Encryption of Color Images using Pixel Shift Algorithm and Developed Hill Algorithm
Subject Areas : Majlesi Journal of Telecommunication Devices
mohsen Norouzi
1
,
Ali Arshaghi
2
,
Moshsen Ashourian
3
1 - Researcher, Faculty of Computer, Imam Hossein University, Tehran, Iran
2 - Researcher, Faculty of Computer, Imam Hossein University, Tehran, Iran
3 - Department of Electrical Engineering, Majlesi Branch, Islamic Azad University, Isfahan, Iran
Keywords:
Abstract :
- Roger A. Prichard, “History of Encryption” January 26, 2002.
- Andreas Uhl, Andreas Pommer, “image and video encryption”,SpringerScience, p.1, 2005.
- S. Faragallah, Utilization of Security Techniques for Multimedia Applications, Ph. D. Thesis, Department of Computer and Engineering, FacultyofElectronic Engineering, Menofia University, 2007.
- J. Menezes, P. C. V. Oorschot and S. Vanstone, “Handbook of Applied Cryptography”,CRC Press Boca Raton ,USA, 1996.
- Qiao, “Multimedia Security and CopyrightP Urbana-Champaign, Urbana, Illinois”, USA, 1998.
- ISMAIL A, AMIN Mohammed, DIAB Hossam, “How to repair the Hill cipher”, Journal of Zhejiang University SCIENCE A, Volume 7(12),pp. 2022-2030,2006.
- K.Muttoo, Deepika Aggarwal, Bhavya Ahuja, “A Secure Image Encryption Algorithm Based on Hill Cipher System, Bulletin of Electrical Engineering and Informatics;, Vol.1, No.1, PP. 51
- Dipanwita Debnath, Suman Deb, Nirmalya Kar “Using Hill Cipher & RGB Image Steganography” ,178-183 ,2015
- Li ZHANG, Xiaolin TIAN, ShaoweiXIA, “A Scrambling Algorithm of Image Encryption Based on Rubik’s CubeRotation Logistic Sequence”, IEEE Computer Society, Volume 1, pp. 312
- Zhi-liang ZHU , Chong WANG , Hua CHAI , Hai YU, “A Chaotic Image Encryption Scheme Based on Mag Transformation”, Fourth International Workshop on Chaos
- Kwok, S. Tang, W.K.S. “A fast image encryption system based on chaotic maps with finite precision representation ”, Chaos solitons Fractals ELSEVIER, Volume 32,pp.1518
- M. Seyedzadeh, S. Mirzakuchaki, “A fast color image encryption algorithm based on coupled two chaotic map", Signal ProcessingELSEVIER,
- Benyamin Norouzi, Seyed Mohammad Seyedzadeh, Sattar Mirzakuchaki, Mohammad Reza Mosavi, “A novel image encryption basedhash function withonly two-round diffusion process”, springer,2013.
- Yang Liu, Xiaojun Tong, Shicheng Hu, ”A family of new complex number chaotic maps based image encryption algorithm” Signal Processing: Image Communication,Volume 28, pp.1 548-1559-2013.