International Journal of Science, Engineering and Technology Research (IJSETR) Volume 1, Issue 1, July 2012 An Adaptive Dual Image Encryption: A Review 1,2 Ramyashree A.N1, Manjunatha C.N,2 Department Of Electronics and communication engineering, Akshaya Institute of Technology, Tumkur, Karnataka, India. ramyanarayan.an26@gmail.com, cnmmanjunath@gmail.com ABSTRACT In the fast growing internet technology information security is very important, we can use the encryption to secure the information. So many different kinds of techniques are used to protect the information from unauthorised person. In this paper, we survey on image encryption techniques based on hill cipher algorithm. selected positive integer. The cipher rtext message is expressed by and the decryption is carried out by computing C = M*K mod n, M = C0K-l mod n. Note that the multiplication of matrices are over the Galois field GF(n). For the purpose of convenience and clarity, we use (x, y) instead of (x y) for vector form representation throughout this paper. The following example shows how the Hill cipher works. Keywords— Encryption, Hill cipher. I. INTRODUCTION The advent of electronic commerce applications, an urgent need to solve the issue of information security in an open network environment is required. Cryptology comes from Greek word "krypton logos", which means "hidden word". It aims to secure communication between sender and recipient in the insecure communication medium like internet. Cryptography is the art or science encompassing the principles and methods of transforming an intelligible message (plaintext) into one that is unintelligible (cipher text) and then retransforming that message back to its original form. In modern times, cryptography is considered to be a branch of both mathematics and computer science. Cryptology is divided into two general fields, cryptography, the art of secret writing (encryption) and cryptanalysis, the art of deciphering encrypted message (decryption). Encryption is a method of transforming original data, called plaintext or clear text, into a form that appears to be random and unreadable, which is called cipher text. Plaintext is either in a form that can be understood by a person (a document) or by a computer (executable code). Once it is not transformed into cipher text, human nor machine can properly process it until it is decrypted. This enables the transmission of confidential information over insecure channels without unauthorized disclosure. When data is stored on a computer, it is usually protected by logical and physical access controls. When this same sensitive information is sent over a network, it can no longer take these controls for granted, and the information is in a much more vulnerable state. So many methods for image encryption with some advantages and disadvantages. Hill cipher is an application of linear algebra to cryptography, developed by the mathematician Lester Hill.Hill cipher algorithm is one of the symmetric key algorithm, it takes n successive plaintext letters and substitutes n cipher text letters. The idea of the Hill cipher is a simple matrix transformation M.K mod n, where the key K is a non singular dxd matrix; M is a d-tuple vector from splitting a plaintext message into d blocks and each block corresponding to a positive integer; and n is a This paper is organized as follows In Section 1; Introduction about cryptography and hill cipher. In Section 2, we survey on already existing research paper. Finally, we conclude in section 3. II. LITERATURE SURVEY Image Encryption Using Permutation and Hill Cipher,2010 Ghassan Muslim Hassan[2],proposed new encryption algorithm using two different images, one is cover image which acts as key image and other is Informative image. In the first step, XOR cover image with informative image to obtain resultant image. The resultant image is decomposed into (n x n) blocks which passed to the Hill Cipher algorithm to form encrypted blocks. The encrypted blocks are transformed into new locations using permutation table. Design of a Robust Cryptosystem Algorithm for Non-Invertible Matrices Based on Hill Cipher,2009 Rushdi A. Hamamreh, Mousa Farajallah[3] suggests a new technique in Hill Cipher algorithm to overcome its major problem- noninvertible key matrix and also o they improve security of Hill Cipher against known plaintext attack. Here they used public key idea and key generating depending on various options and without linear algebra steps. So that, it will be difficult for the attacker to get the key. Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm, 2003 Bibhudendra Acharya, Girija Sankar Rath, Sarat Kumar Patra, Saroj Kumar Panigrahy-The method of generating selfinvertible[4] matrix for Hill Cipher algorithm have been proposed. In this method the matrix used for the encryption is itself invertible. So, at the time of decryption, we need not to find inverse of the matrix. This method eliminates the computational complexity involved in finding inverse of the matrix while decryption International Journal of Science, Engineering and Technology Research (IJSETR) Volume 1, Issue 1, July 2012 A Secure Image Encryption Algorithm Based on Hill Cipher System, 2012 values are used to construct another self-invertible matrix which leads to partial image encryption. How to repair the Hill cipher, 2006 Hill cipher algorithm is one of the symmetric key algorithms having several advantages in encryption. However, the inverse of the matrix used for encrypting the plain text in this algorithm may not always exist. Hill cipher is susceptible to known plain text attack. But here S.K.Mutto, Deepika Aggarwal, Bhavya Ahuja proposed algorithm[5] is aimed at better encryption of all types of images even ones with uniform background and makes the image encryption scheme more secure. Encrypting Informative Image by Key Image using Hill Cipher Technique, 2011 Cryptography is the study of encoding and decoding secret messages. In the language of cryptography, codes are called the ciphers, encoded messages are called plaintext, and coded messages are called cipher text. Here Ramchandra S. Mangrulkar, Pallavi V. Chavan[6] they implement Hill Cipher algorithm, for hiding our text behind the cover image and decrypt the cover image to get original text. A Novel Enhancement Technique of the Hill Cipher for Effective Cryptographic Purposes, 2011 A.F.A. Abidin, O.Y. Chuan and M.R.K. Ariffin proposed robust Hill algorithm (Hill++)[7] , this algorithm is an extension of Affine Hill cipher. A random matrix key, RMK is introduced as an extra key for encryption. And another algorithm proposed for involutory key matrix generation. The main drawback of this algorithm is that it encrypts identical plaintext blocks to identical cipher text blocks and cannot encrypt images that contain large areas of a single color. ISMAIL I.A,AMIN Mohammed, DIAB Hossam proposed technique[10] that adjusts the encryption key to form a different key for each block encryption. Visually and computationally, experimental results demonstrate that the proposed variant yields higher security and significantly superior encryption quality compared to the original one. Image Encryption Using Advanced Hill Cipher Algorithm, 2009 Bibhudendra Acharya, Saroj Kumar Panigrahy, Sarat Kumar Patra, and Ganapati Panda. The objective of this paper is to encrypt an image using a technique different from the conventional Hill Cipher. A novel advanced Hill (AdvHill) encryption technique[11] has been proposed which uses an involutory key matrix. The scheme is a fast encryption scheme which overcomes problems of encrypting the images with homogeneous background. Involutory, Permuted and Reiterative Key Matrix Generation Methods for Hill Cipher System , 2009 In order to repair these flaws of the original Hill cipher, Bibhudendra Acharya1, Sarat Kumar Patra2, and Ganapati Panda proposed Involutory, Permuted and Reiterative key matrix generation method for Hill Cipher system[12]. Involutory matrix generation method solves the key matrix inversion problem. Permuted and Reiterative key matrix generation method enhancement increases the Hill system's security considerably. Encryption Approach for Images using Bits Rotation Reversal and Extended Hill Cipher Techniques, 2012 III. Naveen Kumar S K , Sharath Kumar H S and Panduranga H T proposed new method[8] for image encryption with two stages has been described in the present study. In first stage, each pixel of image is converted to its equivalent eight bit binary number and in that eight bit number, number of bits equal to the length of password are rotated and then reversed. In second stage, extended hill cipher technique is applied by using involutory matrix generated by same password given in second stage to make encryption more secured. Advanced Partial Image Encryption using Two-Stage Hill Cipher Technique, 2012 Panduranga H T , Naveen Kumar S K proposed partial image encryption in two ways using hill cipher technique[9]. First encryption technique uses two slightly different keys to construct two self-invertible matrices, which are used in two different stages to get partially encrypted image. Second encryption technique use one key to construct one selfinvertible matrix and it is used in first stage. In second stage same key matrix along with few modification in diagonal CONCLUSION The security of digital images become more and more important in now a days. In this paper, we have surveyed existing work on image encryption using hill cipher algorithm. We also give introduction about cryptography and hill cipher algorithm. We conclude that all techniques are useful for real-time image encryption. So no one can access image which transferring on open network. In our paper we used hill cipher and secure hash algorithm, so that we can obtain higher security in open network. References [1] Panduranga H T, Naveen kumar S K, ”hybrid approach for dual image encryption using nibble exchange and hill cipher”,978-1-4673-2322-2/12,2012 IEEE. [2] Ghassan Muslim Hassan” Permutation and Hill Cipher” Image Encryption Using [3] Rushdi A. Hamamreh, Mous Farajallah Design of a Robust Cryptosystem Algorithm for Non-Invertible Matrices Based on Hill Cipher IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.5, May 2009 International Journal of Science, Engineering and Technology Research (IJSETR) Volume 1, Issue 1, July 2012 [4] Bibhudendra Acharya, Girija Sankar Rath, Sarat Kumar Patra, and Saroj Kumar Panigrahy” Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm” International Journal of Security, Volume 1 : Issue (1) [5] S.K.Muttoo1, Deepika Aggarwal2, Bhavya Ahuja” A Secure Image Encryption Algorithm Based on Hill Cipher System, 2012” Buletin Teknik Elektro dan Informatika (Bulletin of Electrical Engineering and Informatics) Vol.1, No.1, March 2012, pp. 51~60 ISSN: 2089-3191 [6] Ramchandra S. Mangrulkar1, Pallavi V. Chavan2Encrypting Informative Image by Key Image using Hill Cipher Technique, 2011 International Journal of Recent Trends in Engineering, Vol. 1, No. 1, May 2009 [7] 1A.F.A. Abidin, 1O.Y. Chuan and 2M.R.K. AriffinA Novel Enhancement Technique of the Hill Cipher for Effective Cryptographic Purposes, 2011 Journal of Computer Science 7 (5): 785-789, 2011 ISSN 1549-3636 © 2011 Science Publications [8] Naveen Kumar S K , Sharath Kumar H S and Panduranga H T Encryption Approach for Images using Bits Rotation Reversal and Extended Hill Cipher Techniques, 2012 International Journal of Computer Applications (0975 – 8887) Volume 59– No.16, December 2012 [9] Panduranga H T , Naveen Kumar S K”Advanced Partial Image Encryption using Two-Stage Hill Cipher Technique” International Journal of Computer Applications (0975 – 8887) Volume 60– No.16, December 2012 [10] ISMAIL I.A,AMIN Mohammed, DIAB Hossam”How to repair the Hill cipher”Journal of Zhejiang University SCIENCE A ISSN 1009-3095 (Print); ISSN 1862-1775 (Online) [11] Bibhudendra Acharya, Saroj Kumar Panigrahy, Sarat Kumar Patra, and Ganapati Panda. “Image Encryption Using Advanced Hill Cipher Algorithm”. International Journal of Recent Trends in Engineering, Vol. 1, No. 1, May 2009 [12] Bibhudendra Acharya et al. “Involutory, Permuted and Reiterative key Matrix generation Methods for Hill Cipher System”. International Journal of Recent Trends in Engineering, Vol.1, No.4, May 2009, pp.106-108. International Journal of Science, Engineering and Technology Research (IJSETR) Volume 1, Issue 1, July 2012