Today in a digital world, protection of information plays an essential role in message exchange and trading. Encryption is used to meet the security needs of safe transaction. Regarding the importance of the issue and the shift of traditional stage to digital stage, familiarity with encryption methods seems necessary. Different data have different methods of encryption. Images are also one type of data for which encryption is critically needed to prevent impermissible access. In this article, first a primary image is selected, then, based on the proportion of the image needing encryption, pixels from code image are picked and is being encrypted by a function. In the next stage, this proportion is being XOR-ed by the pixel proportion of the image needing encryption, and eventually the final proportion is encrypted by Hill Algorithm. MATLAB software has been used for studying the project, and efficiency of this method, in comparison to Hill Algorithm as a standard algorithm, is investigated. At the end, maintaining the image quality after decryption is evaluated by standards such as PSNR and SSID. The results indicate high efficiency of this method.
Published in |
International Journal of Intelligent Information Systems (Volume 3, Issue 6-1)
This article belongs to the Special Issue Research and Practices in Information Systems and Technologies in Developing Countries |
DOI | 10.11648/j.ijiis.s.2014030601.28 |
Page(s) | 98-102 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2014. Published by Science Publishing Group |
Hill Algorithm, Security, Image Encryption, Efficiency
[1] | Kuang Tsan Lin, “ Binary encoding method to encrypt Fourier-transformed”, information OF 15th Annu. Conf. IEEE EMBS, pp. 778-780, 1993. |
[2] | R.L. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems”, Communications of the ACM, pp.120-126, 1978. |
[3] | Eli Biham, Adi Shamir, “Differential cryptanalysis of DES-like cryptosystems”, Springer, Volume 4, Issue 1, pp.3-72, 1991. |
[4] | Joan Daemen, Vincent Rijmen, “The Design of Rijndael: AES The Advanced Encryption Standard”, Springer, p.238, February 2002. |
[5] | R.Kusters and MTuengerthal, “Universally Composable Symmetric Encryption”, 2nd IEEE Computer Security Foundations Symposium (CSF '09), pp. 293-307, July 2009. |
[6] | H Jin, Z.Liao, D.Zou, and C.Li, “Asymmetrical Encryption Based Automated Trust Negotiation Model”, The 2nd IEEE International Conference on Digital Ecosystems and Technologies (DEST 2008), pp.363-368, Feb. 2008. |
[7] | Shiguo Lian, “Multimedia Content Encryption Techniques and Applications”, CRC Press,p.3. |
[8] | Ratinder Kaur, V. K. Banga, “Image Security using Encryption based Algorithm”, International Conference on Trends in Electrical, Electronics and Power Engineering (ICTEEP'2012) Singapore, July 15-16, 2012. |
[9] | Xiaofeng Liao, Shiyue Lai, Qing Zhou, “A novel image encryption algorithm based on self-adaptive”, Digital Signal Processing Principles, New York Macmillan, 1992. |
[10] | C.J. Tay, C. Quan, W. Chen, Y. Fu, “Color image encryption based on interference and virtual optics”, Optics & Laser Technology, pp. 409–415, 2010. |
[11] | Yicong Zhou, Karen Panetta, SosAgaian, C.L. Philip Chen,” Image encryption using P-Fibonacci transform and decomposition”,”Optic s Communications”, 285 (2012) 594–608 |
[12] | Xingyuan Wang, Lin Teng, Xue Qin, “A novel colour image encryption algorithm based on chaos”, Signal Processing, pp.1101–1108, 92 (2012). |
[13] | Lester S. Hill, “Cryptography in an Algebraic Alphabet”, The American Mathematical Monthly“ ,Vol.36, pp. 306–312, June–July 1929. |
[14] | J.Zillami and D. G. Manolakis, “Encryption Based On Advance Hill, Algorithms and Applications”, New York Macmillan, 2008. |
[15] | Ahmed A. Abd El-Latif, Li Li, Ning Wang, Qi Han, Xiamu Niu, “A new app roach to chaotic image encryption based on quantum chaotic system, exploiting color spaces Signal Processing”, Volume 93, pp.387-397, 2013. |
[16] | Z. Wang, A.C. Bovik, H.R. Sheikh, E.P. Simoncelli, ” Image Quality Assessment: From Error Visibility toStructural Similarity”, Transactions on Image Processing IEEE, pp.600-612, 13 ( 2004 ). |
APA Style
Ali Moradmard, Mohammad Tahghighi Sharabiani. (2014). Color Image Encryption by Code Image and Hill Algorithm. International Journal of Intelligent Information Systems, 3(6-1), 98-102. https://doi.org/10.11648/j.ijiis.s.2014030601.28
ACS Style
Ali Moradmard; Mohammad Tahghighi Sharabiani. Color Image Encryption by Code Image and Hill Algorithm. Int. J. Intell. Inf. Syst. 2014, 3(6-1), 98-102. doi: 10.11648/j.ijiis.s.2014030601.28
AMA Style
Ali Moradmard, Mohammad Tahghighi Sharabiani. Color Image Encryption by Code Image and Hill Algorithm. Int J Intell Inf Syst. 2014;3(6-1):98-102. doi: 10.11648/j.ijiis.s.2014030601.28
@article{10.11648/j.ijiis.s.2014030601.28, author = {Ali Moradmard and Mohammad Tahghighi Sharabiani}, title = {Color Image Encryption by Code Image and Hill Algorithm}, journal = {International Journal of Intelligent Information Systems}, volume = {3}, number = {6-1}, pages = {98-102}, doi = {10.11648/j.ijiis.s.2014030601.28}, url = {https://doi.org/10.11648/j.ijiis.s.2014030601.28}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ijiis.s.2014030601.28}, abstract = {Today in a digital world, protection of information plays an essential role in message exchange and trading. Encryption is used to meet the security needs of safe transaction. Regarding the importance of the issue and the shift of traditional stage to digital stage, familiarity with encryption methods seems necessary. Different data have different methods of encryption. Images are also one type of data for which encryption is critically needed to prevent impermissible access. In this article, first a primary image is selected, then, based on the proportion of the image needing encryption, pixels from code image are picked and is being encrypted by a function. In the next stage, this proportion is being XOR-ed by the pixel proportion of the image needing encryption, and eventually the final proportion is encrypted by Hill Algorithm. MATLAB software has been used for studying the project, and efficiency of this method, in comparison to Hill Algorithm as a standard algorithm, is investigated. At the end, maintaining the image quality after decryption is evaluated by standards such as PSNR and SSID. The results indicate high efficiency of this method.}, year = {2014} }
TY - JOUR T1 - Color Image Encryption by Code Image and Hill Algorithm AU - Ali Moradmard AU - Mohammad Tahghighi Sharabiani Y1 - 2014/11/11 PY - 2014 N1 - https://doi.org/10.11648/j.ijiis.s.2014030601.28 DO - 10.11648/j.ijiis.s.2014030601.28 T2 - International Journal of Intelligent Information Systems JF - International Journal of Intelligent Information Systems JO - International Journal of Intelligent Information Systems SP - 98 EP - 102 PB - Science Publishing Group SN - 2328-7683 UR - https://doi.org/10.11648/j.ijiis.s.2014030601.28 AB - Today in a digital world, protection of information plays an essential role in message exchange and trading. Encryption is used to meet the security needs of safe transaction. Regarding the importance of the issue and the shift of traditional stage to digital stage, familiarity with encryption methods seems necessary. Different data have different methods of encryption. Images are also one type of data for which encryption is critically needed to prevent impermissible access. In this article, first a primary image is selected, then, based on the proportion of the image needing encryption, pixels from code image are picked and is being encrypted by a function. In the next stage, this proportion is being XOR-ed by the pixel proportion of the image needing encryption, and eventually the final proportion is encrypted by Hill Algorithm. MATLAB software has been used for studying the project, and efficiency of this method, in comparison to Hill Algorithm as a standard algorithm, is investigated. At the end, maintaining the image quality after decryption is evaluated by standards such as PSNR and SSID. The results indicate high efficiency of this method. VL - 3 IS - 6-1 ER -