Image Encryption Using Permutation and Hill Cipher

Authors

  • Ghassan Muslim Hassan

DOI:

https://doi.org/10.55562/jrucs.v29i1.375

Keywords:

Image Encryption

Abstract

Encryption is used to securely transmit data in open networks. Each type of data has its own features; therefore different techniques should be used to protect confidential image data from unauthorized access. This paper, has been proposed new encryption algorithm using two different images, one is cover image which acts as key image which is shared by both sender and receiver and other is Informative image. As first step, XOR cover image with informative image to obtain resultant image. The resultant image is decomposed into (n x n) blocks which passed to the Hill Cipher algorithm to form encrypted blocks. The encrypted blocks are transformed into new locations using permutation table.

Downloads

Download data is not yet available.

Downloads

Published

2021-10-20

How to Cite

Image Encryption Using Permutation and Hill Cipher. (2021). Journal of Al-Rafidain University College For Sciences ( Print ISSN: 1681-6870 ,Online ISSN: 2790-2293 ), 29(1), 22-35. https://doi.org/10.55562/jrucs.v29i1.375