Please use this identifier to cite or link to this item: http://hdl.handle.net/2080/728
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAcharya, B-
dc.contributor.authorPatra, S K-
dc.contributor.authorPanda, G-
dc.date.accessioned2008-10-06T09:00:51Z-
dc.date.available2008-10-06T09:00:51Z-
dc.date.issued2008-
dc.identifier.citationEmerging Trends in Engineering and Technology, 2008. ICETET '08.Nagpur, India, P 77-81en
dc.identifier.urihttp://dx.doi.org/10.1109/ICETET.2008.110-
dc.identifier.urihttp://hdl.handle.net/2080/728-
dc.descriptionCopyright for the paper belongs to IEEEen
dc.description.abstractThe Hill cipher is a famous symmetric cryptosystem that have several advantages in data encryption. However, the Hill cipher algorithm cannot encrypt images that contain large areas of a single color. Thus, it does not hide all features of the image which reveals patterns in the plaintext. Moreover, it can be easily broken with a known plaintext attack revealing weak security. In this paper, novel cryptosystem is used to encrypt image that overcomes these disadvantages. The novel cryptosystem uses randomly generated self-invertible matrix as an encryption key for each block encryption and also this method eliminates the computational complexity involved in finding inverse of the matrix while decryption. The proposed variant yields higher security and significantly superior encryption quality compared to the original one.en
dc.format.extent321574 bytes-
dc.format.mimetypeapplication/pdf-
dc.language.isoen-
dc.publisherIEEEen
dc.subjectcomputational complexityen
dc.subjectcryptographyen
dc.subjectimage processingen
dc.subjectmatrix inversionen
dc.titleImage Encryption by Novel Cryptosystem Using Matrix Transformationen
dc.typeArticleen
Appears in Collections:Conference Papers

Files in This Item:
File Description SizeFormat 
skp-2008.pdf314.04 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.