DocumentCode :
2696143
Title :
SD-EI: A cryptographic technique to encrypt images
Author :
Dey, Somdip
Author_Institution :
Dept. of Comput. Sci., St. Xavier´´s Coll. [Autonomous], Kolkata, India
fYear :
2012
fDate :
26-28 June 2012
Firstpage :
28
Lastpage :
32
Abstract :
In this paper, the author propose a method, SD-EI, for image encryption, which basically has two stages: 1) In first stage, each pixel of image is converted to its equivalent eight bit binary number and in that eight bit number, the number of bits, which are equal to the length of password are rotated and then reversed; 2) In second stage, extended hill cipher technique is applied by using involutory matrix, which is generated by same password used in second stage of encryption to make it more secure. The technique presented in this paper is very good for encrypting any type of images, and from the encrypted image it is very difficult to extract the real image without proper authorization and algorithm implementation. The proposed approach is implemented for different images and the results were very satisfactory. The proposed technique, SD-EI, can be implemented by any person or organization to encrypt images, which are to be kept secret, or can encrypt the images, where data (messages) are already hidden using steganography.
Keywords :
authorisation; cryptography; feature extraction; image coding; matrix algebra; steganography; SD-EI technique; authorization; cryptographic technique; data hiding; equivalent eight bit binary number; extended hill cipher technique; image encryption technique; image pixel; involutory matrix; real image extraction; steganography; Computer science; Encryption; Histograms; Information security; Matrix converters; Bits Revere; Bits Rotation; Cryptography; Extended Hill Cipher; Image Encryption; involutory matrix;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on
Conference_Location :
Kuala Lumpur
Print_ISBN :
978-1-4673-1425-1
Type :
conf
DOI :
10.1109/CyberSec.2012.6246123
Filename :
6246123
Link To Document :
بازگشت