
Image Encryption Using Permutation and Hill Cipher
Author(s) -
Ghassan Muslim Hassan
Publication year - 2021
Publication title -
magallaẗ kulliyyaẗ al-rāfidayn al-ǧāmi'aẗ al-'ulūm/maǧallaẗ kulliyyaẗ al-rāfidayn al-ǧāmiʻaẗ li-l-ʻulūm
Language(s) - English
Resource type - Journals
eISSN - 2790-2293
pISSN - 1681-6870
DOI - 10.55562/jrucs.v29i1.375
Subject(s) - encryption , cover (algebra) , computer science , image (mathematics) , permutation (music) , key (lock) , stream cipher , communication source , cryptography , cipher , theoretical computer science , artificial intelligence , computer network , algorithm , computer security , mechanical engineering , physics , acoustics , engineering
Encryption is used to securely transmit data in open networks. Each type of data has its own features; therefore different techniques should be used to protect confidential image data from unauthorized access. This paper, has been proposed new encryption algorithm using two different images, one is cover image which acts as key image which is shared by both sender and receiver and other is Informative image. As first step, XOR cover image with informative image to obtain resultant image. The resultant image is decomposed into (n x n) blocks which passed to the Hill Cipher algorithm to form encrypted blocks. The encrypted blocks are transformed into new locations using permutation table.