Color Image Encryption by Code Image and Hill Algorithm
International Journal of Intelligent Information Systems
Volume 3, Issue 6-1, December 2014, Pages: 98-102
Received: Nov. 1, 2014; Accepted: Nov. 5, 2014; Published: Nov. 11, 2014
Views 3400      Downloads 176
Authors
Ali Moradmard, Department of Computer Engineering, Islamic Azad University, Zanjan Branch, Zanjan, Iran
Mohammad Tahghighi Sharabiani, Department of Computer Engineering, Islamic Azad University, Zanjan Branch, Zanjan, Iran
Article Tools
Follow on us
Abstract
Today in a digital world, protection of information plays an essential role in message exchange and trading. Encryption is used to meet the security needs of safe transaction. Regarding the importance of the issue and the shift of traditional stage to digital stage, familiarity with encryption methods seems necessary. Different data have different methods of encryption. Images are also one type of data for which encryption is critically needed to prevent impermissible access. In this article, first a primary image is selected, then, based on the proportion of the image needing encryption, pixels from code image are picked and is being encrypted by a function. In the next stage, this proportion is being XOR-ed by the pixel proportion of the image needing encryption, and eventually the final proportion is encrypted by Hill Algorithm. MATLAB software has been used for studying the project, and efficiency of this method, in comparison to Hill Algorithm as a standard algorithm, is investigated. At the end, maintaining the image quality after decryption is evaluated by standards such as PSNR and SSID. The results indicate high efficiency of this method.
Keywords
Hill Algorithm, Security, Image Encryption, Efficiency
To cite this article
Ali Moradmard, Mohammad Tahghighi Sharabiani, Color Image Encryption by Code Image and Hill Algorithm, International Journal of Intelligent Information Systems. Special Issue: Research and Practices in Information Systems and Technologies in Developing Countries. Vol. 3, No. 6-1, 2014, pp. 98-102. doi: 10.11648/j.ijiis.s.2014030601.28
References
[1]
Kuang Tsan Lin, “ Binary encoding method to encrypt Fourier-transformed”, information OF 15th Annu. Conf. IEEE EMBS, pp. 778-780, 1993.
[2]
R.L. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems”, Communications of the ACM, pp.120-126, 1978.
[3]
Eli Biham, Adi Shamir, “Differential cryptanalysis of DES-like cryptosystems”, Springer, Volume 4, Issue 1, pp.3-72, 1991.
[4]
Joan Daemen, Vincent Rijmen, “The Design of Rijndael: AES The Advanced Encryption Standard”, Springer, p.238, February 2002.
[5]
R.Kusters and MTuengerthal, “Universally Composable Symmetric Encryption”, 2nd IEEE Computer Security Foundations Symposium (CSF '09), pp. 293-307, July 2009.
[6]
H Jin, Z.Liao, D.Zou, and C.Li, “Asymmetrical Encryption Based Automated Trust Negotiation Model”, The 2nd IEEE International Conference on Digital Ecosystems and Technologies (DEST 2008), pp.363-368, Feb. 2008.
[7]
Shiguo Lian, “Multimedia Content Encryption Techniques and Applications”, CRC Press,p.3.
[8]
Ratinder Kaur, V. K. Banga, “Image Security using Encryption based Algorithm”, International Conference on Trends in Electrical, Electronics and Power Engineering (ICTEEP'2012) Singapore, July 15-16, 2012.
[9]
Xiaofeng Liao, Shiyue Lai, Qing Zhou, “A novel image encryption algorithm based on self-adaptive”, Digital Signal Processing Principles, New York Macmillan, 1992.
[10]
C.J. Tay, C. Quan, W. Chen, Y. Fu, “Color image encryption based on interference and virtual optics”, Optics & Laser Technology, pp. 409–415, 2010.
[11]
Yicong Zhou, Karen Panetta, SosAgaian, C.L. Philip Chen,” Image encryption using P-Fibonacci transform and decomposition”,”Optic s Communications”, 285 (2012) 594–608
[12]
Xingyuan Wang, Lin Teng, Xue Qin, “A novel colour image encryption algorithm based on chaos”, Signal Processing, pp.1101–1108, 92 (2012).
[13]
Lester S. Hill, “Cryptography in an Algebraic Alphabet”, The American Mathematical Monthly“ ,Vol.36, pp. 306–312, June–July 1929.
[14]
J.Zillami and D. G. Manolakis, “Encryption Based On Advance Hill, Algorithms and Applications”, New York Macmillan, 2008.
[15]
Ahmed A. Abd El-Latif, Li Li, Ning Wang, Qi Han, Xiamu Niu, “A new app roach to chaotic image encryption based on quantum chaotic system, exploiting color spaces Signal Processing”, Volume 93, pp.387-397, 2013.
[16]
Z. Wang, A.C. Bovik, H.R. Sheikh, E.P. Simoncelli, ” Image Quality Assessment: From Error Visibility toStructural Similarity”, Transactions on Image Processing IEEE, pp.600-612, 13 ( 2004 ).
ADDRESS
Science Publishing Group
1 Rockefeller Plaza,
10th and 11th Floors,
New York, NY 10020
U.S.A.
Tel: (001)347-983-5186