WhatsApp at (+91-9098855509) Support
ijprems Logo
  • Home
  • About Us
    • Editor Vision
    • Editorial Board
    • Privacy Policy
    • Terms & Conditions
    • Publication Ethics
    • Peer Review Process
  • For Authors
    • Publication Process(up)
    • Submit Paper Online
    • Pay Publication Fee
    • Track Paper
    • Copyright Form
    • Paper Format
    • Topics
  • Fees
  • Indexing
  • Conference
  • Contact
  • Archieves
    • Current Issue
    • Past Issue
  • More
    • FAQs
    • Join As Reviewer
  • Submit Paper

Recent Papers

Dedicated to advancing knowledge through rigorous research and scholarly publication

  1. Home
  2. Recent Papers

Enhancing Security and Efficiency in Image Encryption with ECC and Hill Cipher Techniques

B. Sai Gopinadh Sai Gopinadh

Download Paper

Paper Contents

Abstract

In todays era of digital communication, the secure transmission of images is a significant concern due to vulnerabilities in existing encryption techniques. The Hill Cipher, a symmetric encryption algorithm, offers computational efficiency but is limited by the need to share private keys over unsecured channels, making it susceptible to attacks. Elliptic Curve Cryptography (ECC), on the other hand, is an asymmetric encryption technique known for its high security and computational efficiency. This paper introduces a novel hybrid image encryption technique that combines ECC and the Hill Cipher to enhance security and efficiency. The proposed system transforms the Hill Cipher into an asymmetric encryption method using ECC-generated keys, thus eliminating the need to exchange private keys. A self-invertible key matrix is used to streamline the decryption process, reducing computational overhead. The hybrid techniques performance is evaluated using metrics such as Entropy, Peak Signal-to-Noise Ratio (PSNR), and Unified Average Changing Intensity (UACI). Experimental results reveal that the proposed system achieves robust encryption with high security and computational efficiency, making it suitable for real-time multimedia and embedded system applications. the demand for effective image encryption techniques has surged, driven by the increasing reliance on the internet and various communication platforms for sharing sensitive visual content. The transmission of important images over unsecured channels poses significant risks, including potential attacks and unauthorized access. To mitigate these threats, encryption methods have emerged as essential tools for safeguarding images against malicious activities.

Copyright

Copyright © 2024 B. Sai Gopinadh. This is an open access article distributed under the Creative Commons Attribution License.

Paper Details
Paper ID: IJPREMS41200041032
ISSN: 2321-9653
Publisher: ijprems
Page Navigation
  • Abstract
  • Copyright
About IJPREMS

The International Journal of Progressive Research in Engineering, Management and Science is a peer-reviewed, open access journal that publishes original research articles in engineering, management, and applied sciences.

Quick Links
  • Home
  • About Our Journal
  • Editorial Board
  • Publication Ethics
Contact Us
  • IJPREMS - International Journal of Progressive Research in Engineering Management and Science, motinagar, ujjain, Madhya Pradesh., india
  • Chat with us on WhatsApp: +91 909-885-5509
  • Email us: editor@ijprems.com
  • Sun-Sat: 9:00 AM - 9:00 PM

© 2025 International Journal of Progressive Research in Engineering, Management and Science. All Rights Reserved.

Terms & Conditions | Privacy Policy | Publication Ethics | Peer Review Process | Contact Us