This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
A Super Encryption Approach for Enhancing Digital Security using Column Transposition - Hill Cipher for 3D Image Protection
Corresponding Author(s) : Lekso Budi Handoko
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control,
Vol. 9, No. 3, August 2024
Abstract
Image encryption is an indispensable technique in the realm of information security, serving as a pivotal mechanism to safeguard visual data against unauthorized access and potential breaches. This study scrutinizes the effectiveness of merging columnar transposition with the Hill Cipher methodologies, unveiling specific metrics from a curated set of sample images. Notably, employing column transposition with the key "JAYA" and the Hill Cipher with the key "UDINUSSMG," the encrypted images underwent rigorous evaluation. 'Lena.png' demonstrated an MSE of 513.32 with a PSNR of 7.89 dB, while 'Peppers.png' and 'Baboon.png' recorded MSE values of 466.67 and 423.92, respectively, with corresponding PSNR figures of 7.12 dB and 7.31 dB. Across all samples, a consistent BER of 50.00% indicated uniform error propagation, while entropy values settled uniformly at 7.9999, highlighting consistent data complexity. While the findings underscore a consistent error rate and complexity, there's a compelling need for further refinement to enhance image quality and security. Moreover, the study proposes future research avenues exploring a three-layer super encryption paradigm, amalgamating columnar transposition, Hill Cipher, and other robust algorithms. This approach aims to fortify encryption methodologies against evolving threats and challenges in data protection, offering heightened resilience and efficacy in safeguarding sensitive information.
Keywords
Download Citation
Endnote/Zotero/Mendeley (RIS)BibTeX
- E. A. Sofyan, C. A. Sari, H. Rachmawanto, and R. D. Cahyo, “High-Quality Evaluation for Invisible Watermarking Based on Discrete Cosine Transform (DCT) and Singular Value Decomposition (SVD),” Advance Sustainable Science, Engineering and Technology (ASSET), vol. 6, no. 1, 2024. https://doi.org/10.26877/asset.v6i1.17186
- V. M. Putrie, C. A. Sari, D. R. I. M. Setiadi, and E. H. Rachmawanto, “Super Encryption using Transposition-Hill Cipher for Digital Color Image,” in 2018 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI), IEEE, Nov. 2018, pp. 152–157. https://doi.org/10.1109/ISRITI.2018.8864361
- C. A. Sari, M. H. Dzaki, E. H. Rachmawanto, R. R. Ali, and M. Doheir, “High PSNR Using Fibonacci Sequences in Classical Cryptography and Steganography Using LSB,” International Journal of Intelligent Engineering and Systems, vol. 16, no. 4, pp. 568–580, 2023. https://doi.org/10.22266/ijies2023.0831.46
- S. T. Ahmed, D. A. Hammood, R. F. Chisab, A. Al-Naji, and J. Chahl, “Medical Image Encryption: A Comprehensive Review,” Computers, vol. 12, no. 8. Multidisciplinary Digital Publishing Institute (MDPI), Aug. 01, 2023. https://doi.org/10.3390/computers12080160
- M. Abu-Faraj et al., “Protecting Digital Images Using Keys Enhanced by 2D Chaotic Logistic Maps,” Cryptography, vol. 7, no. 2, 2023. https://doi.org/10.3390/cryptography7020020
- S. T. Kamal, K. M. Hosny, T. M. Elgindy, M. M. Darwish, and M. M. Fouda, “A new image encryption algorithm for grey and color medical images,” IEEE Access, vol. 9, pp. 37855–37865, 2021. https://doi.org/10.1109/ACCESS.2021.3063237
- I. Prayogo Pujiono, E. Hari Rachmawanto, U. K. Abdurrahman Wahid, U. Dian Nuswantoro, and D. Anggriawan Nugroho, “The Implementation of Improved Advanced Encryption Standard and Least Significant Bit for Securing Messages in Images,” 2023.
- V. Kakkad, M. Patel, and M. Shah, “Biometric authentication and image encryption for image security in cloud framework,” Multiscale and Multidisciplinary Modeling, Experiments and Design, vol. 2, no. 4, pp. 233–248, Dec. 2019. https://doi.org/10.1007/s41939-019-00049-y
- M. Gupta, V. P. Singh, K. K. Gupta, and P. K. Shukla, “An efficient image encryption technique based on two-level security for internet of things,” Multimed Tools Appl, vol. 82, no. 4, pp. 5091–5111, Feb. 2023. https://doi.org/10.1007/s11042-022-12169-8
- E. J. G, H. M. A, and F. H. M. S, “Enhanced Security: Implementation of Hybrid Image Steganography Technique using Low-Contrast LSB and AES-CBC Cryptography,” International Journal of Advanced Computer Science and Applications, vol. 13, no. 8, p. 2022, 2022. https://dx.doi.org/10.14569/IJACSA.2022.01308104
- M. S. Abdalzaher, M. M. Fouda, and M. I. Ibrahem, “Data Privacy Preservation and Security in Smart Metering Systems,” Energies, vol. 15, no. 19. MDPI, Oct. 01, 2022. https://doi.org/10.3390/en15197419
- P. N. Lone, D. Singh, V. Stoffová, D. C. Mishra, U. H. Mir, and N. Kumar, “Cryptanalysis and Improved Image Encryption Scheme Using Elliptic Curve and Affine Hill Cipher,” Mathematics, vol. 10, no. 20, Oct. 2022. https://doi.org/10.3390/math10203878
- M. Derese Gietaneh and T. Birara Akele, “Enhancing the Hill Cipher Algorithm and Employing a One Time Pad Key Generation Technique,” Abyssinia Journal of Engineering and Computing Abyss. J. Engg & Comput, vol. 3, no. 1, pp. 1–10, 2023.
- H. N. Khalid, A. Hafizah, and M. Aman, “Digital Image Steganography in Spatial Domain: A Critical Study,” 2020.
- S. Gupta, K. Saluja, V. Solanki, K. Kaur, P. Singla, and M. Shahid, “Efficient methods for digital image watermarking and information embedding,” Measurement: Sensors, vol. 24, p. 100520, Dec. 2022. https://doi.org/10.1016/j.measen.2022.100521
- M. Fadlan, Haryansyah, and Rosmini, “Three Layer Encryption Protocol: an Approach of Super Encryption Algorithm,” in 2021 3rd International Conference on Cybernetics and Intelligent System (ICORIS), IEEE, Oct. 2021, pp. 1–5. https://doi.org/10.1109/ICORIS52787.2021.9649574
- M. A. Budiman, Amalia, and N. I. Chayanie, “An Implementation of RC4+ Algorithm and Zig-zag Algorithm in a Super Encryption Scheme for Text Security,” in Journal of Physics: Conference Series, Institute of Physics Publishing, Mar. 2018. https://doi.org/10.1088/1742-6596/978/1/012086
- C. Umam, L. B. Handoko, C. A. Sari, E. H. Rachmawanto, and L. A. R. Hakim, “Kombinasi Vigenere dan Autokey Cipher dalam Proses Proteksi SMS Berbasis Android,” Prosiding Sains Nasional dan Teknologi, vol. 12, no. 1, p. 492, Nov. 2022. http://dx.doi.org/10.36499/psnst.v12i1.7108
- U. Sara, M. Akter, and M. S. Uddin, “Image Quality Assessment through FSIM, SSIM, MSE and PSNR—A Comparative Study,” Journal of Computer and Communications, vol. 07, no. 03, pp. 8–18, 2019. https://doi.org/10.4236/jcc.2019.73002
- D. E. Mfungo and X. Fu, “Fractal-Based Hybrid Cryptosystem: Enhancing Image Encryption with RSA, Homomorphic Encryption, and Chaotic Maps,” Entropy, vol. 25, no. 11, p. 1478, Oct. 2023. https://doi.org/10.3390/e25111478
- B. Zolfaghari and T. Koshiba, “Chaotic Image Encryption: State-of-the-Art, Ecosystem, and Future Roadmap,” Applied System Innovation, vol. 5, no. 3. MDPI, Jun. 01, 2022. https://doi.org/10.3390/asi5030057
- M. Kaur, S. Singh, and M. Kaur, “Computational Image Encryption Techniques: A Comprehensive Review,” Mathematical Problems in Engineering, vol. 2021. Hindawi Limited, 2021. https://doi.org/10.1155/2021/5012496
- J. Gao, Y. Wang, Z. Song, and S. Wang, “Quantum Image Encryption Based on Quantum DNA Codec and Pixel-Level Scrambling,” Entropy, vol. 25, no. 6, Jun. 2023. https://doi.org/10.3390/e25060865
- A. Susanto et al., “Triple layer image security using bit-shift, chaos, and stream encryption,” Bulletin of Electrical Engineering and Informatics, vol. 9, no. 3, pp. 980–987, Jun. 2020. https://doi.org/10.11591/eei.v9i3.2001
- A. Arab, M. J. Rostami, and B. Ghavami, “An image encryption method based on chaos system and AES algorithm,” Journal of Supercomputing, vol. 75, no. 10, pp. 6663–6682, Oct. 2019. https://doi.org/10.1007/s11227-019-02878-7
References
E. A. Sofyan, C. A. Sari, H. Rachmawanto, and R. D. Cahyo, “High-Quality Evaluation for Invisible Watermarking Based on Discrete Cosine Transform (DCT) and Singular Value Decomposition (SVD),” Advance Sustainable Science, Engineering and Technology (ASSET), vol. 6, no. 1, 2024. https://doi.org/10.26877/asset.v6i1.17186
V. M. Putrie, C. A. Sari, D. R. I. M. Setiadi, and E. H. Rachmawanto, “Super Encryption using Transposition-Hill Cipher for Digital Color Image,” in 2018 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI), IEEE, Nov. 2018, pp. 152–157. https://doi.org/10.1109/ISRITI.2018.8864361
C. A. Sari, M. H. Dzaki, E. H. Rachmawanto, R. R. Ali, and M. Doheir, “High PSNR Using Fibonacci Sequences in Classical Cryptography and Steganography Using LSB,” International Journal of Intelligent Engineering and Systems, vol. 16, no. 4, pp. 568–580, 2023. https://doi.org/10.22266/ijies2023.0831.46
S. T. Ahmed, D. A. Hammood, R. F. Chisab, A. Al-Naji, and J. Chahl, “Medical Image Encryption: A Comprehensive Review,” Computers, vol. 12, no. 8. Multidisciplinary Digital Publishing Institute (MDPI), Aug. 01, 2023. https://doi.org/10.3390/computers12080160
M. Abu-Faraj et al., “Protecting Digital Images Using Keys Enhanced by 2D Chaotic Logistic Maps,” Cryptography, vol. 7, no. 2, 2023. https://doi.org/10.3390/cryptography7020020
S. T. Kamal, K. M. Hosny, T. M. Elgindy, M. M. Darwish, and M. M. Fouda, “A new image encryption algorithm for grey and color medical images,” IEEE Access, vol. 9, pp. 37855–37865, 2021. https://doi.org/10.1109/ACCESS.2021.3063237
I. Prayogo Pujiono, E. Hari Rachmawanto, U. K. Abdurrahman Wahid, U. Dian Nuswantoro, and D. Anggriawan Nugroho, “The Implementation of Improved Advanced Encryption Standard and Least Significant Bit for Securing Messages in Images,” 2023.
V. Kakkad, M. Patel, and M. Shah, “Biometric authentication and image encryption for image security in cloud framework,” Multiscale and Multidisciplinary Modeling, Experiments and Design, vol. 2, no. 4, pp. 233–248, Dec. 2019. https://doi.org/10.1007/s41939-019-00049-y
M. Gupta, V. P. Singh, K. K. Gupta, and P. K. Shukla, “An efficient image encryption technique based on two-level security for internet of things,” Multimed Tools Appl, vol. 82, no. 4, pp. 5091–5111, Feb. 2023. https://doi.org/10.1007/s11042-022-12169-8
E. J. G, H. M. A, and F. H. M. S, “Enhanced Security: Implementation of Hybrid Image Steganography Technique using Low-Contrast LSB and AES-CBC Cryptography,” International Journal of Advanced Computer Science and Applications, vol. 13, no. 8, p. 2022, 2022. https://dx.doi.org/10.14569/IJACSA.2022.01308104
M. S. Abdalzaher, M. M. Fouda, and M. I. Ibrahem, “Data Privacy Preservation and Security in Smart Metering Systems,” Energies, vol. 15, no. 19. MDPI, Oct. 01, 2022. https://doi.org/10.3390/en15197419
P. N. Lone, D. Singh, V. Stoffová, D. C. Mishra, U. H. Mir, and N. Kumar, “Cryptanalysis and Improved Image Encryption Scheme Using Elliptic Curve and Affine Hill Cipher,” Mathematics, vol. 10, no. 20, Oct. 2022. https://doi.org/10.3390/math10203878
M. Derese Gietaneh and T. Birara Akele, “Enhancing the Hill Cipher Algorithm and Employing a One Time Pad Key Generation Technique,” Abyssinia Journal of Engineering and Computing Abyss. J. Engg & Comput, vol. 3, no. 1, pp. 1–10, 2023.
H. N. Khalid, A. Hafizah, and M. Aman, “Digital Image Steganography in Spatial Domain: A Critical Study,” 2020.
S. Gupta, K. Saluja, V. Solanki, K. Kaur, P. Singla, and M. Shahid, “Efficient methods for digital image watermarking and information embedding,” Measurement: Sensors, vol. 24, p. 100520, Dec. 2022. https://doi.org/10.1016/j.measen.2022.100521
M. Fadlan, Haryansyah, and Rosmini, “Three Layer Encryption Protocol: an Approach of Super Encryption Algorithm,” in 2021 3rd International Conference on Cybernetics and Intelligent System (ICORIS), IEEE, Oct. 2021, pp. 1–5. https://doi.org/10.1109/ICORIS52787.2021.9649574
M. A. Budiman, Amalia, and N. I. Chayanie, “An Implementation of RC4+ Algorithm and Zig-zag Algorithm in a Super Encryption Scheme for Text Security,” in Journal of Physics: Conference Series, Institute of Physics Publishing, Mar. 2018. https://doi.org/10.1088/1742-6596/978/1/012086
C. Umam, L. B. Handoko, C. A. Sari, E. H. Rachmawanto, and L. A. R. Hakim, “Kombinasi Vigenere dan Autokey Cipher dalam Proses Proteksi SMS Berbasis Android,” Prosiding Sains Nasional dan Teknologi, vol. 12, no. 1, p. 492, Nov. 2022. http://dx.doi.org/10.36499/psnst.v12i1.7108
U. Sara, M. Akter, and M. S. Uddin, “Image Quality Assessment through FSIM, SSIM, MSE and PSNR—A Comparative Study,” Journal of Computer and Communications, vol. 07, no. 03, pp. 8–18, 2019. https://doi.org/10.4236/jcc.2019.73002
D. E. Mfungo and X. Fu, “Fractal-Based Hybrid Cryptosystem: Enhancing Image Encryption with RSA, Homomorphic Encryption, and Chaotic Maps,” Entropy, vol. 25, no. 11, p. 1478, Oct. 2023. https://doi.org/10.3390/e25111478
B. Zolfaghari and T. Koshiba, “Chaotic Image Encryption: State-of-the-Art, Ecosystem, and Future Roadmap,” Applied System Innovation, vol. 5, no. 3. MDPI, Jun. 01, 2022. https://doi.org/10.3390/asi5030057
M. Kaur, S. Singh, and M. Kaur, “Computational Image Encryption Techniques: A Comprehensive Review,” Mathematical Problems in Engineering, vol. 2021. Hindawi Limited, 2021. https://doi.org/10.1155/2021/5012496
J. Gao, Y. Wang, Z. Song, and S. Wang, “Quantum Image Encryption Based on Quantum DNA Codec and Pixel-Level Scrambling,” Entropy, vol. 25, no. 6, Jun. 2023. https://doi.org/10.3390/e25060865
A. Susanto et al., “Triple layer image security using bit-shift, chaos, and stream encryption,” Bulletin of Electrical Engineering and Informatics, vol. 9, no. 3, pp. 980–987, Jun. 2020. https://doi.org/10.11591/eei.v9i3.2001
A. Arab, M. J. Rostami, and B. Ghavami, “An image encryption method based on chaos system and AES algorithm,” Journal of Supercomputing, vol. 75, no. 10, pp. 6663–6682, Oct. 2019. https://doi.org/10.1007/s11227-019-02878-7