Hill's method amounts to a               Identities:
monoalphabetic substitution on this alphabet [5].
                                                                           (0 + a ) mod p = a mod p
                                                                           and (1∗ a ) mod p = a mod      p

                                                                    38

© 2010 ACEEE
DOI: 01.ijsip.01.01.08
ACEEE International Journal on Signal and Image Processing Vol 1, No. 1, Jan 2010




                                                                              ⎡10 2⎤
                                                                    Let A22 = ⎢    ⎥,
  Inverses:                                                                   ⎣ 3 4⎦
       For each x ∈ Z p , ∃y such that
                                                                                ⎡ 3 11⎤
           (x + y ) mod p = 0   then y = − x                        then, A11 = ⎢     ⎥.
                                                                                ⎣10 9 ⎦
  For each x ∈ Z p ∃y such that (x ∗ y ) mod p = 1
                                                                    If k is selected as 2,
       IV. GENERATION OF INVOLUTORY KEY MATRIX
                                                                                                ⎡9 4 ⎤
                                                                    then, A12 = k ( I − A11 ) = ⎢    ⎥,
   The proposed AdvHill algorithm uses an involutory                                            ⎣6 10⎦
key matrix for encryption technique. The various
proposed methods can be found in literature [1]. One of                       ⎡2 12⎤
the methods is explained below.                                     and A21 = ⎢    ⎥
    A is called a involutory matrix if A = A −1 . The                         ⎣5 5 ⎦
analysis presented here for generation of involutory key
matrix is valid for matrix of +ve integers that are the                     ⎡ 3 11 9 4 ⎤
                                                                            ⎢10 9 6 10⎥
residues of modulo arithmetic of a number. This                     So, A = ⎢           ⎥ will be the involutory matrix.
algorithm can generate involutory matrices of order                         ⎢ 2 12 10 2 ⎥
 n × n where n is even.                                                     ⎢           ⎥
                                                                            ⎣5 5 3 4⎦

         ⎡ a11 a12     ... ... a1n ⎤                                  V. IMAGE ENCRYPTION USING ADVHILL TECHNIQUE
         ⎢a
            21 a22     ... ... a2 n ⎥
                                    ⎥
  Let A= ⎢ ... ...
                                                                       As we note that Hill cipher can be adopted to encrypt
         ⎢             ... ... ... ⎥ be an n × n involutory         grayscale and color images, proposed AdvHill algorithm
         ⎢ ... ...     ... ... ... ⎥                                can also be used for grayscale and color images. For
         ⎢                          ⎥
         ⎣ an1 an 2    ... ... ann ⎦                                grayscale images, the modulus will be 256 (the number
                          ⎡A         A12 ⎤                          of levels is considered as the number of alphabets). In the
matrix partitioned to A = ⎢ 11
                                     A22 ⎥
                                           , where n is even        case of color images, first decompose the color image
                          ⎣ A21          ⎦                          into (R-G-B) components. Second, encrypt each
                                                       n n          component (R-G-B) separately by the algorithm. Finally,
and A11 , A12, A21 & A22 are matrices of order          ×           concatenate the encrypted components together to get the
                                                       2 2
each.                                                               encrypted color image [10]. The algorithm is given below
   So, A12 A21 = I − A11 = (I − A11 )(I + A11 )
                      2                                             and the block diagram for the encryption process is
                                                                    shown in Figure 1.
   If A12 is one of the factors of I − A11 then A21 is the
                                           2
                                                                    Algorithm AdvHill:
other.
   Solving the 2nd matrix equation results A11 + A22 = 0 .             Step1. A involutory key matrix of dimensions m × m
   Then form the matrix.                                                      is constructed.

                                                                       Step2. The plain image is divided into m × m
Algorithm:
                                                                              symmetric blocks.
                                n n
  1.    Select any arbitrary     × matrix A22 .                        Step3. The ith pixels of each block are brought
                                2 2
                                                                              together to form a temporary block.
  2.    Obtain A11 = − A22 .
                                                                               a. Hill cipher technique is applied onto the
  3.    Take A12 = k (I − A11 ) or k (I + A11 ) where k is a                      temporary block.

        scalar constant.                                                       b. The resultant matrix is transposed and Hill
                                                                                  cipher is again applied to the this matrix.
  4.    Then, A21 =
                      1
                        (I + A11 ) or 1 (I − A11 ) .                   Step4. The final matrix obtained is placed in the ith
                      k               k
                                                                              block of the encrypted image.
5. Form the matrix completely.


Example: (For Modulo 13)
                                                               39

© 2010 ACEEE
DOI: 01.ijsip.01.01.08
ACEEE International Journal on Signal and Image Processing Vol 1, No. 1, Jan 2010




     Figure. 1. The block diagram for proposed AdvHill algorithm.




               VI. EXPERIMENTAL RESULTS
   We have taken different images and encrypted them
using original Hill and our proposed AdvHill algorithm
and the results are shown below in Figure 2 and 3. It is
clearly noticeable from the Figure 2(e, g), that original
Hill Cipher can’t encrypt the images properly if the
image consists of large area covered with same colour or
gray level [8]. But our proposed algorithm works for any
images with different gray scale as well as colour images.
In Figure 3, it is found that our proposed AdvHill
algorithm can able to encrypt the image properly as
compared to original Hill Cipher algorithm.
                                                                         Figure. 2. Original images (a, c, e, g, i) and corresponding encrypted
                                                                                images (b, d, f, h, j) by original Hill Cipher Algorithm




                                                                    40

© 2010 ACEEE
DOI: 01.ijsip.01.01.08
ACEEE International Journal on Signal and Image Processing Vol 1, No. 1, Jan 2010




                                                                                                      REFERENCES
                                                                              [1] Bibhudendra Acharya, Girija Sankar Rath, Sarat Kumar
                                                                                  Patra, Saroj Kumar Panigrahy. 2007. Novel Methods of
                                                                                  Generating Self-Invertible Matrix for Hill Cipher
                                                                                  Algorithm, International Journal of Security, Vol 1, Issue
                                                                                  1, 2007, pp. 14-21.
                                                                              [2] Imai H., Hanaoka G., Shikata J., Otsuka A., Nascimento
                                                                                  A.C. 2002. Cyptography with Information Theoretic
                                                                                  Security. Information Theory Workshop, 2002,
                                                                                  Proceedings of the IEEE, 20-25 Oct 2002.
                                                                              [3] Lerma,       M.A.,     2005.   Modular      Arithmetic.
                                                                                  http://www.math.northwestern.edu/~mlerma/problem_solv
                                                                                  ing/results/modular_arith.pdf.
                                                                              [4] Li, S., Zheng, X., 2002. On the Security of an Image
                                                                                  Encryption             Method.              ICIP2002.
                                                                                  http://www.hooklee.com/Papers/ICIP2002.pdf.
                                                                              [5] Menezes, A. J., P.C. Van Oorschot, S.A. Van Stone. 1996.
                                                                                  Handbook of Applied Cryptography. CRC press.
                                                                              [6] Overbey, J., Traves, W., Wojdylo, J., 2005. On the
                                                                                  keyspace of the Hill cipher. Cryptologia, 29(l):59-72.
                                                                              [7] Petersen, K., 2000. Notes on Number Theory and
                                                                                  Cryptography.
                                                                                  http://www.math.unc.edu/Faculty/petersen/Coding/cr2.pdf.
                                                                              [8] Saeednia, S., 2000. How to make the Hill cipher secure.
                                                                                  Cryptologia, 24(4):353-360.
                                                                              [9] Stallings, W. Cryptography and Network Security.2005. 4th
                                                                                  edition, Prentice Hall.
Figure. 3. Original images (a,d) and corresponding encrypted images (b,e)
   by original Hill Cipher Algorithm and (c,f) by our proposed AdvHill        [10] ISMAIL I.A., AMIN Mohammed, DIAB Hossam, How to
                                 algorithm
                                                                                   repair the Hill cipher, Journal of J Zhejiang Univ
                                                                                   SCIENCE A, vol. 7(12), pp. 2022-2030, 2006.
                  VII. CONCLUSION
                                                                              [11] Y. Rangel-Romero, R. Vega-García, A. Menchaca-
  This paper suggests efficient method of encryption of
image. Proposed AdvHill algorithm is more secure to                                Méndez, D. Acoltzi-Cervantes, L. Martínez-Ramos, M.
brute force attacks as compared to original Hill cipher                            Mecate-Zambrano, F. Montalvo-Lezama, J. Barrón-
                                                                                   Vidales, N. Cortez-Duarte, F. Rodríguez-Henríquez,
algorithm. A Brute Force Attack requires 2 7 +8*(n / 2)
                                                                     2

                                                                                   Comments on How to repair the Hill cipher, Journal of J
number of key generations; where n is the order of key
matrix. AdvHill is a fast encryption technique which can                           Zhejiang Univ SCIENCE A, pp. 1-4, 2007.
provide satisfactory results against the normal hill cipher
technique. The proposed scheme is resistant against
known plaintext attacks.




                                                                         41

© 2010 ACEEE
DOI: 01.ijsip.01.01.08

Weitere ähnliche Inhalte

Was ist angesagt?

Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 
Performance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniquePerformance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniqueAncy Mariam Babu
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”IOSR Journals
 
Survey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithmsSurvey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithmsEditor Jacotech
 
On the Usage of Chained Codes in Cryptography
On the Usage of Chained Codes in CryptographyOn the Usage of Chained Codes in Cryptography
On the Usage of Chained Codes in CryptographyCSCJournals
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationIJTET Journal
 
Lightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETSLightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETSIJCNCJournal
 
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)IOSR Journals
 
Message Embedded Cipher Using 2-D Chaotic Map
Message Embedded Cipher Using 2-D Chaotic MapMessage Embedded Cipher Using 2-D Chaotic Map
Message Embedded Cipher Using 2-D Chaotic Mapijccmsjournal
 
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsColor Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsIJTET Journal
 
Image Encryption and Compression
Image Encryption and Compression Image Encryption and Compression
Image Encryption and Compression Sayantan Sur
 
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...IOSR Journals
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmIAEME Publication
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd Iaetsd
 
Implementation Secure Authentication Using Elliptic Curve Cryptography
Implementation Secure Authentication Using Elliptic Curve CryptographyImplementation Secure Authentication Using Elliptic Curve Cryptography
Implementation Secure Authentication Using Elliptic Curve CryptographyAM Publications
 

Was ist angesagt? (17)

Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
Performance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniquePerformance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption technique
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
 
Survey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithmsSurvey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithms
 
On the Usage of Chained Codes in Cryptography
On the Usage of Chained Codes in CryptographyOn the Usage of Chained Codes in Cryptography
On the Usage of Chained Codes in Cryptography
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
 
Lightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETSLightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETS
 
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
 
Message Embedded Cipher Using 2-D Chaotic Map
Message Embedded Cipher Using 2-D Chaotic MapMessage Embedded Cipher Using 2-D Chaotic Map
Message Embedded Cipher Using 2-D Chaotic Map
 
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsColor Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic Maps
 
Ew4301904907
Ew4301904907Ew4301904907
Ew4301904907
 
Image Encryption and Compression
Image Encryption and Compression Image Encryption and Compression
Image Encryption and Compression
 
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithm
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detection
 
Implementation Secure Authentication Using Elliptic Curve Cryptography
Implementation Secure Authentication Using Elliptic Curve CryptographyImplementation Secure Authentication Using Elliptic Curve Cryptography
Implementation Secure Authentication Using Elliptic Curve Cryptography
 
Secure image encryption using aes
Secure image encryption using aesSecure image encryption using aes
Secure image encryption using aes
 

Andere mochten auch

Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
 
Image encryption technique incorporating wavelet transform and hash integrity
Image encryption technique incorporating wavelet transform and hash integrityImage encryption technique incorporating wavelet transform and hash integrity
Image encryption technique incorporating wavelet transform and hash integrityeSAT Journals
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryptionvaishali kataria
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherAashirwad Kashyap
 
Image encryption
Image encryptionImage encryption
Image encryptionrakshit2105
 
Cypher technique
Cypher techniqueCypher technique
Cypher techniqueZubair CH
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryptionAashish R
 
Chaos Theory: An Introduction
Chaos Theory: An IntroductionChaos Theory: An Introduction
Chaos Theory: An IntroductionAntha Ceorote
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniquesMohd Arif
 

Andere mochten auch (12)

Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm
Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm
Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
 
Image encryption technique incorporating wavelet transform and hash integrity
Image encryption technique incorporating wavelet transform and hash integrityImage encryption technique incorporating wavelet transform and hash integrity
Image encryption technique incorporating wavelet transform and hash integrity
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryption
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill Cipher
 
Image encryption
Image encryptionImage encryption
Image encryption
 
Cypher technique
Cypher techniqueCypher technique
Cypher technique
 
Digital water marking
Digital water markingDigital water marking
Digital water marking
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
 
Chaos Theory: An Introduction
Chaos Theory: An IntroductionChaos Theory: An Introduction
Chaos Theory: An Introduction
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniques
 

Ähnlich wie Image Encryption Using Advanced Hill Cipher Algorithm

An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...IJEACS
 
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET Journal
 
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...IRJET Journal
 
Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229Editor IJARCET
 
Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229Editor IJARCET
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...IJCSIS Research Publications
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionIJERA Editor
 
IRJET-Triple Layered Security on Android Based SMS Transaction
IRJET-Triple Layered Security on Android Based SMS TransactionIRJET-Triple Layered Security on Android Based SMS Transaction
IRJET-Triple Layered Security on Android Based SMS TransactionIRJET Journal
 
Color Cryptography using Substitution Method
Color Cryptography using Substitution MethodColor Cryptography using Substitution Method
Color Cryptography using Substitution Methodijtsrd
 
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...IRJET Journal
 
A New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionA New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionIRJET Journal
 
A Modified Binary Encryption Algorithm based on Diffuse Representation
A Modified Binary Encryption Algorithm based on Diffuse RepresentationA Modified Binary Encryption Algorithm based on Diffuse Representation
A Modified Binary Encryption Algorithm based on Diffuse RepresentationIJAEMSJORNAL
 
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...Editor IJCATR
 
Survey ecc 09june12
Survey ecc 09june12Survey ecc 09june12
Survey ecc 09june12IJASCSE
 
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET Journal
 
Cryptography Workbook
Cryptography WorkbookCryptography Workbook
Cryptography WorkbookArthyR3
 
Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyIJCERT
 

Ähnlich wie Image Encryption Using Advanced Hill Cipher Algorithm (20)

An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
 
Security Enhancement of Image Encryption Based on Matrix Approach using Ellip...
Security Enhancement of Image Encryption Based on Matrix Approach using Ellip...Security Enhancement of Image Encryption Based on Matrix Approach using Ellip...
Security Enhancement of Image Encryption Based on Matrix Approach using Ellip...
 
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
 
MIP PPT.pptx
MIP PPT.pptxMIP PPT.pptx
MIP PPT.pptx
 
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
 
Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229
 
Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel Encryption
 
A Fingerprint Pattern Approach to Hill Cipher Implementation
A Fingerprint Pattern Approach to Hill Cipher ImplementationA Fingerprint Pattern Approach to Hill Cipher Implementation
A Fingerprint Pattern Approach to Hill Cipher Implementation
 
IRJET-Triple Layered Security on Android Based SMS Transaction
IRJET-Triple Layered Security on Android Based SMS TransactionIRJET-Triple Layered Security on Android Based SMS Transaction
IRJET-Triple Layered Security on Android Based SMS Transaction
 
Color Cryptography using Substitution Method
Color Cryptography using Substitution MethodColor Cryptography using Substitution Method
Color Cryptography using Substitution Method
 
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
 
A New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionA New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash Function
 
A Modified Binary Encryption Algorithm based on Diffuse Representation
A Modified Binary Encryption Algorithm based on Diffuse RepresentationA Modified Binary Encryption Algorithm based on Diffuse Representation
A Modified Binary Encryption Algorithm based on Diffuse Representation
 
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
 
Survey ecc 09june12
Survey ecc 09june12Survey ecc 09june12
Survey ecc 09june12
 
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
 
Cryptography Workbook
Cryptography WorkbookCryptography Workbook
Cryptography Workbook
 
Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve Cryptography
 

Mehr von IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 

Mehr von IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Kürzlich hochgeladen

Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 

Kürzlich hochgeladen (20)

Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 

Image Encryption Using Advanced Hill Cipher Algorithm

  • 1. ACEEE International Journal on Signal and Image Processing Vol 1, No. 1, Jan 2010 Image Encryption Using Advanced Hill Cipher Algorithm Bibhudendra Acharya1, Saroj Kumar Panigrahy2, Sarat Kumar Patra3, and Ganapati Panda3 1 Department of E & TC, NIT Raipur, Chhattisgarh-492010, India bibhudendra@gmail.com 2 Department of CSE, NIT Rourkela, Orissa-769008, India skp.nitrkl@gmail.com 3 Department of ECE, NIT Rourkela, Orissa-769008, India {skpatra, gpanda}@nitrkl.ac.in Abstract—The Hill cipher algorithm is one of the symmetric engineering [1]. key algorithms that have several advantages in data Substitution cipher is one of the basic components of encryption. But, the inverse of the key matrix used for classical ciphers. A substitution cipher is a method of encrypting the plaintext does not always exist. Then if the encryption by which units of plaintext are substituted key matrix is not invertible, then encrypted text cannot be decrypted. In the Involutory matrix generation method the with ciphertext according to a regular system; the units key matrix used for the encryption is itself invertible. So, at may be single letters (the most common), pairs of letters, the time of decryption we need not to find the inverse of the triplets of letters, mixtures of the above, and so forth. The key matrix. The objective of this paper is to encrypt an receiver deciphers the text by performing an inverse image using a technique different from the conventional Hill substitution [8]. The units of the plaintext are retained in Cipher. In this paper a novel advanced Hill (AdvHill) the same sequence as in the ciphertext, but the units encryption technique has been proposed which uses an themselves are altered. There are a number of different involutory key matrix. The scheme is a fast encryption types of substitution cipher. If the cipher operates on scheme which overcomes problems of encrypting the images single letters, it is termed a simple substitution cipher; a with homogeneous background. A comparative study of the proposed encryption scheme and the existing scheme is cipher that operates on larger groups of letters is termed made. The output encrypted images reveal that the polygraphic. A monoalphabetic cipher uses fixed proposed technique is quite reliable and robust. substitution over the entire message, whereas a polyalphabetic cipher uses a number of substitutions at Index Terms—Encryption, Decryption, Hill Cipher, Image different times in the message— such as with Encryption, Advanced Hill Cipher. homophones, where a unit from the plaintext is mapped to one of several possibilities in the ciphertext. Hill I. INTRODUCTION cipher is a type of monoalphabetic polygraphic substitution cipher. Hill cipher is a block cipher that has Owing to the advance in network technology, several advantages such as disguising letter frequencies information security is an increasingly important of the plaintext, its simplicity because of using matrix problem. Popular application of multimedia technology multiplication and inversion for enciphering and and increasingly transmission ability of network deciphering, its high speed, and high throughput [5,7]. gradually leads us to acquire information directly and In this paper, we have proposed an advanced Hill clearly through images. Cryptography, the science of (AdvHill) cipher algorithm which uses an Involutory key encryption, plays a central role in mobile phone matrix for encryption [1]. The objective of this paper is to communications, pay-TV, e-commerce, sending private overcome the drawback of using a random key matrix in emails, transmitting financial information, security of Hill cipher algorithm for encryption, where we may not ATM cards, computer passwords, and touches on many be able to decrypt the encrypted message, if the key aspects of our daily lives. Cryptography is the art or matrix is not invertible. Also the computational science encompassing the principles and methods of complexity can be reduced by avoiding the process of transforming an intelligible message (plaintext) into one finding inverse of the matrix at the time of decryption, as that is unintelligible (ciphertext) and then retransforming we use Involutory key matrix for encryption. Using this that message back to its original form. In modern times, key matrix we encrypted gray scale as well as color cryptography is considered to be a branch of both images. Our algorithm works well for all types of gray mathematics and computer science, and is affiliated scale as well as color images except for the images with closely with information theory, computer security, and background of same gray level or same color. The organization of the paper is as follows. Following This research work was carried out at the Department of ECE, NIT the introduction, the basic concept of Hill Cipher is Rourkela, Orissa-769008, India. outlined in section II. Section III discusses about the Corresponding author: bibhudendra@gmail.com modular arithmetic. In section IV, a method of generating 37 © 2010 ACEEE DOI: 01.ijsip.01.01.08
  • 2. ACEEE International Journal on Signal and Image Processing Vol 1, No. 1, Jan 2010 Involutory key matrix is explained. Section V presents III. MODULAR ARITHMETIC the proposed method of image encryption using advanced The arithmetic operation presented here are addition, Hill Cipher (AdvHill) algorithm. Experimental results are subtraction, unary operation, multiplication and division discussed in section VI. Finally, section VII describes the [9]. Based on this, the Involutory matrix for Hill cipher concluding remarks. algorithm is generated. The congruence modulo operator has the following properties: II. HILL CIPHER It is developed by the mathematician Lester Hill. The 1. a ≡ b mod p if n (a − b ) core of Hill cipher is matrix manipulations. For encryption, algorithm takes m successive plaintext 2. (a mod p ) = (b mod p ) ⇒ a ≡ b mod p letters and instead of that substitutes m cipher letters. In Hill cipher, each character is assigned a numerical value like a = 0, b = 1, ... , z = 25 [5, 9]. The substitution of 3. a ≡ b mod p ⇒ b ≡ a mod p ciphertext letters in the place of plaintext letters leads to m linear equation. For m = 3 , the system can be 4. a ≡ b mod p and b ≡ a mod p ⇒ a ≡ c mod p Let Z p = [0, 1,..., p − a ] the set of residues modulo p . described as follows: C1 = ( K 11 P1 + K 12 P2 + K 13 P3 ) mod 26 If modular arithmetic is performed within this set Z p , C 2 = ( K 21 P1 + K 22 P2 + K 23 P3 ) mod 26 … (1) the following equations present the arithmetic operations: C1 = ( K 31 P1 + K 32 P2 + K 33 P3 ) mod 26 Addition: This case can be expressed in terms of column vectors (a + b ) mod p = [(a mod p )+ (b mod p )] mod p and matrices: Negation: ⎛ C1 ⎞ ⎡ K11 K12 K13 ⎤⎛ P ⎞ ⎜ ⎟ ⎢ ⎜ 1⎟ ⎜ C2 ⎟ = ⎢ K 21 K 22 K 23 ⎥⎜ P2 ⎟ ⎥ … (2) − a mod p = p − ( a mod p ) ⎜ C ⎟ ⎢K ⎝ 3 ⎠ ⎣ 31 K 32 K 33 ⎥⎜ P3 ⎟ ⎦⎝ ⎠ Subtraction: or simply we can write as C = KP , where C and P are column vectors of length 3, representing the plaintext (a − b ) mod p = [(a mod p ) − (b mod p )] mod p and ciphertext respectively, and K is a 3 × 3 matrix, which is the encryption key. All operations are performed Multiplication: mod 26 here. Decryption requires using the inverse of (a ∗ b ) mod p = [(a mod p ) ∗ (b mod p )] mod p the matrix K . The inverse matrix K −1 of a matrix K is defined by the equation KK -1 = K -1 K = I , where I is Division: the Identity matrix. But the inverse of the matrix does not always exist, and when it does, it satisfies the preceding (a / b ) mod p = c when a = (b ∗ c ) mod p equation. K −1 is applied to the ciphertext, and then the plaintext is recovered [2,6]. In general term we can write The following exhibits the properties of modular as follows: arithmetic. For encryption: Commutative Law: C = E k ( P) = K p … (3) (ω + x ) mod p = ( x + ω ) mod p (ω ∗ x ) mod p = (x ∗ω ) mod p For decryption: Associative law: P = D k (C ) = K C = K K p = P -1 -1 … (4) [(ω + x ) + y ] mod p = [ω + (x + y )] mod p Distribution Law: If the block length is m, there are 26 different mm [ω ∗ (x + y )] mod p = [{(ω ∗ x )mod p}∗ {(ω ∗ y )mod p}]mod p letters blocks possible, each of them can be regarded as a letter in a 26m -letter alphabet. Hill's method amounts to a Identities: monoalphabetic substitution on this alphabet [5]. (0 + a ) mod p = a mod p and (1∗ a ) mod p = a mod p 38 © 2010 ACEEE DOI: 01.ijsip.01.01.08
  • 3. ACEEE International Journal on Signal and Image Processing Vol 1, No. 1, Jan 2010 ⎡10 2⎤ Let A22 = ⎢ ⎥, Inverses: ⎣ 3 4⎦ For each x ∈ Z p , ∃y such that ⎡ 3 11⎤ (x + y ) mod p = 0 then y = − x then, A11 = ⎢ ⎥. ⎣10 9 ⎦ For each x ∈ Z p ∃y such that (x ∗ y ) mod p = 1 If k is selected as 2, IV. GENERATION OF INVOLUTORY KEY MATRIX ⎡9 4 ⎤ then, A12 = k ( I − A11 ) = ⎢ ⎥, The proposed AdvHill algorithm uses an involutory ⎣6 10⎦ key matrix for encryption technique. The various proposed methods can be found in literature [1]. One of ⎡2 12⎤ the methods is explained below. and A21 = ⎢ ⎥ A is called a involutory matrix if A = A −1 . The ⎣5 5 ⎦ analysis presented here for generation of involutory key matrix is valid for matrix of +ve integers that are the ⎡ 3 11 9 4 ⎤ ⎢10 9 6 10⎥ residues of modulo arithmetic of a number. This So, A = ⎢ ⎥ will be the involutory matrix. algorithm can generate involutory matrices of order ⎢ 2 12 10 2 ⎥ n × n where n is even. ⎢ ⎥ ⎣5 5 3 4⎦ ⎡ a11 a12 ... ... a1n ⎤ V. IMAGE ENCRYPTION USING ADVHILL TECHNIQUE ⎢a 21 a22 ... ... a2 n ⎥ ⎥ Let A= ⎢ ... ... As we note that Hill cipher can be adopted to encrypt ⎢ ... ... ... ⎥ be an n × n involutory grayscale and color images, proposed AdvHill algorithm ⎢ ... ... ... ... ... ⎥ can also be used for grayscale and color images. For ⎢ ⎥ ⎣ an1 an 2 ... ... ann ⎦ grayscale images, the modulus will be 256 (the number ⎡A A12 ⎤ of levels is considered as the number of alphabets). In the matrix partitioned to A = ⎢ 11 A22 ⎥ , where n is even case of color images, first decompose the color image ⎣ A21 ⎦ into (R-G-B) components. Second, encrypt each n n component (R-G-B) separately by the algorithm. Finally, and A11 , A12, A21 & A22 are matrices of order × concatenate the encrypted components together to get the 2 2 each. encrypted color image [10]. The algorithm is given below So, A12 A21 = I − A11 = (I − A11 )(I + A11 ) 2 and the block diagram for the encryption process is shown in Figure 1. If A12 is one of the factors of I − A11 then A21 is the 2 Algorithm AdvHill: other. Solving the 2nd matrix equation results A11 + A22 = 0 . Step1. A involutory key matrix of dimensions m × m Then form the matrix. is constructed. Step2. The plain image is divided into m × m Algorithm: symmetric blocks. n n 1. Select any arbitrary × matrix A22 . Step3. The ith pixels of each block are brought 2 2 together to form a temporary block. 2. Obtain A11 = − A22 . a. Hill cipher technique is applied onto the 3. Take A12 = k (I − A11 ) or k (I + A11 ) where k is a temporary block. scalar constant. b. The resultant matrix is transposed and Hill cipher is again applied to the this matrix. 4. Then, A21 = 1 (I + A11 ) or 1 (I − A11 ) . Step4. The final matrix obtained is placed in the ith k k block of the encrypted image. 5. Form the matrix completely. Example: (For Modulo 13) 39 © 2010 ACEEE DOI: 01.ijsip.01.01.08
  • 4. ACEEE International Journal on Signal and Image Processing Vol 1, No. 1, Jan 2010 Figure. 1. The block diagram for proposed AdvHill algorithm. VI. EXPERIMENTAL RESULTS We have taken different images and encrypted them using original Hill and our proposed AdvHill algorithm and the results are shown below in Figure 2 and 3. It is clearly noticeable from the Figure 2(e, g), that original Hill Cipher can’t encrypt the images properly if the image consists of large area covered with same colour or gray level [8]. But our proposed algorithm works for any images with different gray scale as well as colour images. In Figure 3, it is found that our proposed AdvHill algorithm can able to encrypt the image properly as compared to original Hill Cipher algorithm. Figure. 2. Original images (a, c, e, g, i) and corresponding encrypted images (b, d, f, h, j) by original Hill Cipher Algorithm 40 © 2010 ACEEE DOI: 01.ijsip.01.01.08
  • 5. ACEEE International Journal on Signal and Image Processing Vol 1, No. 1, Jan 2010 REFERENCES [1] Bibhudendra Acharya, Girija Sankar Rath, Sarat Kumar Patra, Saroj Kumar Panigrahy. 2007. Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm, International Journal of Security, Vol 1, Issue 1, 2007, pp. 14-21. [2] Imai H., Hanaoka G., Shikata J., Otsuka A., Nascimento A.C. 2002. Cyptography with Information Theoretic Security. Information Theory Workshop, 2002, Proceedings of the IEEE, 20-25 Oct 2002. [3] Lerma, M.A., 2005. Modular Arithmetic. http://www.math.northwestern.edu/~mlerma/problem_solv ing/results/modular_arith.pdf. [4] Li, S., Zheng, X., 2002. On the Security of an Image Encryption Method. ICIP2002. http://www.hooklee.com/Papers/ICIP2002.pdf. [5] Menezes, A. J., P.C. Van Oorschot, S.A. Van Stone. 1996. Handbook of Applied Cryptography. CRC press. [6] Overbey, J., Traves, W., Wojdylo, J., 2005. On the keyspace of the Hill cipher. Cryptologia, 29(l):59-72. [7] Petersen, K., 2000. Notes on Number Theory and Cryptography. http://www.math.unc.edu/Faculty/petersen/Coding/cr2.pdf. [8] Saeednia, S., 2000. How to make the Hill cipher secure. Cryptologia, 24(4):353-360. [9] Stallings, W. Cryptography and Network Security.2005. 4th edition, Prentice Hall. Figure. 3. Original images (a,d) and corresponding encrypted images (b,e) by original Hill Cipher Algorithm and (c,f) by our proposed AdvHill [10] ISMAIL I.A., AMIN Mohammed, DIAB Hossam, How to algorithm repair the Hill cipher, Journal of J Zhejiang Univ SCIENCE A, vol. 7(12), pp. 2022-2030, 2006. VII. CONCLUSION [11] Y. Rangel-Romero, R. Vega-García, A. Menchaca- This paper suggests efficient method of encryption of image. Proposed AdvHill algorithm is more secure to Méndez, D. Acoltzi-Cervantes, L. Martínez-Ramos, M. brute force attacks as compared to original Hill cipher Mecate-Zambrano, F. Montalvo-Lezama, J. Barrón- Vidales, N. Cortez-Duarte, F. Rodríguez-Henríquez, algorithm. A Brute Force Attack requires 2 7 +8*(n / 2) 2 Comments on How to repair the Hill cipher, Journal of J number of key generations; where n is the order of key matrix. AdvHill is a fast encryption technique which can Zhejiang Univ SCIENCE A, pp. 1-4, 2007. provide satisfactory results against the normal hill cipher technique. The proposed scheme is resistant against known plaintext attacks. 41 © 2010 ACEEE DOI: 01.ijsip.01.01.08