An Image Encryption using Chaotic Based Cryptosystemxlyle
NAME: MUHAMAD LUQMAN NULHAKIM BIN MANSOR
NO MATRIC: BTBL16043975
COURSE: ISM (SK) KESELAMATAN RANGKAIAN KOMPUTER
SUPERVISOR: PROF. MADYA DR AFENDEE BIN MOHAMED
UNIVERSITI SULTAN ZAINAL ABIDIN
This is a project dealing with securing images over a network.
Image is a delicate piece of information shared between clients across the world.Cryptography plays a huge role during secure connections.Applying simple Gaussian elimination to achieve highly secured image encryption decryption technique is a interesting challenge.
An Image Encryption using Chaotic Based Cryptosystemxlyle
NAME: MUHAMAD LUQMAN NULHAKIM BIN MANSOR
NO MATRIC: BTBL16043975
COURSE: ISM (SK) KESELAMATAN RANGKAIAN KOMPUTER
SUPERVISOR: PROF. MADYA DR AFENDEE BIN MOHAMED
UNIVERSITI SULTAN ZAINAL ABIDIN
This is a project dealing with securing images over a network.
Image is a delicate piece of information shared between clients across the world.Cryptography plays a huge role during secure connections.Applying simple Gaussian elimination to achieve highly secured image encryption decryption technique is a interesting challenge.
Secured data hiding by using extended visual cryptographyeSAT Journals
Abstract
Due to the rapid advancement of the internet large amount of data is transmitted over the internet. Some of the transmitted
information is very important like password, confidential file, security codes etc. so it is very important to provide security to
these data. In computer technology there are two ways to provide security to the data they are cryptography & steganography.
Although, in the past, there has been various research related to cryptography & steganography but neither of them provide
enough & strong security. So this paper proposes a novel approach for data hiding by combining steganography & extended
visual cryptography. Visual cryptography was invented by Moni Naor & Adi Shamir in 1994. Visual cryptography hide secret
image within one or more images & then generate shares. For share generation this paper uses Visual Information Pixel (VIP) &
error diffusion technique.
Keywords: Steganography, Visual Cryptography, Share Generation, VIP, Extended Visual cryptography,
Cryptography
Color Image Encryption and Decryption Using Multiple Chaotic MapsIJTET Journal
Owing to advances in communication technology, a bulk of visual digital data is being stored and transmitted over the internet now-a-days. Particularly millions and millions of images transfer through the network per day as per the statistics and a result, the security of image data is an important requirement. Image encryption algorithm is used to provide this security. In this paper, an image encryption algorithm based on confusion diffusion architecture that uses dynamic key space is proposed. An internal key generator is used to generate the initial seeds for the overall encryption scheme is proposed. With these initial seeds logistic map generates pseudo random numbers then these numbers are converted into permutation order for permutation. The diffusion bits are generated in parallel using the logistic map and manipulated with pixels confused. The image pixels are iteratively confused and diffused using permutation order and diffusion bits respectively to produce cipher image in minimum number of rounds. This paper proposes a new kind of initial seed generation that utilizes the combo of logistic and tent maps. Even all external seeds are same. The internal seeds will be totally different. This ensures the key sensitivity. The simulation results and analysis confirm that the satisfactory level of security is achieved in three rounds and overall encryption time is saved.
Using this software any 50 sec audio message can be decrypted into image file and then original message can again be recovered from image file. This project is coded in Matlab and gui is also built in Matlab.
This presentation contains the basics of cryptography. I have developed this presentation as a course material of Cryptography during my honors final year examination
This is my presentation which gives security for the data to be stored in cloud storage. The security is obtained through Cryptography (encryption and decryption) and the tools used in this paper is DOT NET and Gladinet.
For a college class in Ethical Hacking and Network Defense at CCSF, by Sam Bowne. More info at https://samsclass.info/123/123_F17.shtml
Based on this book
Hands-On Ethical Hacking and Network Defense, Third Edition by Michael T. Simpson, Kent Backman, and James Corley -- ISBN: 9781285454610
Updated 11-22-17 12:15 PM
Module 1: Introduction to Cryptography and Symmetric Key Ciphers
Computer Security Concepts - OSI Security Architecture -Security Attacks - Services, Mechanisms -
Symmetric Cipher Model - Traditional Block Cipher Structure - The Data Encryption Standard -The Strength of DES - Advanced Encryption Standard.
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
4. Cont...
USES OF ENCRYPTION
• Protect information on your computer.
• Protect information in transit
• Confidentiality of medical, personal and transaction
records
• Email program
• Digital signature
7. Classical encryption techniques
• As opposed to modern cryptography
• Goals:
– To introduce basic concepts & terminology of
encryption
– To prepare us for studying modern cryptography
8. Basic terminology
• Plaintext: original message to be encrypted
• Ciphertext: the encrypted message
• Enciphering or encryption: the process of converting
plaintext into ciphertext
• Encryption algorithm: performs encryption
– Two inputs: a plaintext and a secret key
8
10. Cont...
• Deciphering or decryption: recovering plaintext from
ciphertext
• Decryption algorithm: performs decryption
– Two inputs: ciphertext and secret key
• Secret key: same key used for encryption and
decryption
– Also referred to as a symmetric key
11. Cont...
• Cipher or cryptographic system : a scheme for
encryption and decryption
• Cryptography: science of studying ciphers
• Cryptanalysis: science of studying attacks against
cryptographic systems
• Cryptology: cryptography + cryptanalysis
12. Ciphers
• Symmetric cipher: same key used for encryption and
decryption
– Block cipher: encrypts a block of plaintext at a
time (typically 64 or 128 bits)
– Stream cipher: encrypts data one bit or one byte at
a time
• Asymmetric cipher: different keys used for
encryption and decryption
12
13. Symmetric Encryption
• Conventional / secret-key / single-key
• Sender and recipient share a common key
• All classical encryption algorithms are symmetric
13
14. Symmetric Encryption
• Mathematically:
Y = EK(X) or Y = E(K, X)
X = DK(Y) or X = D(K, Y)
• X = plaintext
• Y = ciphertext
• K = secret key
• E = encryption algorithm
• D = decryption algorithm
• Both E and D are known to public
14
15. Classical Ciphers
• Plaintext is viewed as a sequence of elements
(e.g., bits or characters)
• Substitution cipher: replacing each element of
the plaintext with another element.
• Transposition (or permutation) cipher:
rearranging the order of the elements of the
plaintext.
• Product cipher: using multiple stages of
substitutions and transpositions
15
16. Caesar Cipher
• Earliest known substitution cipher
• Invented by Julius Caesar
• Each letter is replaced by the letter three positions
further down the alphabet.
• Plain: a b c d e f g h i j k l m n o p q r s t u v w x y z
Cipher: D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
• Example: ohio state RKLR VWDWH
16
17. Caesar Cipher
• Mathematically, map letters to numbers:
a, b, c, ..., x, y, z
0, 1, 2, ..., 23, 24, 25
• Then the general Caesar cipher is:
c = EK(p) = (p + k) mod 26
p = DK(c) = (c – k) mod 26
• Can be generalized with any alphabet.
17
18. Objective
• The main Objective was to provide a Image
encryption mechanism which provides high security
level, less computational time and power in reliable
and efficient way to deal with balky, real time data.
• And Reduced the key size with equivalent efficient of
large key size.
19. Real life examples
• Online Banking
• E-commerce
• Student Records
• Health Records
• ATM Machines database
• Social Networking
• Bussinesses
20. Classify Security Attacks
• Passive attacks - eavesdropping on, or monitoring
of, transmissions to:
– obtain message contents, or
– monitor traffic flows
• Active attacks – modification of data stream to:
– masquerade of one entity as some other
– replay previous messages
– modify messages in transit
– denial of service
24. WHY IMAGE ENCRYPTION ?
• Nowadays, information security is becoming more
important in data storage and transmission.
• Images are widely used in different-different processes.
Therefore, the security of image data from unauthorized
uses is important.
• Image encryption plays a important role in the field of
information hiding.
• Image encryption method prepared information
unreadable. Therefore, no hacker or eavesdropper,
including server administrators and others, have access
to original message or any other type of transmitted
information through public networks such as internet
25. REQUIREMENTS OF IMAGE
ENCRYPTION
• Ability to get the pixels of the original image.
• Create a strong encryption image such that it cannot
be hacked easily.
• Faster encryption time such that encrypted image is
transferred faster to the person.
• Perfection in the original image we obtain after
decrypting it.
26. CHALLENGES IN IMAGE
ENCRYPTION
• The two main problems that arise in image encryption
process are with respect to:
• Computational time.
• Security level.
• Real time image encryption prefers ciphers that take
less amount of computational time without
compromising security.
27. Existing System
• There are traditional image encryption
techniques like DES, Triple-DES and IDEA.
• Limitations
o long computational time
o high computing power.
• Not suitable for practical image encryption
and for online communications
28. Applicability
• This encryption scheme is suitable for applications
like
Internet image encryption
secure transmission of confidential information in the
Internet.
29. Problem with conventional Methods
• Not suitable for practical image encryption , such as
on-line communication due to image features such
as:
• Bulk data capacity
• High correlation among pixels
• Non flexibility in performance characteristics and
level of security
• They may be susceptible to linear and differential
cryptanalysis
30. Exiting System
• Owner encrypts the original image using a standard
cipher with an encryption key.
• After producing the encrypted image, the content
owner hands over it to a data hider (e.g., a database
manager) and the data hider can embed some auxiliary
data into the encrypted image by losslessly vacating
some room according to a data hiding key.
• Then a receiver, maybe the content owner himself or
an authorized third party can extract the embedded
data with the data hiding key and further recover the
original image from the encrypted version according to
the encryption key
31. Disadvantages of Existing system
• All previous methods decrypted data by
reversibly from the encrypted images, which
may be subject to some errors on data
extraction and/or image restoration.
• It is difficult for data encrypted to reversibly
decrypt the data on an image.
33. Advanced Encryption Standard
• Proposed successor to DES
• DES drawbacks
– algorithm designed for 1970s hardware implementation
– performs sluggishly in software implementations
• 3DES is 3 times slower due to 3 rounds
– 64 bit blocksize needs to be increased to speed things up
• AES Overview
– 128, 192, 256 bit blocksize (128 bit likely to be most common)
– process entire block in parallel
– 128 bit key, expanded into 44, 32bit words with 4 words used for each
round
34. International Data Encryption
Standard (IDEA)
• Developed in Switzerland 1991
• 128 bit key, 64 bit blocksize, 8 rounds
• algorithm is quite different than DES,
– doesn’t use S-boxes
– uses binary addition rather than exclusive-or
• used in Pretty Good Privacy (PGP)
35. Blowfish
• 1993 – Bruce Schneier
• Popular alternative to DES
• Variable length keys - 128 bits but up to 448 bits
• up to 16 rounds
• 64 bit blocksize
• used in many commercial software packages
36. LITERATURE SURVEY
• Modified AES Based Algorithm for Image
encryption, 2007
• M. Zeghid, M. Machhout, L. Khriji, A. Baganne, and
R. Tourki
• Analyze the Advanced Encryption Standard (AES),
• Image encryption technique they add a key stream
generator (A5/1, W7) to AES
• For ensure improving the encryption performance.
37. Cont...
• Image Encryption Using Block-Based
Transformation Algorithm, 2008
• Mohammad Ali Bani Younes and Aman
Blowfish Encrypted image
• Block-based transformation algorithm based on the
combination of image transformation and a well
known encryption and decryption algorithm called
Blowfish.
38. Cont...
4 2
1 3
Blowfish image
•The original image was divided into blocks, which
were rearranged into a transformed image using a
transformation algorithm,
• Then the transformed image was encrypted using
the Blowfish algorithm
39. Cont...
• Results showed that the correlation between image
elements was significantly decreased.
• Their results also show that increasing the number of
blocks by using smaller block sizes resulted in a
lower correlation and higher entropy.
40. Cont...
• Image Encryption Using Self-Invertible Key Matrix
of Hill Cipher Algorithm, 2008
• Saroj Kumar Panigrahy, Bibhudendra Acharya and
Debasish Jena
• They are generating self-invertible matrix for Hill
Cipher algorithm.
• Using this key matrix they encrypted gray scale as well
as colour images.
• Their algorithm works well for all types of gray scale
as well as colour images except for the images with
background of same gray level or same colour.
41. Cont...
• An Image Encryption Approach Using a
Combination of Permutation Technique Followed
by Encryption, 2008
• Mohammad Ali Bani Younes and Aman Jantan
• Introduce a new permutation technique based on the
combination of image permutation and a well known
encryption algorithm called RijnDael.
• The original image was divided into 4 pixels × 4
pixels blocks
42. Cont...
• Which were rearranged into a permuted image using
a permutation process
• Then the generated image was encrypted using the
RijnDael algorithm.
• Their results showed that the correlation between
image elements was significantly decreased by using
the combination technique and higher entropy was
achieved
43. Cont...
• Image Encryption Using Advanced Hill Cipher
Algorithm, 2009
• Bibhudendra Acharya, Saroj Kumar Panigrahy, Sarat
Kumar Patra, and Ganapati Panda
• Proposed an advanced Hill (AdvHill) cipher
algorithm
• which uses an Involutory key matrix for encryption.
• They have taken different images and encrypted them
using original Hill cipher algorithm and their
proposed AdvHill cipher algorithm
44. Cont...
• And it is clearly noticeable that original Hill Cipher
can’t encrypt the images properly
• If the image consists of large area covered with same
colour or gray level.
• But their proposed algorithm works for any images
with different gray scale as well as colour images.
45. Cont...
• Digital image encryption algorithm based on
chaos and improved DES, 2009
• Zhang Yun-peng, Liu Wei, Cao Shui-ping, Zhai
Zheng-jun, Nie Xuan and Dai Wei-di
• In their technique firstly, new encryption scheme uses
the logistic chaos sequencer to make the pseudo-
random sequence, carries on the RGB
• This sequence to the image chaotically, then makes
double time encryptions with improvement DES.
• Their result show high starting value sensitivity, and
high security and the encryption speed.
46. Cont...
• Then makes double time encryptions with
improvement DES.
• Their result show high starting value sensitivity, and
high security and the encryption speed.
47. Cont...
• A Novel Image Encryption Algorithm Based on
Hash Function, 2010
• Seyed Mohammad Seyedzade, Reza Ebrahimi Atani
and Sattar Mirzakuchaki
• Proposed a novel algorithm for image encryption
based on SHA-512 hash function.
• The algorithm consists of two main sections:
48. Cont...
• The first does preprocessing operation to shuffle one
half of image.
• The second uses hash function to generate a random
number mask.
• The mask is then XORed with the other part of the
image which is going to be encrypted.
49. Cont...
• Digital Image Encryption Algorithm Based
Composition of Two Chaotic Logistic Maps, 2010
• Ismail Amr Ismail, Mohammed Amin, and Hossam
Diab
• Introduces an efficient chaos-based stream cipher,
composing two chaotic logistic maps and a large
enough external secret key for image encryption.
• In the proposed image encryption scheme, an external
secret key of 104 bit and two chaotic logistic maps are
employed to confuse the relationship between the
cipher image and the plain image.
50. Cont...
• Make the cipher more robust against any attack, the
secret key is modified after encrypting of each pixel
of the plain image.
• The robustness of the proposed system is further
reinforced by a feedback mechanism,
• Which makes the encryption of each plain pixel
depends on the key, the value of the previous cipher
pixel and the output of the logistic map (data
dependent property).
51. Cont...
• New modified version of Advance Encryption
Standard based algorithm for image encryption,
2010
• Kamali S.H., Shakerian R.,Hedayati M. and Rahmani
M
• Analysis Advance Encryption Standard(AES)
algorithm and present a modification to the Advanced
Encryption Standard (MAES) to reflect a high level
security and better image encryption..
52. Cont...
• Their result so that after modification image security
is high.
• They also compare their algorithm with original AES
encryption algorithm
53. Cont...
• Permutation based Image Encryption Technique,
2011
• Sesha Pallavi Indrakanti and P.S.Avadhani
• Proposes a new image encryption algorithm based on
random pixel permutation with the motivation to
maintain the quality of the image.
54. Cont...
• The technique involves three different phases in the
encryption process.
• The first phase is the image encryption.
• The second phase is the key generation phase.
• The third phase is the identification process. This
provide confidentiality to color image with less
computations Permutation process is much quick and
effective.
• The key generation process is unique and is a
different process
55. Cont...
• Image Security via Genetic Algorithm, 2011
• Rasul Enayatifar and Abdul Hanan Abdullah
• Proposed a new method based on a hybrid model
composed of a genetic algorithm and a chaotic
function for image encryption.
• In their technique, first a number of encrypted
images are constructed using the original image with
the help of the chaotic function.
56. Cont...
• In the next stage, these encrypted images are
employed as the initial population for starting the
operation of the genetic algorithm.
• Then, the genetic algorithm is used to optimize the
encrypted images as much as possible.
• In the end, the best cipher-image is chosen as the final
encryption image.
57. CONCLUSION
• In the digital world nowadays, the security of digital
images become more and more important
• Since the communications of digital products over
open network occur more and more frequently.
• In this presentation, we have surveyed existing work
on image encryption. We also give general guide line
about cryptography.
58. CONCLUSION
• We conclude that all techniques are useful for real-
time image encryption.
• Techniques describes in this research that can provide
security functions and an overall visual check, which
might be suitable in some applications.
• So no one can access image which transferring on
open network.
59. CONCLUSION
• In general, a well-studied, fast and secure
conventional cryptosystem should be chosen, surely
those algorithms, which provides higher security
60. References
• [1] S.S.Maniccam, N.G. Bourbakis, "Lossless image compression and
encryption using SCAN", Pattern Recognition 34 (2001),1229- 1245.
• [2] William stallings, ―Cryptography and Network Security: Principles &
Practices‖, second edition.
• [3]M. Zeghid, M. Machhout, L. Khriji, A. Baganne,R. Tourki, ―A
Modified AES Based Algorithm for Image Encryption‖, World Academy of
Science, Engineering and Technology 27 2007.
• [4] Mohammad Ali Bani Younes and Aman Jantan ―Image Encryption
Using Block-Based Transformation Algorithm‖ IAENG International
Journal of Computer Science, 35,2008.
61. References
• [5] Saroj Kumar Panigrahy, Bibhudendra Acharya and Debasish
Jen‖, Image Encryption Using Self-Invertible Key Matrix of Hill
Cipher Algorithm‖1st t International Conference on Advances in
Computing, Chikhli, India, 21-22 February 2008
• [6] Mohammad Ali Bani Younes and Aman Jantan, ―An Image
Encryption Approach Using a Combination of Permutation
Technique Followed by Encryption‖, IJCSNS International Journal
of Computer Science and Network Security, VOL.8 , April 2008.
• [7]Bibhudendra Acharya, Saroj Kumar Panigrahy, Sarat Kumar
Patra, and Ganapati Panda,‖ Image Encryption Using Advanced Hill
Cipher Algorithm‖, International Journal of Recent Trends in
Engineering, Vol. 1, No. 1, May 2009.
62. References
• [8] Zhang Yun-peng, Liu Wei, Cao Shui-ping, Zhai Zheng-jun, Nie
Xuan , Dai Wei-di,‖ Digital image encryption algorithm based on
chaos and improved DES‖, IEEE International Conference on
Systems, Man and Cybernetics, 2009
• [9] Seyed Mohammad Seyedzade, Reza Ebrahimi Atani and Sattar
Mirzakuchaki, ―A Novel Image Encryption Algorithm Based on
Hash Function‖ 6th Iranian Conference on Machine Vision and
Image Processing, 2010.