{"id":"https://openalex.org/W2067562740","doi":"https://doi.org/10.1145/1947940.1948066","title":"Encryption and decryption of informative image by key image using modified Hill cipher technique based on non-invertible matrices","display_name":"Encryption and decryption of informative image by key image using modified Hill cipher technique based on non-invertible matrices","publication_year":2011,"publication_date":"2011-01-01","ids":{"openalex":"https://openalex.org/W2067562740","doi":"https://doi.org/10.1145/1947940.1948066","mag":"2067562740"},"language":"en","primary_location":{"id":"doi:10.1145/1947940.1948066","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1947940.1948066","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2011 International Conference on Communication, Computing &amp; Security - ICCCS '11","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089080635","display_name":"Bibhudendra Acharya","orcid":"https://orcid.org/0000-0001-7233-7591"},"institutions":[{"id":"https://openalex.org/I38335241","display_name":"National Institute of Technology Raipur","ror":"https://ror.org/02y553197","country_code":"IN","type":"education","lineage":["https://openalex.org/I38335241"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Bibhudendra Acharya","raw_affiliation_strings":["National Institute of Technology, Raipur, Chhattisgarh, India","National Institute of Technology Raipur, Chhattisgarh, India"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology, Raipur, Chhattisgarh, India","institution_ids":["https://openalex.org/I38335241"]},{"raw_affiliation_string":"National Institute of Technology Raipur, Chhattisgarh, India","institution_ids":["https://openalex.org/I38335241"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080188313","display_name":"Nikhil A. Thomas","orcid":"https://orcid.org/0000-0003-3037-425X"},"institutions":[{"id":"https://openalex.org/I38335241","display_name":"National Institute of Technology Raipur","ror":"https://ror.org/02y553197","country_code":"IN","type":"education","lineage":["https://openalex.org/I38335241"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Nikhil Thomas","raw_affiliation_strings":["National Institute of Technology, Raipur, Chhattisgarh, India","National Institute of Technology Raipur, Chhattisgarh, India"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology, Raipur, Chhattisgarh, India","institution_ids":["https://openalex.org/I38335241"]},{"raw_affiliation_string":"National Institute of Technology Raipur, Chhattisgarh, India","institution_ids":["https://openalex.org/I38335241"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047371025","display_name":"D. R. Kavin Arasu","orcid":null},"institutions":[{"id":"https://openalex.org/I38335241","display_name":"National Institute of Technology Raipur","ror":"https://ror.org/02y553197","country_code":"IN","type":"education","lineage":["https://openalex.org/I38335241"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"D. R. Kavin Arasu","raw_affiliation_strings":["National Institute of Technology, Raipur, Chhattisgarh, India","National Institute of Technology Raipur, Chhattisgarh, India"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology, Raipur, Chhattisgarh, India","institution_ids":["https://openalex.org/I38335241"]},{"raw_affiliation_string":"National Institute of Technology Raipur, Chhattisgarh, India","institution_ids":["https://openalex.org/I38335241"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030962761","display_name":"Nishi Prasad","orcid":null},"institutions":[{"id":"https://openalex.org/I38335241","display_name":"National Institute of Technology Raipur","ror":"https://ror.org/02y553197","country_code":"IN","type":"education","lineage":["https://openalex.org/I38335241"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"N Vishnu Prasad","raw_affiliation_strings":["National Institute of Technology, Raipur, Chhattisgarh, India","National Institute of Technology Raipur, Chhattisgarh, India"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology, Raipur, Chhattisgarh, India","institution_ids":["https://openalex.org/I38335241"]},{"raw_affiliation_string":"National Institute of Technology Raipur, Chhattisgarh, India","institution_ids":["https://openalex.org/I38335241"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5089080635"],"corresponding_institution_ids":["https://openalex.org/I38335241"],"apc_list":null,"apc_paid":null,"fwci":0.2576,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.57991531,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"606","last_page":"606"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9919000267982483,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13234","display_name":"advanced mathematical theories","score":0.9779000282287598,"subfield":{"id":"https://openalex.org/subfields/2610","display_name":"Mathematical Physics"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/transposition-cipher","display_name":"Transposition cipher","score":0.7447023987770081},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7120910286903381},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.7032697200775146},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.6963744759559631},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6380354762077332},{"id":"https://openalex.org/keywords/running-key-cipher","display_name":"Running key cipher","score":0.5536360740661621},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.551206648349762},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5356611013412476},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.5290754437446594},{"id":"https://openalex.org/keywords/stream-cipher","display_name":"Stream cipher","score":0.4940212368965149},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4867803752422333},{"id":"https://openalex.org/keywords/triple-des","display_name":"Triple DES","score":0.47384029626846313},{"id":"https://openalex.org/keywords/block-cipher-mode-of-operation","display_name":"Block cipher mode of operation","score":0.4380798637866974},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3587474226951599}],"concepts":[{"id":"https://openalex.org/C71247151","wikidata":"https://www.wikidata.org/wiki/Q840498","display_name":"Transposition cipher","level":5,"score":0.7447023987770081},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7120910286903381},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.7032697200775146},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.6963744759559631},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6380354762077332},{"id":"https://openalex.org/C64119674","wikidata":"https://www.wikidata.org/wiki/Q7380031","display_name":"Running key cipher","level":4,"score":0.5536360740661621},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.551206648349762},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5356611013412476},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.5290754437446594},{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.4940212368965149},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4867803752422333},{"id":"https://openalex.org/C90897222","wikidata":"https://www.wikidata.org/wiki/Q134983","display_name":"Triple DES","level":4,"score":0.47384029626846313},{"id":"https://openalex.org/C60448319","wikidata":"https://www.wikidata.org/wiki/Q154021","display_name":"Block cipher mode of operation","level":2,"score":0.4380798637866974},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3587474226951599}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1947940.1948066","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1947940.1948066","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2011 International Conference on Communication, Computing &amp; Security - ICCCS '11","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5799999833106995}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1614535124","https://openalex.org/W1948596969","https://openalex.org/W2138348725","https://openalex.org/W2148208804","https://openalex.org/W2150010995","https://openalex.org/W2155490601","https://openalex.org/W2159270886","https://openalex.org/W2281564060","https://openalex.org/W2327139475","https://openalex.org/W2331322161","https://openalex.org/W2983170364","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2551608712","https://openalex.org/W2615464719","https://openalex.org/W2150486630","https://openalex.org/W2132652565","https://openalex.org/W2159145942","https://openalex.org/W3022854131","https://openalex.org/W2187592226","https://openalex.org/W1557906236","https://openalex.org/W2949773584","https://openalex.org/W1883830449"],"abstract_inverted_index":{"Data":[0],"security":[1],"is":[2,27,59],"the":[3,36,39,44,50,85,95,111,121,146,194,198,204,209,215,220,224],"science":[4],"and":[5,14,63,100,203],"study":[6],"of":[7,9,25,84,149,162],"methods":[8],"protecting":[10],"data":[11,78],"in":[12,77,110,140,153],"computer":[13],"communication":[15],"system":[16],"from":[17],"disclosure":[18],"to":[19,28,32,117,126,186,213,218],"unauthorized":[20],"users.":[21],"The":[22],"main":[23],"aim":[24],"encoding":[26],"make":[29],"it":[30,179],"worthless":[31],"everyone":[33],"except":[34],"for":[35],"party":[37,47],"with":[38,43],"deciphering":[40],"key.":[41],"Only":[42],"key,":[45],"a":[46,54,60,64,151,184],"can":[48,180],"decode":[49],"cipher":[51,58,67,73,81,113,124,132,201],"text":[52,154],"into":[53],"meaningful":[55],"message.":[56],"Hill":[57,72,80,112,123,131,200],"symmetric":[61],"cryptosystem":[62],"polygraph":[65],"substitution":[66],"based":[68],"on":[69],"matrix":[70,87],"multiplication.":[71],"has":[74,137,155],"several":[75],"advantages":[76],"encryption.":[79],"requires":[82],"inverse":[83,99],"key":[86,108,205,211],"while":[88],"decryption.":[89],"In":[90,143,189],"fact":[91],"that":[92,133],"not":[93,104],"all":[94],"matrices":[96,109],"have":[97],"an":[98,173],"therefore":[101],"they":[102],"will":[103],"be":[105,181],"eligible":[106],"as":[107,172,183],"scheme.":[114],"Furthermore,":[115],"due":[116],"its":[118],"linear":[119],"nature,":[120],"basic":[122],"succumbs":[125],"known-plaintext":[127],"attacks.":[128],"A":[129],"modified":[130,199],"removes":[134],"these":[135],"drawbacks":[136],"been":[138,156],"used":[139,182],"this":[141,190],"paper.":[142],"today's":[144],"world,":[145],"usual":[147],"way":[148],"writing":[150],"message":[152],"replaced":[157],"by":[158],"more":[159],"efficient":[160],"ways":[161],"conveying":[163],"messages":[164],"through":[165],"images,":[166],"audio,":[167],"video":[168],"etc.":[169],"As":[170],"long":[171],"electronic":[174],"file":[175],"contains":[176,223],"irrelevant":[177],"information,":[178],"cover":[185],"hide":[187],"messages.":[188],"paper,":[191],"we":[192],"encrypt":[193],"informative":[195],"image":[196,212,217,221],"using":[197],"technique":[202],"image.":[206],"Then":[207],"use":[208],"same":[210],"decrypt":[214],"encrypted":[216],"obtain":[219],"which":[222],"information.":[225]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
