Journal of System and Computer Engineering
Vol 6 No 1 (2025): JSCE: January 2025

Hill Cipher-Based Visual Cryptography for Copyright Protection of Images Using Flexible Matrix Keys

Mafula, Veradella Yuelisa (Unknown)
Fauzan, Abd. Charis (Unknown)
Prabowo, Tito (Unknown)
Ramadhan, Muhammad Rizky (Unknown)



Article Info

Publish Date
23 Jan 2025

Abstract

The widespread distribution of digital images on the internet has diminished the copyright protection associated with them. In some cases, copyrighted and economically valuable digital images should not be modified or distributed without permission, as altering the original image can harm its owner. This violation is common, but many internet users are unaware of it. The goal of this research is to protect intellectual property rights of digital images using visual cryptography based on the Hill Cipher algorithm with matrix key flexibility. Hill Cipher is chosen for its ability to encrypt data in blocks, making it more secure than classical cryptographic algorithms that encrypt data individually. Visual cryptography is used to secure digital images through encryption and decryption. Encryption scrambles the image, while decryption restores it. The research method involves collecting digital image datasets, preprocessing, Hill Cipher encryption, and decryption. Key flexibility includes matrix keys of 2x2, 3x3, and 4x4 to enhance security. This research has demonstrated the effectiveness of the Hill Cipher algorithm in protecting digital images through encryption and decryption processes with flexible matrix keys of size 2x2 and 3x3. The results of the experiments, including encryption and decryption using both matrix sizes, have been thoroughly analyzed with respect to various cryptographic metrics: histogram analysis, energy, entropy, and running time.

Copyrights © 2025






Journal Info

Abbrev

JSCE

Publisher

Subject

Computer Science & IT Decision Sciences, Operations Research & Management

Description

Programming Languages Algorithms and Theory Computer Architecture and Systems Artificial Intelligence Computer Vision Machine Learning Systems Analysis Data Communications Cloud Computing Object Oriented Systems Analysis and Design Computer and Network Security Data ...