skip to main content
10.1145/1947940.1948066acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicccsConference Proceedingsconference-collections
research-article

Encryption and decryption of informative image by key image using modified Hill cipher technique based on non-invertible matrices

Published: 12 February 2011 Publication History

Abstract

Data security is the science and study of methods of protecting data in computer and communication system from disclosure to unauthorized users. The main aim of encoding is to make it worthless to everyone except for the party with the deciphering key. Only with the key, a party can decode the cipher text into a meaningful message. Hill cipher is a symmetric cryptosystem and a polygraph substitution cipher based on matrix multiplication. Hill cipher has several advantages in data encryption. Hill cipher requires inverse of the key matrix while decryption. In fact that not all the matrices have an inverse and therefore they will not be eligible as key matrices in the Hill cipher scheme. Furthermore, due to its linear nature, the basic Hill cipher succumbs to known-plaintext attacks. A modified Hill cipher that removes these drawbacks has been used in this paper. In today's world, the usual way of writing a message in text has been replaced by more efficient ways of conveying messages through images, audio, video etc. As long as an electronic file contains irrelevant information, it can be used as a cover to hide messages. In this paper, we encrypt the informative image using the modified Hill cipher technique and the key image. Then use the same key image to decrypt the encrypted image to obtain the image which contains the information.

References

[1]
Bibhudendra Acharya, Debasish Jena, Sarat Kumar Patra, and Ganapati Panda. "Invertible, Involutory and Permutation Matrix Generation Methods for Hill Cipher System", International Conference on Advanced Computer Control, 2009.
[2]
Bibhudendra Acharya, Girija Sankar Rath, Sarat Kumar Patra, and Saroj Kumar Panigrahy. "Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm". International Journal of Security (CSC Journals). Vol. 1, Issue. (1), pp. 14--21, 2007.
[3]
Bibhudendra Acharya, Sambit Kumar Shukla, Saroj Kumar Panigrahy, Sarat Kumar Patra and Ganapati Panda, "H-S-X Cryptosystem and Its Application to Image Encryption" International Conference on Advances in Computing, Control, and Telecommunication Technologies, 2009, pp 720--724.
[4]
Bibhudendra Acharya, Sarat Kumar Patra, and Ganapati Panda. "A Novel Cryptosystem Using Matrix Transformation", Proceedings of SPIT-IEEE Colloquium & International Conference, Vol. 4, 2008, pp. 92--95.
[5]
Forouzan - Behrouz A. "Cryptography And Network Security", McGraw Hill. 2008.
[6]
G. R. Blakley, "Twenty years of cryptography in the open literature, Security and Privacy 1999", Proceedings of the IEEE Symposium, 9--12, May 1999.
[7]
Lester S. Hill, "Cryptography in an Algebraic Alphabet, The American Mathematical Monthly", Vol. 36, No. 6. (Jun. - Jul., 1929), pp. 306--312.
[8]
Lester S. Hill, "Concerning Certain Linear Transformation Apparatus of Cryptography", The American Mathematical Monthly 38, 1931, pp. 135--154.
[9]
Rushdi A. Hamamreh, Mousa Farajallah, "Design of a Robust Cryptosystem Algorithm for Non-Invertible Matrices Based on Hill Cipher", International Journal of Computer Science and Network Security, 2009.
[10]
Ramchandra S. Mangrulkar, Pallavi V. Chavan, "Encrypting Informative Image by KeyImage using Hill Cipher Technique", International Journal of Recent Trends in Engineering, 2009.
[11]
William Stallings, "Cryptography and Network Security Principles and Practices", Prentice Hall. 2006.

Cited By

View all
  • (2022)An Efficient Method for Secured Data Communication using Chaos Encryption Algorithm2022 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES)10.1109/ICSES55317.2022.9914064(1-5)Online publication date: 15-Jul-2022
  • (2014)A novel video encryption algorithm-based on speaker voice as the public key2014 IEEE International Conference on Control Science and Systems Engineering10.1109/CCSSE.2014.7224533(180-184)Online publication date: Dec-2014

Index Terms

  1. Encryption and decryption of informative image by key image using modified Hill cipher technique based on non-invertible matrices

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICCCS '11: Proceedings of the 2011 International Conference on Communication, Computing & Security
    February 2011
    656 pages
    ISBN:9781450304641
    DOI:10.1145/1947940
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 12 February 2011

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Hill cipher
    2. cryptosystem
    3. decryption
    4. encryption
    5. key image

    Qualifiers

    • Research-article

    Conference

    ICCCS '11

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 20 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)An Efficient Method for Secured Data Communication using Chaos Encryption Algorithm2022 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES)10.1109/ICSES55317.2022.9914064(1-5)Online publication date: 15-Jul-2022
    • (2014)A novel video encryption algorithm-based on speaker voice as the public key2014 IEEE International Conference on Control Science and Systems Engineering10.1109/CCSSE.2014.7224533(180-184)Online publication date: Dec-2014

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media