95 research outputs found

    Grayscale-image encryption using Random Hill Cipher over SLn(F) associated with Discrete Wavelet Transformation

    Get PDF
    Image data are highly sensitive and prone to incidental decoding by intruders. The security of image data in an insecure network is therefore a major issue. In this paper, we have presented a novel approach for grayscale-image encryption and decryption using Random Hill cipher over SLn(F) associated with discrete wavelet transformation. Earlier techniques for encryption and decryption of image data discussed missing the keys, but in this approach, both the keys and the arrangement of RHC are emphasized. Additionally, keys multiplication side (pre or post) over a grayscale-image data matrix also inevitable to know, to correctly decrypt the encrypted image data. In proposed approach, consider keys from special linear group over field F. The key space of the whole cryptosystem is exorbitant. We have presented a computer simulation with a standard examples and the results is given to analyze the robustness of the proposed technique. Security analysis and detailed comparison among earlier developed techniques with proposed approach are also discussed for the robustness of the technique

    Color image encryption and decryption using Hill Cipher associated with Arnold transform

    Get PDF
    Image security over open network transmission is a big concern nowadays. This paper proposes another methodology for color image encoding and decoding using two stage Hill Cipher method which is connected with Arnold Transformation. The forgoing created a strategy for encryption and decryption of color image information and touched on just the premise of keys. In this plan, keys and the agreement of Hill Cipher (HC) are basic. Moreover, keys multiplication (pre or post) over an RGB image information framework is inevitable to know to effectively decrypt the first image information. We have given a machine simulation with a standard example and the result is given to support the stalwartness of the plan. This paper gives a detailed comparison between prior proposed methods and this methodology. The system has potential utilization in computerized RGB image transforming and security of image information

    Multilayer Security of RGB Image in Discrete Hartley Domain

    Get PDF
    In this article, we present RGB image encryption and decryption using random matrix affine cipher (RMAC) associated with discrete Hartley transform (DHT) and random matrix shift cipher (RMSC). The parameters in RMAC and RMSC phases act as two series of secret keys whose arrangement is imperative in the proposed algorithm. The computer simulations with results and examples are given to analyze the efficiency of the proposed approach. Further, security analysis and comparison with the prior techniques successfully supports the robustness and validation of the proposed technique
    corecore