Cryptosystem using Chaotic Shuffling Hill pad Encryption Scheme for Secure Data Transmission
Keywords:
Chaotic, Cryptosystem, Decryption, EncryptionAbstract
Maintaining privacy and security of any data, specifically for images that are transmitted through network is a major issue in today’s world. In this paper, a new three level Chaotic Shuffling Hill Pad encryption (CSHP) scheme is proposed. In first level encryption, the input image is subdivided and shuffled using chaotic algorithm. In second level, the shuffled blocks are encrypted using subset Hill algorithm with different product keys. Third level encryption is performed with the basis of Onetime pad encryption algorithm, in order to tighten the security of the image. Finally, the encrypted image is converted to text file, which is the intended cipher format. Product keys are chosen in such a way that they are invertible. The encrypted text file transmitted through insecure channel can be decrypted at the receiver’s end. The proposed method is tested with various standard images and the results are encouraging. The proposed method finds its application in Defence field
References
Bibhudendra Acharya, Saroj Kumar Panigrahy, Sarat Kumar Patra, and Ganapati Panda, “Image Encryption Using Advanced Hill Cipher Algorithm”, ACEEE International Journal on Signal and Image Processing Vol .1, No. 1, pp.37-41, 2010.
J.S. Armand EyebeFouda, J. Yves Effa, Samrat L. Sabat, and Maaruf Ali, “A Fast chaotic block cipher for image encryption”, Commun Nonlinear Sci Numer Simulat 19 pp. 578- 588, 2014.
K. Mani, M. Viswambari “Generation of Key Matrix for Hill Cipher using Magic Rectangle”, Advances in Computational Sciences and Technology ISSN 0973-6107 Vol. 10, No. 5 pp.1081-1090, 2017.
Tang Z, Zhang X, “Secure image encryption without size limitation using Arnold transform and Random strategies”, Journal of Multimedia, Vol 6, No. 2, pp. 202–206, 2011.
Timothy E. Lindquist, Mohamed Diarra, and Bruce R. Millard, “A Java Cryptography Service Provider Implementing One-Time Pad”, 37th Hawaii International Conference on System Sciences, pp. 1-6, 2004.
Yaqeen S. Mezaal, Dalal A. Hammood, Mohammed H. Ali, “OTP Encryption Enhancement Based on Logical Operations”, IEEE ISBN: 978-1-4673-7504-7, pp.109-112, 2016.
Prerna, Urooj, Meenakumari, Jitendra Nathshrivastava, “Image Encryption and Decryption using Modified Hill Cipher Technique”, International Journal of Information & Computation Technology. ISSN 0974-2239 Vol. 4, No. 17 pp. 1895-1901, 2014.
Zhenjun Tang &Xianquan Zhang & Weiwei Lan, “Efficient image encryption with block shuffling and chaotic map” Multimed Tools Appl, New York, 2014.
Zhang G, Liu Q, “A novel image encryption method based on total shuffling scheme” Optics Communication, pp. 2775–2780, 2011.
Zhang Yong, “A Chaotic System Based Image Encryption Scheme with Identical Encryption and Decryption Algorithm” Chinese Journal of Electronics, Vol.26, No.5, Sept. 2017.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
