2010
DOI: 10.1016/j.procs.2010.11.031
|View full text |Cite
|
Sign up to set email alerts
|

Privacy protection of biometric traits using modified hill cipher with involutory key and robust cryptosystem

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 7 publications
0
6
0
Order By: Relevance
“…There are references used as a comparison for modifications that have been made to the Hill Cipher cryptosystem. Acharya et al (2010) discussed the privacy protection of biometric traits using modified Hill Cipher with involuntary key and robust cryptosystem, whereas Krishna & Madhuravani (2012) discussed a modified Hill Cipher using randomized approach and L (2017) studied a modified Hill Cipher based image encryption technique. In their paper, Khalaf et al (2016) studied a triple Hill Cipher algorithm proposed to increased the security of encrypted binary data, whereas Reddy et al (2012) discussed a modified Hill Cipher based on circulant matrices, and a modified Hill Cipher for large block of plaintext with interlacing and iteration was studied by Sastry Ravi (2008).…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…There are references used as a comparison for modifications that have been made to the Hill Cipher cryptosystem. Acharya et al (2010) discussed the privacy protection of biometric traits using modified Hill Cipher with involuntary key and robust cryptosystem, whereas Krishna & Madhuravani (2012) discussed a modified Hill Cipher using randomized approach and L (2017) studied a modified Hill Cipher based image encryption technique. In their paper, Khalaf et al (2016) studied a triple Hill Cipher algorithm proposed to increased the security of encrypted binary data, whereas Reddy et al (2012) discussed a modified Hill Cipher based on circulant matrices, and a modified Hill Cipher for large block of plaintext with interlacing and iteration was studied by Sastry Ravi (2008).…”
Section: Methodsmentioning
confidence: 99%
“…This system encrypts message mod C KP p  and description 1 mod P K C p   (Khalaf et al, 2016). In its development, the system is modified in the circulant matrix, involutory matrix and combination of the robust cryptosystem (Acharya et al, 2010). The Hill Cipher cryptosystem was also developed in image encoding (L, 2017), plaintext randomization (Krishna & Madhuravani, 2012), and looping of the Hill Ciphers cryptosystem (Dummit & Foote, 2004).…”
Section: Introductionmentioning
confidence: 99%
“…The image encryption using an Advanced Hill Cipher algorithm has been introduced by (Acharya et al, 2007) to solve the problem of the inverse key matric that usually did not exist in Hill Cipher algorithm, hence, eliminating the computation need to be done by the receiver to compute the inverse key. Acharya et al (2010) was then modified the original Hill Cipher with an involuntary key by using iterations and interlacing. However, the solution only focused on a single grayscale image, thus making the result unreliable due to limited analysis.…”
Section: Related Workmentioning
confidence: 99%
“…If the encryption matrix is irreversible, the ciphertext cannot be restored to plaintext. To avoid a strong correlation between the encryption matrix elements, we use a hyper-chaotic sequence to construct self-inverse encryption matrix to reduce the correlation between matrices so that the ciphertext is difficult to crack [32].…”
Section: The Construction Of Hill Encryption Matrixmentioning
confidence: 99%