CFP last date
20 May 2024
Reseach Article

Encryption Approach for Images using Bits Rotation Reversal and Extended Hill Cipher Techniques

by Naveen Kumar S K, Sharath Kumar H S, Panduranga H T
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 59 - Number 16
Year of Publication: 2012
Authors: Naveen Kumar S K, Sharath Kumar H S, Panduranga H T
10.5120/9630-4311

Naveen Kumar S K, Sharath Kumar H S, Panduranga H T . Encryption Approach for Images using Bits Rotation Reversal and Extended Hill Cipher Techniques. International Journal of Computer Applications. 59, 16 ( December 2012), 10-14. DOI=10.5120/9630-4311

@article{ 10.5120/9630-4311,
author = { Naveen Kumar S K, Sharath Kumar H S, Panduranga H T },
title = { Encryption Approach for Images using Bits Rotation Reversal and Extended Hill Cipher Techniques },
journal = { International Journal of Computer Applications },
issue_date = { December 2012 },
volume = { 59 },
number = { 16 },
month = { December },
year = { 2012 },
issn = { 0975-8887 },
pages = { 10-14 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume59/number16/9630-4311/ },
doi = { 10.5120/9630-4311 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:04:21.255153+05:30
%A Naveen Kumar S K
%A Sharath Kumar H S
%A Panduranga H T
%T Encryption Approach for Images using Bits Rotation Reversal and Extended Hill Cipher Techniques
%J International Journal of Computer Applications
%@ 0975-8887
%V 59
%N 16
%P 10-14
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A new method for image encryption with two stages has been described in the present study. In first stage, each pixel of image is converted to its equivalent eight bit binary number and in that eight bit number, number of bits equal to the length of password are rotated and then reversed. In second stage, extended hill cipher technique is applied by using involutory matrix generated by same password given in second stage to make encryption more secured. Performance of the proposed technique is evaluated by Statistical Analysis, Differential Analysis and also quantifying Mean Square Error (MSE) & Peak Signal to Noise Ratio (PSNR). The proposed approach is implemented for different images using MATLAB. Decryption involves the reverse process of encryption.

References
  1. Komal D Patel, Sonal Belani. 2011. Image encryption using different techniques: A review. International Journal of Emerging Technology and Advanced Engineering.
  2. Ismet Ozturk and Ibrahim Sogukpinaar. 2004. Analysis and Comparison of Image Encryption Algorithms. Transaction on engineering, Computer and Technology, 2004, vol. 3, pp. 38-42.
  3. A. Mitra, Y. V. Subba Rao and S. R. M. 2006. Prasanna. A New Image Encryption Approach using Combinational Permutation Techniques. IJCS.
  4. Panduranga H T, Naveenkumar S K. 2010. An image encryption approach using bit-reversal method. NCIMP.
  5. Bibhudendra Acharya, Girija Sankar Rath, Sarat Kumar Patra, Saroj Kumar Panigrahy. 2007. Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm. International Journal of Security.
  6. Saroj Kumar Panigrahy, Bibhudendra Acharya, Debasish Jena. 2008. Image Encryption Using Self-Invertible Key Matrix of Hill Cipher Algorithm. 1st International Conference on Advances in Computing, Chikhli, India.
  7. Bibhudendra Acharya, Saroj Kumar Panigrahy, Sarat Kumar Patra, and Ganapati Panda. 2009. Image Encryption Using Advanced Hill Cipher Algorithm. International Journal of Recent Trends in Engineering
  8. H. S. Kwok, Wallace K. S. Tang. 2007. A fast image encryption system based on chaotic maps with finite precision representation. Chaos, Solitons and Fractals.
  9. Yue Wu, Joseph P. Noonan, and Sos Agaian, 2011. NPCR and UACI Randomness Tests for Image Encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT).
Index Terms

Computer Science
Information Sciences

Keywords

Image Encryption Bits Rotation Bits Revere Extended Hill Cipher