Cryptosystem using Chaotic Shuffling Hill pad Encryption Scheme for Secure Data Transmission
T. Jaison Vimalraj1 , P. Mithun2 , K. Mathiyarasu3
Section:Research Paper, Product Type: Journal Paper
Volume-06 ,
Issue-04 , Page no. 174-178, May-2018
Online published on May 31, 2018
Copyright © T. Jaison Vimalraj, P. Mithun, K. Mathiyarasu . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Citation
IEEE Style Citation: T. Jaison Vimalraj, P. Mithun, K. Mathiyarasu, “Cryptosystem using Chaotic Shuffling Hill pad Encryption Scheme for Secure Data Transmission,” International Journal of Computer Sciences and Engineering, Vol.06, Issue.04, pp.174-178, 2018.
MLA Citation
MLA Style Citation: T. Jaison Vimalraj, P. Mithun, K. Mathiyarasu "Cryptosystem using Chaotic Shuffling Hill pad Encryption Scheme for Secure Data Transmission." International Journal of Computer Sciences and Engineering 06.04 (2018): 174-178.
APA Citation
APA Style Citation: T. Jaison Vimalraj, P. Mithun, K. Mathiyarasu, (2018). Cryptosystem using Chaotic Shuffling Hill pad Encryption Scheme for Secure Data Transmission. International Journal of Computer Sciences and Engineering, 06(04), 174-178.
BibTex Citation
BibTex Style Citation:
@article{Vimalraj_2018,
author = {T. Jaison Vimalraj, P. Mithun, K. Mathiyarasu},
title = {Cryptosystem using Chaotic Shuffling Hill pad Encryption Scheme for Secure Data Transmission},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2018},
volume = {06},
Issue = {04},
month = {5},
year = {2018},
issn = {2347-2693},
pages = {174-178},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=376},
publisher = {IJCSE, Indore, INDIA},
}
RIS Citation
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=376
TI - Cryptosystem using Chaotic Shuffling Hill pad Encryption Scheme for Secure Data Transmission
T2 - International Journal of Computer Sciences and Engineering
AU - T. Jaison Vimalraj, P. Mithun, K. Mathiyarasu
PY - 2018
DA - 2018/05/31
PB - IJCSE, Indore, INDIA
SP - 174-178
IS - 04
VL - 06
SN - 2347-2693
ER -




Abstract
Maintaining privacy and security of any data, specifically for images that are transmitted through network is a major issue in today’s world. In this paper, a new three level Chaotic Shuffling Hill Pad encryption (CSHP) scheme is proposed. In first level encryption, the input image is subdivided and shuffled using chaotic algorithm. In second level, the shuffled blocks are encrypted using subset Hill algorithm with different product keys. Third level encryption is performed with the basis of Onetime pad encryption algorithm, in order to tighten the security of the image. Finally, the encrypted image is converted to text file, which is the intended cipher format. Product keys are chosen in such a way that they are invertible. The encrypted text file transmitted through insecure channel can be decrypted at the receiver’s end. The proposed method is tested with various standard images and the results are encouraging. The proposed method finds its application in Defence field.
Key-Words / Index Term
Chaotic, Cryptosystem, Encryption, Decryption
References
[1] Bibhudendra Acharya, Saroj Kumar Panigrahy, Sarat Kumar Patra, and Ganapati Panda, “Image Encryption Using Advanced Hill Cipher Algorithm”, ACEEE International Journal on Signal and Image Processing Vol .1, No. 1, pp.37-41, 2010.
[2] J.S. Armand EyebeFouda, J. Yves Effa, Samrat L. Sabat, and Maaruf Ali, “A Fast chaotic block cipher for image encryption”, Commun Nonlinear Sci Numer Simulat 19 pp. 578- 588, 2014.
[3] K. Mani, M. Viswambari “Generation of Key Matrix for Hill Cipher using Magic Rectangle”, Advances in Computational Sciences and Technology ISSN 0973-6107 Vol. 10, No. 5 pp.1081-1090, 2017.
[4] Tang Z, Zhang X, “Secure image encryption without size limitation using Arnold transform and Random strategies”, Journal of Multimedia, Vol 6, No. 2, pp. 202–206, 2011.
[5] Timothy E. Lindquist, Mohamed Diarra, and Bruce R. Millard, “A Java Cryptography Service Provider Implementing One-Time Pad”, 37th Hawaii International Conference on System Sciences, pp. 1-6, 2004.
[6] Yaqeen S. Mezaal, Dalal A. Hammood, Mohammed H. Ali, “OTP Encryption Enhancement Based on Logical Operations”, IEEE ISBN: 978-1-4673-7504-7, pp.109-112, 2016.
[7] Prerna, Urooj, Meenakumari, Jitendra Nathshrivastava, “Image Encryption and Decryption using Modified Hill Cipher Technique”, International Journal of Information & Computation Technology. ISSN 0974-2239 Vol. 4, No. 17 pp. 1895-1901, 2014.
[8] Zhenjun Tang &Xianquan Zhang & Weiwei Lan, “Efficient image encryption with block shuffling and chaotic map” Multimed Tools Appl, New York, 2014.
[9] Zhang G, Liu Q, “A novel image encryption method based on total shuffling scheme” Optics Communication, pp. 2775–2780, 2011.
[10] Zhang Yong, “A Chaotic System Based Image Encryption Scheme with Identical Encryption and Decryption Algorithm” Chinese Journal of Electronics, Vol.26, No.5, Sept. 2017.