Downloads: 154
Research Paper | Computer Science & Engineering | Iraq | Volume 4 Issue 11, November 2015
Classical Image Encryption and Decryption
Noor Dhia Kadhm Al-Shakarchy [5] | Hiba Jabbar Al- Eqabie | Huda Fawzi Al- Shahad
Abstract: The interesting of data production in transmission by any type of multimedia such as digital image, text, audio and video is increases. Many methods are used to provide the secrecy, integrity, confidentiality and to prevent unauthorized access of sensitive information such as Cryptography. Cryptography is secret the original data by converting it to cipher data with ensure retrieve this data in receiver side without losing some data or deformation the resolution. In this paper, we used confusion schemes for scrambling the positions of pixels of the colored images by using Arnold Cat Mapping. Shuffling mechanism combined with diffusion mechanism for encrypting the scrambling image by changing the gray values of the image pixels by using classical methods of encrypted and decrypted of digital color images. The suggested methods involved classical cipher system such as veginner substitution cipher system and hill cipher method. From all experimental and analysis techniques on some color images that used to evaluate the proposed image encryption and decryption methods we found that hill cipher shows significant security and high speed than other methods. Moreover, increase the randomness of the cipher images which led to hide the natural properties of original images.
Keywords: encryption, decryption, hill cipher, vigener cipher, Arnold Cat Map System, pain image, cipher image and key
Edition: Volume 4 Issue 11, November 2015,
Pages: 607 - 612
Similar Articles with Keyword 'encryption'
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022
Pages: 654 - 659Image Encryption using (k, n) Secret Sharing Scheme using Lagrange Polynomial
GVSS Jayanth Anish