International Journal of Science, Engineering and Technology

advertisement
International Journal of Science, Engineering and Technology Research (IJSETR)
Volume 1, Issue 1, July 2012
An Adaptive Dual Image Encryption: A Review
1,2
Ramyashree A.N1, Manjunatha C.N,2
Department Of Electronics and communication engineering,
Akshaya Institute of Technology,
Tumkur, Karnataka, India.
ramyanarayan.an26@gmail.com, cnmmanjunath@gmail.com
ABSTRACT
In the fast growing internet technology information
security is very important, we can use the encryption to
secure the information. So many different kinds of
techniques are used to protect the information from
unauthorised person. In this paper, we survey on image
encryption techniques based on hill cipher algorithm.
selected positive integer. The cipher rtext message is expressed by
and the decryption is carried out by computing C = M*K mod n,
M = C0K-l mod n. Note that the multiplication of matrices are
over the Galois field GF(n).
For the purpose of convenience and clarity, we use (x, y) instead
of (x y) for vector form representation throughout this paper. The
following example shows how the Hill cipher works.
Keywords— Encryption, Hill cipher.
I.
INTRODUCTION
The advent of electronic commerce applications, an urgent
need to solve the issue of information security in an open
network environment is required. Cryptology comes from
Greek word "krypton logos", which means "hidden word". It
aims to secure communication between sender and recipient in
the insecure communication medium like internet.
Cryptography is the art or science encompassing the principles
and methods of transforming an intelligible message (plaintext)
into one that is unintelligible (cipher text) and then
retransforming that message back to its original form. In
modern times, cryptography is considered to be a branch of
both mathematics and computer science.
Cryptology is divided into two general fields, cryptography,
the art of secret writing (encryption) and cryptanalysis, the art
of deciphering encrypted message (decryption).
Encryption is a method of transforming original data,
called plaintext or clear text, into a form that appears to be
random and unreadable, which is called cipher text. Plaintext is
either in a form that can be understood by a person (a
document) or by a computer (executable code). Once it is not
transformed into cipher text, human nor machine can properly
process it until it is decrypted. This enables the transmission of
confidential information over insecure channels without
unauthorized disclosure. When data is stored on a computer, it
is usually protected by logical and physical access controls.
When this same sensitive information is sent over a network, it
can no longer take these controls for granted, and the
information is in a much more vulnerable state. So many
methods for image encryption with some advantages and
disadvantages.
Hill cipher is an application of linear algebra to cryptography,
developed by the mathematician Lester Hill.Hill cipher
algorithm is one of the symmetric key algorithm, it takes n
successive plaintext letters and substitutes n cipher text letters.
The idea of the Hill cipher is a simple matrix transformation
M.K mod n, where the key K is a non singular dxd matrix; M is
a d-tuple vector from splitting a plaintext message into d blocks
and each block corresponding to a positive integer; and n is a
This paper is organized as follows In Section 1; Introduction
about cryptography and hill cipher. In Section 2, we survey on
already existing research paper. Finally, we conclude in section 3.
II.
LITERATURE SURVEY
Image Encryption Using Permutation and Hill Cipher,2010
Ghassan Muslim Hassan[2],proposed new encryption algorithm
using two different images, one is cover image which acts as key
image and other is Informative image. In the first step, XOR
cover image with informative image to obtain resultant image.
The resultant image is decomposed into (n x n) blocks which
passed to the Hill Cipher algorithm to form encrypted blocks.
The encrypted blocks are transformed into new locations using
permutation table.
Design of a Robust Cryptosystem Algorithm for Non-Invertible
Matrices Based on Hill Cipher,2009
Rushdi A. Hamamreh, Mousa Farajallah[3] suggests a new
technique in Hill Cipher algorithm to overcome its major
problem- noninvertible key matrix and also o they improve
security of Hill Cipher against known plaintext attack. Here they
used public key idea and key generating depending on various
options and without linear algebra steps. So that, it will be
difficult for the attacker to get the key.
Novel Methods of Generating Self-Invertible Matrix for Hill
Cipher Algorithm, 2003
Bibhudendra Acharya, Girija Sankar Rath, Sarat Kumar Patra,
Saroj Kumar Panigrahy-The method of generating selfinvertible[4] matrix for Hill Cipher algorithm have been
proposed. In this method the matrix used for the encryption is
itself invertible. So, at the time of decryption, we need not to find
inverse of the matrix. This method eliminates the computational
complexity involved in finding inverse of the matrix while
decryption
International Journal of Science, Engineering and Technology Research (IJSETR)
Volume 1, Issue 1, July 2012
A Secure Image Encryption Algorithm Based on Hill Cipher
System, 2012
values are used to construct another self-invertible matrix which
leads to partial image encryption.
How to repair the Hill cipher, 2006
Hill cipher algorithm is one of the symmetric key algorithms
having several advantages in encryption. However, the inverse
of the matrix used for encrypting the plain text in this
algorithm may not always exist. Hill cipher is susceptible to
known plain text attack. But here S.K.Mutto, Deepika
Aggarwal, Bhavya Ahuja proposed algorithm[5] is aimed at
better encryption of all types of images even ones with uniform
background and makes the image encryption scheme more
secure.
Encrypting Informative Image by Key Image using Hill Cipher
Technique, 2011
Cryptography is the study of encoding and decoding secret
messages. In the language of cryptography, codes are called the
ciphers, encoded messages are called plaintext, and coded
messages are called cipher text. Here Ramchandra S.
Mangrulkar, Pallavi V. Chavan[6] they implement Hill
Cipher algorithm, for hiding our text behind the cover image
and decrypt the cover image to get original text.
A Novel Enhancement Technique of the Hill Cipher for
Effective Cryptographic Purposes, 2011
A.F.A. Abidin, O.Y. Chuan and M.R.K. Ariffin proposed
robust Hill algorithm (Hill++)[7] , this algorithm is an
extension of Affine Hill cipher. A random matrix key, RMK is
introduced as an extra key for encryption. And another
algorithm proposed for involutory key matrix generation.
The main drawback of this algorithm is that it encrypts identical
plaintext blocks to identical cipher text blocks and cannot encrypt
images that contain large areas of a single color. ISMAIL
I.A,AMIN Mohammed, DIAB Hossam proposed technique[10]
that adjusts the encryption key to form a different key for each
block encryption. Visually and computationally, experimental
results demonstrate that the proposed variant yields higher
security and significantly superior encryption quality compared to
the original one.
Image Encryption Using Advanced Hill Cipher Algorithm, 2009
Bibhudendra Acharya, Saroj Kumar Panigrahy, Sarat Kumar
Patra, and Ganapati Panda. The objective of this paper is to
encrypt an image using a technique different from the
conventional Hill Cipher. A novel advanced Hill (AdvHill)
encryption technique[11] has been proposed which uses an
involutory key matrix. The scheme is a fast encryption scheme
which overcomes problems of encrypting the images with
homogeneous background.
Involutory, Permuted and Reiterative Key Matrix Generation
Methods for Hill Cipher System , 2009
In order to repair these flaws of the original Hill cipher,
Bibhudendra Acharya1, Sarat Kumar Patra2, and Ganapati Panda
proposed Involutory, Permuted and Reiterative key matrix
generation method for Hill Cipher system[12]. Involutory matrix
generation method solves the key matrix inversion problem.
Permuted and Reiterative key matrix generation method
enhancement increases the Hill system's security considerably.
Encryption Approach for Images using Bits Rotation Reversal
and Extended Hill Cipher Techniques, 2012
III.
Naveen Kumar S K , Sharath Kumar H S and Panduranga H T
proposed new method[8] for image encryption with two stages
has been described in the present study. In first stage, each
pixel of image is converted to its equivalent eight bit binary
number and in that eight bit number, number of bits equal to
the length of password are rotated and then reversed. In second
stage, extended hill cipher technique is applied by using
involutory matrix generated by same password given in second
stage to make encryption more secured.
Advanced Partial Image Encryption using Two-Stage Hill
Cipher Technique, 2012
Panduranga H T , Naveen Kumar S K proposed partial image
encryption in two ways using hill cipher technique[9]. First
encryption technique uses two slightly different keys to
construct two self-invertible matrices, which are used in two
different stages to get partially encrypted image. Second
encryption technique use one key to construct one selfinvertible matrix and it is used in first stage. In second stage
same key matrix along with few modification in diagonal
CONCLUSION
The security of digital images become more and more
important in now a days. In this paper, we have surveyed existing
work on image encryption using hill cipher algorithm. We also
give introduction about cryptography and hill cipher algorithm.
We conclude that all techniques are useful for real-time image
encryption. So no one can access image which transferring on
open network. In our paper we used hill cipher and secure hash
algorithm, so that we can obtain higher security in open network.
References
[1] Panduranga H T, Naveen kumar S K, ”hybrid approach for
dual image encryption using nibble exchange and hill
cipher”,978-1-4673-2322-2/12,2012 IEEE.
[2] Ghassan Muslim Hassan”
Permutation and Hill Cipher”
Image
Encryption
Using
[3] Rushdi A. Hamamreh, Mous Farajallah Design of a Robust
Cryptosystem Algorithm for Non-Invertible Matrices Based on
Hill Cipher IJCSNS International Journal of Computer Science
and Network Security, VOL.9 No.5, May 2009
International Journal of Science, Engineering and Technology Research (IJSETR)
Volume 1, Issue 1, July 2012
[4] Bibhudendra Acharya, Girija Sankar Rath, Sarat Kumar
Patra, and Saroj Kumar Panigrahy” Novel Methods of
Generating Self-Invertible Matrix for Hill Cipher Algorithm”
International Journal of Security, Volume 1 : Issue (1)
[5] S.K.Muttoo1, Deepika Aggarwal2, Bhavya Ahuja” A
Secure Image Encryption Algorithm Based on Hill Cipher
System, 2012” Buletin Teknik Elektro dan Informatika
(Bulletin of Electrical Engineering and Informatics) Vol.1,
No.1, March 2012, pp. 51~60 ISSN: 2089-3191
[6]
Ramchandra
S.
Mangrulkar1,
Pallavi
V.
Chavan2Encrypting Informative Image by Key Image using
Hill Cipher Technique, 2011 International Journal of Recent
Trends in Engineering, Vol. 1, No. 1, May 2009
[7] 1A.F.A. Abidin, 1O.Y. Chuan and 2M.R.K. AriffinA Novel
Enhancement Technique of the Hill Cipher for Effective
Cryptographic Purposes, 2011 Journal of Computer Science 7
(5): 785-789, 2011 ISSN 1549-3636 © 2011 Science
Publications
[8] Naveen Kumar S K , Sharath Kumar H S and Panduranga
H T Encryption Approach for Images using Bits Rotation
Reversal and Extended Hill Cipher Techniques, 2012
International Journal of Computer Applications (0975 – 8887)
Volume 59– No.16, December 2012
[9] Panduranga H T , Naveen Kumar S K”Advanced Partial
Image Encryption using Two-Stage Hill Cipher Technique”
International Journal of Computer Applications (0975 – 8887)
Volume 60– No.16, December 2012
[10] ISMAIL I.A,AMIN Mohammed, DIAB Hossam”How to
repair the Hill cipher”Journal of Zhejiang University
SCIENCE A ISSN 1009-3095 (Print); ISSN 1862-1775
(Online)
[11] Bibhudendra Acharya, Saroj Kumar Panigrahy, Sarat
Kumar Patra, and Ganapati Panda. “Image Encryption Using
Advanced Hill Cipher Algorithm”. International Journal of
Recent Trends in Engineering, Vol. 1, No. 1, May 2009
[12] Bibhudendra Acharya et al. “Involutory, Permuted and
Reiterative key Matrix generation Methods for Hill Cipher
System”. International Journal of Recent Trends in
Engineering, Vol.1, No.4, May 2009, pp.106-108.
International Journal of Science, Engineering and Technology Research (IJSETR)
Volume 1, Issue 1, July 2012
Download