Mohamed Jarjar, Said Najah, Khalid Zenkouar, Said Hraoui
{"title":"进一步改进HILL方法在图像加密中的应用","authors":"Mohamed Jarjar, Said Najah, Khalid Zenkouar, Said Hraoui","doi":"10.1109/IRASET48871.2020.9092046","DOIUrl":null,"url":null,"abstract":"In this article, a new encryption system that takes as an input an arbitrary size color image (n, m), and generates an encrypted image of the same size at the output, will be proposed. On each three-pixel block, an improvement of the classical HILL method provided by a size matrix (3, 3) invertible in the $Z/256Z$ ring, accompanied by a chaotic translation vector. Then a confusion with the chaotic map is established with the output vector. Finally, a chain with the clear block is performed to increase the avalanche effect. Simulations performed on a large number of images of different sizes and formats, show that our approach can withstand all known attacks.","PeriodicalId":271840,"journal":{"name":"2020 1st International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":"{\"title\":\"Further improvement of the HILL method applied in image encryption\",\"authors\":\"Mohamed Jarjar, Said Najah, Khalid Zenkouar, Said Hraoui\",\"doi\":\"10.1109/IRASET48871.2020.9092046\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this article, a new encryption system that takes as an input an arbitrary size color image (n, m), and generates an encrypted image of the same size at the output, will be proposed. On each three-pixel block, an improvement of the classical HILL method provided by a size matrix (3, 3) invertible in the $Z/256Z$ ring, accompanied by a chaotic translation vector. Then a confusion with the chaotic map is established with the output vector. Finally, a chain with the clear block is performed to increase the avalanche effect. Simulations performed on a large number of images of different sizes and formats, show that our approach can withstand all known attacks.\",\"PeriodicalId\":271840,\"journal\":{\"name\":\"2020 1st International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET)\",\"volume\":\"77 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"13\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 1st International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IRASET48871.2020.9092046\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 1st International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IRASET48871.2020.9092046","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Further improvement of the HILL method applied in image encryption
In this article, a new encryption system that takes as an input an arbitrary size color image (n, m), and generates an encrypted image of the same size at the output, will be proposed. On each three-pixel block, an improvement of the classical HILL method provided by a size matrix (3, 3) invertible in the $Z/256Z$ ring, accompanied by a chaotic translation vector. Then a confusion with the chaotic map is established with the output vector. Finally, a chain with the clear block is performed to increase the avalanche effect. Simulations performed on a large number of images of different sizes and formats, show that our approach can withstand all known attacks.