Image Encryption Using Permutation and Hill Cipher
DOI:
https://doi.org/10.55562/jrucs.v29i1.375Keywords:
Image EncryptionAbstract
Encryption is used to securely transmit data in open networks. Each type of data has its own features; therefore different techniques should be used to protect confidential image data from unauthorized access. This paper, has been proposed new encryption algorithm using two different images, one is cover image which acts as key image which is shared by both sender and receiver and other is Informative image. As first step, XOR cover image with informative image to obtain resultant image. The resultant image is decomposed into (n x n) blocks which passed to the Hill Cipher algorithm to form encrypted blocks. The encrypted blocks are transformed into new locations using permutation table.Downloads
Download data is not yet available.
Downloads
Published
2021-10-20
Issue
Section
Articles
How to Cite
Image Encryption Using Permutation and Hill Cipher. (2021). Journal of Al-Rafidain University College For Sciences ( Print ISSN: 1681-6870 ,Online ISSN: 2790-2293 ), 29(1), 22-35. https://doi.org/10.55562/jrucs.v29i1.375