2011
DOI: 10.12928/eei.v1i1.226
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Image Encryption Algorithm Based on Hill Cipher System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…However, there will be a few problems in the processing of sending, such as the simultaneous transmission of multiple monitoring nodes or the blockage of the network; it may occur that data is lose. In the process [10] of data transmission the network will judge the size of the packet, when the size is more than or less than the certain limit the packet will be discarded, the exact scope is (64-1500) bytes. RTP protocol is used to transmit video files because it is a real-time network transmission protocol that is often used for single point data transmission and it is very suitable for the transmission of audio and video data.…”
Section: Video Transmission Modulementioning
confidence: 99%
“…However, there will be a few problems in the processing of sending, such as the simultaneous transmission of multiple monitoring nodes or the blockage of the network; it may occur that data is lose. In the process [10] of data transmission the network will judge the size of the packet, when the size is more than or less than the certain limit the packet will be discarded, the exact scope is (64-1500) bytes. RTP protocol is used to transmit video files because it is a real-time network transmission protocol that is often used for single point data transmission and it is very suitable for the transmission of audio and video data.…”
Section: Video Transmission Modulementioning
confidence: 99%
“…With the rapid development of multimedia data (such as audio, video, and images) and its transmission across unprotected channels of communication, information security has become increasingly important to avoid risks and data loss [1]- [3]. Image encryption is the most widely used method of safeguarding the privacy of image data.…”
Section: Introductionmentioning
confidence: 99%
“…The proposed cryptosystem is free from such types of attacks. The paper [21] discusses about security of an RGB image using hill cipher combined with discrete wavelet transform, that considers involutory matrix for the key, while [22] and [23] considered self invertible matrix (also involutory matrix) for the hill cipher key. But in proposed cryptosystem, we have chosen multiplicative keys of affine hill cipher from S L n (F q ) and additive keys of affine cipher from M n (F q ).…”
Section: Introductionmentioning
confidence: 99%