Securing Media Information Using Hybrid Transposition Using Fisher Yates Algorithm and RSA Public Key Algorithm Using Pell’s Cubic Equation K. R. Raghunandan, Shirin Nivas Nireshwalya, Sharan Sudhir, M. Shreyank Bhat, and H. M. Tanvi Abstract Information is the source of investment as well as income. Protecting information has become one of the primary objectives of security algorithms. In the field of multimedia, there is scope for extracting sensitive data without any loss of information which implies that there is no trace of an intrusion. Multimedia data must be confidential, and its integrity and identity must be preserved as it encounters authentication, data encryption, data decryption, digital watermarking and other sim- ilar activities. Providing multimedia security ensures content-based security. This paper introduces an enhanced algorithm for the transmission of images between the sender and recipient by addressing the most relevant security aspects of image transformation as well as transmission. Keywords Multimedia security · Image transformation · Public key cryptography · Encryption · Decryption 1 Introduction Multimedia technology has a significant impact on privacy, making data protection important, now more than ever. In this domain, the cryptographic technique has a K. R. Raghunandan (B ) · S. N. Nireshwalya · S. Sudhir · M. S. Bhat · H. M. Tanvi Department of Computer Science and Engineering, N. M. A. M. Institute of Technology, Affiliated to Visvesvaraya Technological University, Nitte, India e-mail: raghunandan@nitte.edu.in S. N. Nireshwalya e-mail: shirinnivas@hotmail.com S. Sudhir e-mail: sharan.sudhir9@gmail.com M. S. Bhat e-mail: bhatshreyank@gmail.com H. M. Tanvi e-mail: tanvihm97@yahoo.com © Springer Nature Singapore Pte Ltd. 2021 N. N. Chiplunkar and T. Fukao (eds.), Advances in Artificial Intelligence and Data Engineering, Advances in Intelligent Systems and Computing 1133, https://doi.org/10.1007/978-981-15-3514-7_73 975