Development of an Encrypting System for an Image Viewer based on Hill Cipher Algorithm

Security breaches to personal computing devices, cloud storage accounts, portable media devices are rampant in todays world. Also, Increased intrusions into corporate servers and employee workstations often times lead to the unwarranted exposure of an individual or corporate secret and a breach to...

Full description

Bibliographic Details
Main Authors: Okereke Chinonso, Osemwegie Omoruyi, Kennedy Okokpujie, Samuel John
Format: Article
Language:English
Published: Covenant University 2017-12-01
Series:Covenant Journal of Engineering Technology
Online Access:https://journals.covenantuniversity.edu.ng/index.php/cjet/article/view/707
_version_ 1797340928817496064
author Okereke Chinonso
Osemwegie Omoruyi
Kennedy Okokpujie
Samuel John
author_facet Okereke Chinonso
Osemwegie Omoruyi
Kennedy Okokpujie
Samuel John
author_sort Okereke Chinonso
collection DOAJ
description Security breaches to personal computing devices, cloud storage accounts, portable media devices are rampant in todays world. Also, Increased intrusions into corporate servers and employee workstations often times lead to the unwarranted exposure of an individual or corporate secret and a breach to privacy. Information leaked through such intrusions and breaches especially images are often times in the public terrain without a users or corporate consent. This breaches are due to a variety of reasons including internal saboteurs, theft, social engineering or a computer security attack. At times other crimes like fraud, blackmail, kidnapping and assassinations may follow. This study presents the development of an Encryption system in an Image Viewer Application. Encrypting Images before storage or transfer to any platform helps limit risk when images are stolen or leaked. The image viewer was designed in C#.NET using the Hill Cipher algorithm for Image Encryption and Decryption. The results for images are shown to be good for two image samples. However, low key image samples produce a better result after Encryption. In general, Encryption of user generated images is a vital security strategy and a good option to have to prevent against a growing number of threats.
first_indexed 2024-03-08T10:10:31Z
format Article
id doaj.art-2b88d5ef212641e5977f25876842dc4f
institution Directory Open Access Journal
issn 2682-5317
2682-5325
language English
last_indexed 2024-03-08T10:10:31Z
publishDate 2017-12-01
publisher Covenant University
record_format Article
series Covenant Journal of Engineering Technology
spelling doaj.art-2b88d5ef212641e5977f25876842dc4f2024-01-29T08:28:50ZengCovenant UniversityCovenant Journal of Engineering Technology2682-53172682-53252017-12-0112Development of an Encrypting System for an Image Viewer based on Hill Cipher AlgorithmOkereke ChinonsoOsemwegie OmoruyiKennedy OkokpujieSamuel John Security breaches to personal computing devices, cloud storage accounts, portable media devices are rampant in todays world. Also, Increased intrusions into corporate servers and employee workstations often times lead to the unwarranted exposure of an individual or corporate secret and a breach to privacy. Information leaked through such intrusions and breaches especially images are often times in the public terrain without a users or corporate consent. This breaches are due to a variety of reasons including internal saboteurs, theft, social engineering or a computer security attack. At times other crimes like fraud, blackmail, kidnapping and assassinations may follow. This study presents the development of an Encryption system in an Image Viewer Application. Encrypting Images before storage or transfer to any platform helps limit risk when images are stolen or leaked. The image viewer was designed in C#.NET using the Hill Cipher algorithm for Image Encryption and Decryption. The results for images are shown to be good for two image samples. However, low key image samples produce a better result after Encryption. In general, Encryption of user generated images is a vital security strategy and a good option to have to prevent against a growing number of threats. https://journals.covenantuniversity.edu.ng/index.php/cjet/article/view/707
spellingShingle Okereke Chinonso
Osemwegie Omoruyi
Kennedy Okokpujie
Samuel John
Development of an Encrypting System for an Image Viewer based on Hill Cipher Algorithm
Covenant Journal of Engineering Technology
title Development of an Encrypting System for an Image Viewer based on Hill Cipher Algorithm
title_full Development of an Encrypting System for an Image Viewer based on Hill Cipher Algorithm
title_fullStr Development of an Encrypting System for an Image Viewer based on Hill Cipher Algorithm
title_full_unstemmed Development of an Encrypting System for an Image Viewer based on Hill Cipher Algorithm
title_short Development of an Encrypting System for an Image Viewer based on Hill Cipher Algorithm
title_sort development of an encrypting system for an image viewer based on hill cipher algorithm
url https://journals.covenantuniversity.edu.ng/index.php/cjet/article/view/707
work_keys_str_mv AT okerekechinonso developmentofanencryptingsystemforanimageviewerbasedonhillcipheralgorithm
AT osemwegieomoruyi developmentofanencryptingsystemforanimageviewerbasedonhillcipheralgorithm
AT kennedyokokpujie developmentofanencryptingsystemforanimageviewerbasedonhillcipheralgorithm
AT samueljohn developmentofanencryptingsystemforanimageviewerbasedonhillcipheralgorithm