Mohamed Jarjar, Said Najah, Khalid Zenkouar, Said Hraoui
{"title":"Further improvement of the HILL method applied in image encryption","authors":"Mohamed Jarjar, Said Najah, Khalid Zenkouar, Said Hraoui","doi":"10.1109/IRASET48871.2020.9092046","DOIUrl":null,"url":null,"abstract":"In this article, a new encryption system that takes as an input an arbitrary size color image (n, m), and generates an encrypted image of the same size at the output, will be proposed. On each three-pixel block, an improvement of the classical HILL method provided by a size matrix (3, 3) invertible in the $Z/256Z$ ring, accompanied by a chaotic translation vector. Then a confusion with the chaotic map is established with the output vector. Finally, a chain with the clear block is performed to increase the avalanche effect. Simulations performed on a large number of images of different sizes and formats, show that our approach can withstand all known attacks.","PeriodicalId":271840,"journal":{"name":"2020 1st International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 1st International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IRASET48871.2020.9092046","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13
Abstract
In this article, a new encryption system that takes as an input an arbitrary size color image (n, m), and generates an encrypted image of the same size at the output, will be proposed. On each three-pixel block, an improvement of the classical HILL method provided by a size matrix (3, 3) invertible in the $Z/256Z$ ring, accompanied by a chaotic translation vector. Then a confusion with the chaotic map is established with the output vector. Finally, a chain with the clear block is performed to increase the avalanche effect. Simulations performed on a large number of images of different sizes and formats, show that our approach can withstand all known attacks.