It appears you don't have support to open PDFs in this web browser. To view this file, Open with your PDF reader
Abstract
The development of modern technology in recent years, makes the data security very big issue. To secure our data from unauthorized person, encryption is used before transmission. Various sensitive information is using encryption such as: e-mail messages, banking transactions, credit information and military operations. The encrypted data can be in form of text, image, voice, and video. In this paper, a proposed Hill algorithm with chaos system is used to encrypt colour RGB (Red, Green and Blue) image. The key of Hill algorithm is a square matrix. The selection of matrix key numbers is very important. Therefore, chaos system is used to generate sequences of numbers for Hill key matrix. These sequences have a property of randomness that make it very difficult for guessing. Finally, the proposed system is simulated using MATLAB, and a test image is encrypted and decrypted using proposed system successfully.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details
1 College of Engineering, Islamic university, Najaf, Iraq; Centre of Excellence Advanced Computing (ADVCOMP), Universiti Malaysia Perlis (UniMAP), 02600 Arau, Perlis, Malaysia
2 Centre of Excellence Advanced Computing (ADVCOMP), Universiti Malaysia Perlis (UniMAP), 02600 Arau, Perlis, Malaysia; Faculty of Electronic Engineering Technology, Universiti Malaysia Perlis (UniMAP), 02600 Arau, Perlis, Malaysia
3 College of Engineering, Islamic university, Najaf, Iraq; Electrical Engineering Technical College, Middle Technical University (MTU), Al Doura 10022, Baghdad, Iraq
4 College of Engineering, Islamic university, Najaf, Iraq