Affiliation:
1. Department of CSE, SASTRA Deemed To Be University, Kumbakonam, Tamilnadu, India
2. Department of ECE, SASTRA Deemed To Be University, Kumbakonam, Tamilnadu, India
3. Department of IT, AVC College of Engineering, Mayiladuthurai, Tamilnadu, India
Abstract
The billions of bits of information are transferred each second through the internet every day. The information may be text, image, audio or video etc, accordingly, we need some protection mechanism while sharing confidential data. Generally, RSA algorithm is used for encrypting the Secret images. However, the security provided by Elliptic Curve Cryptography (ECC) is higher with lower sized key than the RSA algorithm. So, this article proposes an extended Elliptic Curve encryption approach for encrypting the secret images. In this system, the secret image is partitioned into three color image planes such as Red, Green and Blue. By applying Radix-64 encoding and Mapping table, these planes are converted into elliptic curve points and then these points are encrypted using ECC algorithm. Again, these points are applied to the Radix-64 decoding and the mapping table to get ciphered-image. At last, the key parameters such as a, b, p and Generator point (G) are embedded in the last four pixel positions of the ciphered-image. In order to get the original secret image, the recipient must extract these key parameters from the encrypted image and then apply the remaining processes to the encrypted image in the opposite order. Experimental results tested using MATLAB R2021b and it shows that the NPCR and UACI values are 99.54% and 28.73 % and better quality feature is attained since the entropy value is almost closer to eight. So, the proposed image encryption has robust capacity to fight against the differential attack.
Subject
Artificial Intelligence,General Engineering,Statistics and Probability
Reference35 articles.
1. A method for obtaining digital signatures and public-key cryptosystems;Rivest;Commun ACM,1978
2. Stallings W. , Cryptography and network security, 4/e, India: Pearson Education Ind; 2006.
3. Shih F.Y. , Digital watermarking and steganography: fundamentals and techniques, CRC Press, USA, (2017).
4. Novel quantum image compression and encryption algorithm based on DQWT and 3D hyper-chaotic Henon map;Zhou;Quantum Inf Process,2020
5. New image encryption algorithm using hyperchaotic system and fibonacci Q-matrix;Hosny;Electronics,2021
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Application of IoT technology in cyber security prevention system;Applied Mathematics and Nonlinear Sciences;2024-01-01
2. Model Construction of Digital Audit System for Power Grid Enterprises Driven by Knowledge Atlas;2022 International Conference on Artificial Intelligence of Things and Crowdsensing (AIoTCs);2022-10