Algorithm for Digital Image Encryption Using Multiple Hill Ciphers, a Unimodular Matrix, and a Logistic Map

Authors

  • Samsul Arifin Statistics Department, School of Computer Science, Bina Nusantara University, Jakarta, Indonesia.
  • Axel Nicholas Mathematics Department, School of Computer Science, Bina Nusantara University, Jakarta, Indonesia.
  • Suwarno Primary Teacher Education Department, Faculty of Humanities, Bina Nusantara University. Jakarta. Indonesia.
  • Herolistra Baskoroputro Mathematics Department, School of Computer Science, Bina Nusantara University, Jakarta, Indonesia.
  • Faisal Mathematics Department, School of Computer Science, Bina Nusantara University, Jakarta, Indonesia.
  • Abram Setyo Prabowo Computer Science Department, School of Computer Science, Bina Nusantara University, Jakarta, Indonesia.
  • Muhammad Amien Ibrahim Computer Science Department, School of Computer Science, Bina Nusantara University, Jakarta, Indonesia.
  • Anita Rahayu Statistics Department, School of Computer Science, Bina Nusantara University, Jakarta, Indonesia.

Keywords:

image encryption, multiple hill ciphers, unimodular matrix, logistic map

Abstract

The security of digital images is becoming increasingly important due to the widespread use of image transmission through networks. Therefore, encryption is necessary to protect the confidentiality and integrity of digital images. In this paper, a new digital image encryption algorithm is proposed by combining multiple Hill ciphers, unimodular matrix, and logistic map. The proposed algorithm can improve the security of the image encryption process by introducing multiple encryption layers. The unimodular matrix is used to shuffle the image pixels and the logistic map is used to generate the encryption keys. The performance of the proposed algorithm is evaluated by applying it to various types of digital images. The experimental results show that the proposed algorithm can achieve high-level security. Moreover, the proposed algorithm has a faster encryption time compared to other existing image encryption algorithms. Therefore, it is a promising algorithm for digital image encryption applications that require high security and fast processing time.

Downloads

Download data is not yet available.

References

I. B. Muktyas, Sulistiawati, and S. Arifin, “Digital image encryption algorithm through unimodular matrix and logistic map using Python,” in AIP Conference Proceedings, 2021, vol. 2331. doi: 10.1063/5.0041653.

A. J. Akinboboye, A. S. Oluwole, O. Akinsanmi, and A. E. Amoran, “Cryptographic Algorithms for IoT Privacy: A Technical Review,” Int. J. Eng. Trends Technol., vol. 70, no. 8, pp. 185–193, 2022, doi: 10.14445/22315381/IJETT-V70I8P219.

N. Faizal, S. Sharan, P. S. Nair, and D. S. Sankar, Securing Color Image Using Combined Elliptic Curve Crypto-System and Hill Cipher Encryption Along with Least Significant Bit - Steganography, vol. 98. 2020. doi: 10.1007/978-3-030-33846-6_40.

S. Ventures, “APA ITU ENKRIPSI ASIMETRIS & SIMETRIS?” https://www.websiterating.com/id/vpn/glossary/what-is-asymmetric-symmetric-encryption/ (accessed Feb. 25, 2023).

M. Fadlan, Haryansyah, and Rosmini, “Three Layer Encryption Protocol: An Approach of Super Encryption Algorithm,” in 3rd International Conference on Cybernetics and Intelligent Systems, ICORIS 2021, 2021. doi: 10.1109/ICORIS52787.2021.9649574.

P. N. Lone, D. Singh, V. Stoffová, D. C. Mishra, U. H. Mir, and N. Kumar, “Cryptanalysis and Improved Image Encryption Scheme Using Elliptic Curve and Affine Hill Cipher,” Mathematics, vol. 10, no. 20, 2022, doi: 10.3390/math10203878.

S. M. Zia Sardar, Aaron Arellano, “Cryptographic Implementations: Hardware vs. Software,” Electronic Design, 2020. https://www.electronicdesign.com/technologies/embedded/article/21132412/maxim-integrated-cryptographic-implementations-hardware-vs-software

E. A. Jameel and S. A. Fadhel, “Digital Image Encryption Techniques: Article Review,” Tech. Rom. J. Appl. Sci. Technol., vol. 4, no. 2, pp. 24–35, 2022, doi: 10.47577/technium.v4i2.6026.

J. R. Paragas, “An Enhanced Cryptographic Algorithm in Securing Healthcare Medical Records,” in Proceeding - 2020 3rd International Conference on Vocational Education and Electrical Engineering: Strengthening the framework of Society 5.0 through Innovations in Education, Electrical, Engineering and Informatics Engineering, ICVEE 2020, 2020. doi: 10.1109/ICVEE50212.2020.9243228.

P. N. Lone and D. Singh, “Application of algebra and chaos theory in security of color images,” Optik (Stuttg)., vol. 218, 2020, doi: 10.1016/j.ijleo.2020.165155.

D. Nofriansyah et al., “A New Image Encryption Technique Combining Hill Cipher Method, Morse Code and Least Significant Bit Algorithm,” in Journal of Physics: Conference Series, 2018, vol. 954, no. 1. doi: 10.1088/1742-6596/954/1/012003.

F. Serzhenko, “JPEG2000 vs JPEG vs PNG,” Fastvideo, 2020. https://www.fastcompression.com/blog/jpeg-j2k-png-review.htm

A. Laurinavicius et al., “Digital image analysis in pathology: benefits and obligation,” Anal. Cell. Pathol., vol. 35, no. 2, pp. 75–78, 2012.

S. Arifin, F. I. Kurniadi, I. G. A. Yudistira, R. Nariswari, N. P. Murnaka, and I. B. Muktyas, “Image Encryption Algorithm Through Hill Cipher, Shift 128 Cipher, and Logistic Map Using Python,” in 2022 3rd International Conference on Artificial Intelligence and Data Sciences: Championing Innovations in Artificial Intelligence and Data Sciences for Sustainable Future, AiDAS 2022 - Proceedings, 2022, pp. 221–226. doi: 10.1109/AiDAS56890.2022.9918696.

M. Terras, Digital images for the information professional. Routledge, 2016.

S. Kanwal et al., “An Effective Color Image Encryption Based on Henon Map, Tent Chaotic Map, and Orthogonal Matrices,” Sensors, vol. 22, no. 12, 2022, doi: 10.3390/s22124359.

M. T. Suryadi, Y. Satria, and A. Hadidulqawi, “Implementation of the Gauss-Circle Map for encrypting and embedding simultaneously on digital image and digital text,” J. Phys. Conf. Ser., vol. 1821, no. 1, 2021, doi: 10.1088/1742-6596/1821/1/012037.

S. Arifin, I. B. Muktyas, P. W. Prasetyo, and A. A. Abdillah, “Unimodular matrix and bernoulli map on text encryption algorithm using python,” Al-Jabar J. Pendidik. Mat., vol. 12, no. 2, pp. 447–455, 2021.

S. Arifin and I. B. Muktyas, “Membangkitkan Suatu Matriks Unimodular Dengan Python,” J. Deriv. J. Mat. dan Pendidik. Mat., vol. 5, no. 2, pp. 1–10, 2018.

M. A. Lone and S. Qureshi, “Encryption scheme for RGB images using chaos and affine hill cipher technique,” Nonlinear Dyn., vol. 111, no. 6, pp. 5919–5939, 2023, doi: 10.1007/s11071-022-07995-2.

A. Kaur and S. Singh, “A hybrid technique of cryptography and watermarking for data encryption and decryption,” in 2016 4th International Conference on Parallel, Distributed and Grid Computing, PDGC 2016, 2016, pp. 351–356. doi: 10.1109/PDGC.2016.7913175.

J. F. Dooley, The machines take over: Computer cryptography, vol. 0, no. 9783319016. 2013. doi: 10.1007/978-3-319-01628-3_8.

P. Hernández-Lamas, B. Cabau-Anchuelo, Ó. de Castro-Cuartero, and J. Bernabéu-Larena, “Mobile Applications, Geolocation and Information Technologies for the Study and Communication of the Heritage Value of Public Works,” Sustainability, vol. 13, no. 4, p. 2083, 2021.

Z. E. Dawahdeh, S. N. Yaakob, and R. Razif bin Othman, “A new image encryption technique combining Elliptic Curve Cryptosystem with Hill Cipher,” J. King Saud Univ. - Comput. Inf. Sci., vol. 30, no. 3, pp. 349–355, 2018, doi: 10.1016/j.jksuci.2017.06.004.

M. Toorani and A. Falahati, “A secure variant of the hill cipher,” in Proceedings - IEEE Symposium on Computers and Communications, 2009, pp. 313–316. doi: 10.1109/ISCC.2009.5202241.

J. R. Paragas, A. M. Sison, and R. P. Medina, “A new variant of hill cipher algorithm using modified S-Box,” Int. J. Sci. Technol. Res., vol. 8, no. 10, pp. 615–619, 2019.

3rd International Conference on Smart Computing and Informatics, SCI 2018, vol. 159. 2020.

S. J. Gladwin and P. Lakshmi Gowthami, “Combined Cryptography and Steganography for Enhanced Security in Suboptimal Images,” in 2020 International Conference on Artificial Intelligence and Signal Processing, AISP 2020, 2020. doi: 10.1109/AISP48273.2020.9073306.

S. Kanwal, S. Inam, O. Cheikhrouhou, K. Mahnoor, A. Zaguia, and H. Hamam, “Analytic Study of a Novel Color Image Encryption Method Based on the Chaos System and Color Codes,” Complexity, vol. 2021, 2021, doi: 10.1155/2021/5499538.

R. Tuli, H. N. Soneji, and P. Churi, “PixAdapt: A novel approach to adaptive image encryption,” Chaos, Solitons and Fractals, vol. 164, 2022, doi: 10.1016/j.chaos.2022.112628.

S. Arifin, K. Tan, A. T. Ariani, S. Rosdiana, and M. N. Abdullah, “The Audio Encryption Approach uses a Unimodular Matrix and a Logistic Function,” Int. J. Emerg. Technol. Adv. Eng., vol. 13, no. 4, pp. 71–81, 2023.

T. E. Oliphant, “Python for scientific computing,” Comput. Sci. Eng., vol. 9, no. 3, pp. 10–20, 2007.

Python Software Foundation, “Python TM,” Python.org. https://www.python.org/ (accessed Feb. 15, 2023).

S. Hraoui, F. Gmira, M. F. Abbou, A. J. Oulidi, and A. Jarjar, “A New Cryptosystem of Color Image Using a Dynamic-Chaos Hill Cipher Algorithm,” Procedia Comput. Sci., vol. 148, pp. 399–408, 2019, doi: https://doi.org/10.1016/j.procs.2019.01.048.

DarwIn, “File:500px photo (68947463).jpeg,” WikimediaCommons, 2018. https://commons.wikimedia.org/wiki/File:500px_photo_(68947463).jpeg

H. Nasir, “A view of a sunrise from a countryside in Jhang, Punjab, Pakistan.,” WikimediaCommons, 2017. https://commons.wikimedia.org/wiki/Category:Green_landscapes#/media/File:A_view_of_a_sunrise_from_a_countryside_in_Jhang,_Punjab,_Pakistan.jpg

The concept of symmetric encryption in general

Downloads

Published

17.05.2023

How to Cite

Arifin, S. ., Nicholas, A. ., Suwarno, Baskoroputro, H. ., Faisal, Prabowo, A. S. ., Ibrahim, M. A. ., & Rahayu, A. . (2023). Algorithm for Digital Image Encryption Using Multiple Hill Ciphers, a Unimodular Matrix, and a Logistic Map. International Journal of Intelligent Systems and Applications in Engineering, 11(6s), 311–324. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/2858

Issue

Section

Research Article

Similar Articles

You may also start an advanced similarity search for this article.