| Peer-Reviewed

Color Image Encryption by Code Image and Hill Algorithm

Received: 1 November 2014     Accepted: 5 November 2014     Published: 11 November 2014
Views:       Downloads:
Abstract

Today in a digital world, protection of information plays an essential role in message exchange and trading. Encryption is used to meet the security needs of safe transaction. Regarding the importance of the issue and the shift of traditional stage to digital stage, familiarity with encryption methods seems necessary. Different data have different methods of encryption. Images are also one type of data for which encryption is critically needed to prevent impermissible access. In this article, first a primary image is selected, then, based on the proportion of the image needing encryption, pixels from code image are picked and is being encrypted by a function. In the next stage, this proportion is being XOR-ed by the pixel proportion of the image needing encryption, and eventually the final proportion is encrypted by Hill Algorithm. MATLAB software has been used for studying the project, and efficiency of this method, in comparison to Hill Algorithm as a standard algorithm, is investigated. At the end, maintaining the image quality after decryption is evaluated by standards such as PSNR and SSID. The results indicate high efficiency of this method.

Published in International Journal of Intelligent Information Systems (Volume 3, Issue 6-1)

This article belongs to the Special Issue Research and Practices in Information Systems and Technologies in Developing Countries

DOI 10.11648/j.ijiis.s.2014030601.28
Page(s) 98-102
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2014. Published by Science Publishing Group

Keywords

Hill Algorithm, Security, Image Encryption, Efficiency

References
[1] Kuang Tsan Lin, “ Binary encoding method to encrypt Fourier-transformed”, information OF 15th Annu. Conf. IEEE EMBS, pp. 778-780, 1993.
[2] R.L. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems”, Communications of the ACM, pp.120-126, 1978.
[3] Eli Biham, Adi Shamir, “Differential cryptanalysis of DES-like cryptosystems”, Springer, Volume 4, Issue 1, pp.3-72, 1991.
[4] Joan Daemen, Vincent Rijmen, “The Design of Rijndael: AES The Advanced Encryption Standard”, Springer, p.238, February 2002.
[5] R.Kusters and MTuengerthal, “Universally Composable Symmetric Encryption”, 2nd IEEE Computer Security Foundations Symposium (CSF '09), pp. 293-307, July 2009.
[6] H Jin, Z.Liao, D.Zou, and C.Li, “Asymmetrical Encryption Based Automated Trust Negotiation Model”, The 2nd IEEE International Conference on Digital Ecosystems and Technologies (DEST 2008), pp.363-368, Feb. 2008.
[7] Shiguo Lian, “Multimedia Content Encryption Techniques and Applications”, CRC Press,p.3.
[8] Ratinder Kaur, V. K. Banga, “Image Security using Encryption based Algorithm”, International Conference on Trends in Electrical, Electronics and Power Engineering (ICTEEP'2012) Singapore, July 15-16, 2012.
[9] Xiaofeng Liao, Shiyue Lai, Qing Zhou, “A novel image encryption algorithm based on self-adaptive”, Digital Signal Processing Principles, New York Macmillan, 1992.
[10] C.J. Tay, C. Quan, W. Chen, Y. Fu, “Color image encryption based on interference and virtual optics”, Optics & Laser Technology, pp. 409–415, 2010.
[11] Yicong Zhou, Karen Panetta, SosAgaian, C.L. Philip Chen,” Image encryption using P-Fibonacci transform and decomposition”,”Optic s Communications”, 285 (2012) 594–608
[12] Xingyuan Wang, Lin Teng, Xue Qin, “A novel colour image encryption algorithm based on chaos”, Signal Processing, pp.1101–1108, 92 (2012).
[13] Lester S. Hill, “Cryptography in an Algebraic Alphabet”, The American Mathematical Monthly“ ,Vol.36, pp. 306–312, June–July 1929.
[14] J.Zillami and D. G. Manolakis, “Encryption Based On Advance Hill, Algorithms and Applications”, New York Macmillan, 2008.
[15] Ahmed A. Abd El-Latif, Li Li, Ning Wang, Qi Han, Xiamu Niu, “A new app roach to chaotic image encryption based on quantum chaotic system, exploiting color spaces Signal Processing”, Volume 93, pp.387-397, 2013.
[16] Z. Wang, A.C. Bovik, H.R. Sheikh, E.P. Simoncelli, ” Image Quality Assessment: From Error Visibility toStructural Similarity”, Transactions on Image Processing IEEE, pp.600-612, 13 ( 2004 ).
Cite This Article
  • APA Style

    Ali Moradmard, Mohammad Tahghighi Sharabiani. (2014). Color Image Encryption by Code Image and Hill Algorithm. International Journal of Intelligent Information Systems, 3(6-1), 98-102. https://doi.org/10.11648/j.ijiis.s.2014030601.28

    Copy | Download

    ACS Style

    Ali Moradmard; Mohammad Tahghighi Sharabiani. Color Image Encryption by Code Image and Hill Algorithm. Int. J. Intell. Inf. Syst. 2014, 3(6-1), 98-102. doi: 10.11648/j.ijiis.s.2014030601.28

    Copy | Download

    AMA Style

    Ali Moradmard, Mohammad Tahghighi Sharabiani. Color Image Encryption by Code Image and Hill Algorithm. Int J Intell Inf Syst. 2014;3(6-1):98-102. doi: 10.11648/j.ijiis.s.2014030601.28

    Copy | Download

  • @article{10.11648/j.ijiis.s.2014030601.28,
      author = {Ali Moradmard and Mohammad Tahghighi Sharabiani},
      title = {Color Image Encryption by Code Image and Hill Algorithm},
      journal = {International Journal of Intelligent Information Systems},
      volume = {3},
      number = {6-1},
      pages = {98-102},
      doi = {10.11648/j.ijiis.s.2014030601.28},
      url = {https://doi.org/10.11648/j.ijiis.s.2014030601.28},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ijiis.s.2014030601.28},
      abstract = {Today in a digital world, protection of information plays an essential role in message exchange and trading. Encryption is used to meet the security needs of safe transaction. Regarding the importance of the issue and the shift of traditional stage to digital stage, familiarity with encryption methods seems necessary. Different data have different methods of encryption. Images are also one type of data for which encryption is critically needed to prevent impermissible access. In this article, first a primary image is selected, then, based on the proportion of the image needing encryption, pixels from code image are picked and is being encrypted by a function. In the next stage, this proportion is being XOR-ed by the pixel proportion of the image needing encryption, and eventually the final proportion is encrypted by Hill Algorithm. MATLAB software has been used for studying the project, and efficiency of this method, in comparison to Hill Algorithm as a standard algorithm, is investigated. At the end, maintaining the image quality after decryption is evaluated by standards such as PSNR and SSID. The results indicate high efficiency of this method.},
     year = {2014}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Color Image Encryption by Code Image and Hill Algorithm
    AU  - Ali Moradmard
    AU  - Mohammad Tahghighi Sharabiani
    Y1  - 2014/11/11
    PY  - 2014
    N1  - https://doi.org/10.11648/j.ijiis.s.2014030601.28
    DO  - 10.11648/j.ijiis.s.2014030601.28
    T2  - International Journal of Intelligent Information Systems
    JF  - International Journal of Intelligent Information Systems
    JO  - International Journal of Intelligent Information Systems
    SP  - 98
    EP  - 102
    PB  - Science Publishing Group
    SN  - 2328-7683
    UR  - https://doi.org/10.11648/j.ijiis.s.2014030601.28
    AB  - Today in a digital world, protection of information plays an essential role in message exchange and trading. Encryption is used to meet the security needs of safe transaction. Regarding the importance of the issue and the shift of traditional stage to digital stage, familiarity with encryption methods seems necessary. Different data have different methods of encryption. Images are also one type of data for which encryption is critically needed to prevent impermissible access. In this article, first a primary image is selected, then, based on the proportion of the image needing encryption, pixels from code image are picked and is being encrypted by a function. In the next stage, this proportion is being XOR-ed by the pixel proportion of the image needing encryption, and eventually the final proportion is encrypted by Hill Algorithm. MATLAB software has been used for studying the project, and efficiency of this method, in comparison to Hill Algorithm as a standard algorithm, is investigated. At the end, maintaining the image quality after decryption is evaluated by standards such as PSNR and SSID. The results indicate high efficiency of this method.
    VL  - 3
    IS  - 6-1
    ER  - 

    Copy | Download

Author Information
  • Department of Computer Engineering, Islamic Azad University, Zanjan Branch, Zanjan, Iran

  • Department of Computer Engineering, Islamic Azad University, Zanjan Branch, Zanjan, Iran

  • Sections