Encryption systems have been developed for image viewing applications using the Hill Cipher algorithm. This study aims to evaluate the image encryption quality of the Hill Cipher algorithm. Several traditional metrics are used to evaluate the quality of the encryption scheme. Three of such metrics have been selected for this study. These include, the Colour Histogram, the Maximum Deviation (comparing the original image) and the Entropy Analysis of the encrypted image. Encryption quality results from all three schemes using a variety of images show that a plain Hill Cipher approach gives a good result for all kinds of images but is more suited for colour dense images
With the fast progression of data exchange in electronic way, information security is becoming more ...
The security of digital information has become a major issue during the last three decades. Encrypti...
The advancement of communication technology helps users sharing the images through internet. However...
Encryption systems have been developed for image viewing applications using the Hill Cipher algorith...
The security of digital images is concentrating much attention nowadays, and many image encryption a...
One form of data is digital images, because of their widespread of frequent exchange over the Intern...
Abstract- in this paper, we investigate the encryption quality of the robust chaotic block cipher (R...
Nowadays while transferring and receiving the data like images, messages and other information, cert...
Image encryption is rapidly increased recently by the increasing use of the internet and communicati...
The different methods for encryption and decryption in digital images have received growing attentio...
In the era of information technology, users had to send millions of images back and forth daily. It'...
Abstract—Measurement of image quality is important for many image processing applications. Image qua...
Copyright © 2014 Saleh Saraireh et al. This is an open access article distributed under the Creative...
Secure data transmission in the virtual world is be coming increasingly difficult. It is due to the ...
International audienceThere are numerous standards and recommendations when it comes to the acquisit...
With the fast progression of data exchange in electronic way, information security is becoming more ...
The security of digital information has become a major issue during the last three decades. Encrypti...
The advancement of communication technology helps users sharing the images through internet. However...
Encryption systems have been developed for image viewing applications using the Hill Cipher algorith...
The security of digital images is concentrating much attention nowadays, and many image encryption a...
One form of data is digital images, because of their widespread of frequent exchange over the Intern...
Abstract- in this paper, we investigate the encryption quality of the robust chaotic block cipher (R...
Nowadays while transferring and receiving the data like images, messages and other information, cert...
Image encryption is rapidly increased recently by the increasing use of the internet and communicati...
The different methods for encryption and decryption in digital images have received growing attentio...
In the era of information technology, users had to send millions of images back and forth daily. It'...
Abstract—Measurement of image quality is important for many image processing applications. Image qua...
Copyright © 2014 Saleh Saraireh et al. This is an open access article distributed under the Creative...
Secure data transmission in the virtual world is be coming increasingly difficult. It is due to the ...
International audienceThere are numerous standards and recommendations when it comes to the acquisit...
With the fast progression of data exchange in electronic way, information security is becoming more ...
The security of digital information has become a major issue during the last three decades. Encrypti...
The advancement of communication technology helps users sharing the images through internet. However...