A new image encryption technique combining Elliptic Curve Cryptosystem with Hill Cipher

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Advanced Partial Image Encryption using Two-Stage Hill Cipher Technique

Information security is a fast growing research field which includes numerous problems in it. Partial image encryption is one of the important problems in the field of image information security. This paper describes the partial image encryption in two ways using hill cipher technique. First encryption technique uses two slightly different keys to construct two self-invertible matrices, which a...

متن کامل

Advanced Partial Image Encryption using Two-Stage Hill Cipher Technique

Information security is a fast growing research field which includes numerous problems in it. Partial image encryption is one of the important problems in the field of image information security. This paper describes the partial image encryption in two ways using hill cipher technique. First encryption technique uses two slightly different keys to construct two self-invertible matrices, which a...

متن کامل

Image Encryption Using Advanced Hill Cipher Algorithm

The Hill cipher algorithm is one of the symmetric key algorithms that have several advantages in data encryption. But, the inverse of the key matrix used for encrypting the plaintext does not always exist. Then if the key matrix is not invertible, then encrypted text cannot be decrypted. In the Involutory matrix generation method the key matrix used for the encryption is itself invertible. So, ...

متن کامل

A Threshold Authenticated Encryption Scheme Based on Elliptic Curve Cryptosystem

A (t,n) threshold authenticated encryption scheme allows more than t signers to generate an authenticated cipher-text for a message and only the designated verifier can verify the message. Recently, Chung et al. [1] proposed a (t, n) threshold authenticated encryption scheme by applying a division-of-labor signature technique. However, we showed that the scheme has a design flaw. Then, we propo...

متن کامل

A Comparative Performance Analysis of an Image Encryption Technique using Extended Hill Cipher

The security of digital images is concentrating much attention nowadays, and many image encryption algorithms have been proposed by different authors and researchers. In [1], an improvement over an algorithm for image encryption was proposed. This paper explains the result and analysis of the proposed algorithm in [1]. The paper also discusses about the analysis based on some performance factor...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of King Saud University - Computer and Information Sciences

سال: 2018

ISSN: 1319-1578

DOI: 10.1016/j.jksuci.2017.06.004