Symmetric Key Image Encryption Scheme with Key Sequences Derived from Random Sequence of Cyclic Elliptic Curve Points over GF(p)

Author(s):  
S Sowmya ◽  
S. V. Sathyanarayana
2019 ◽  
Vol 155 ◽  
pp. 391-402 ◽  
Author(s):  
Umar Hayat ◽  
Naveed Ahmed Azam

Author(s):  
ABDUL RAZZAQUE ◽  
NILESHSINGH V. THAKUR

Image compression scheme proposed by researchers have no consideration of security. Similarly image encryption scheme proposed by the authors have no consideration of image size. In this paper a simultaneous image compression and encryption scheme is discussed. The order of the two processes viz. compression and encryption is EC i.e. image encryption is performed first then the image compression is applied. For image encryption a symmetric key cryptography multiplicative cipher is used. Similarly for compression Discrete Cosine Transform is used. Image Compression is concerned with minimizing the number of bit required to represent an image. The compression can be lossless or lossy. Image Encryption is hiding image from unauthorized access with the help of secret key that key can be private or public.


2012 ◽  
Vol 70 (3) ◽  
pp. 1559-1584 ◽  
Author(s):  
Ahmed A. Abd El-Latif ◽  
Li Li ◽  
Xiamu Niu

2020 ◽  
Vol 79 (37-38) ◽  
pp. 28225-28238 ◽  
Author(s):  
Shabieh Farwa ◽  
Nargis Bibi ◽  
Nazeer Muhammad

Author(s):  
Salma Bendaoud ◽  
Fatima Amounas ◽  
El Hassan El Kinani

Elliptic curve cryptography (ECC) is an effective approach to protect privacy and security of information. Digital Image encryption is an important issue widely used to protect the data and to ensure the security. Several encryption and decryption cryptosystems are available to keep image secure from unauthorized user. Elliptic Curve Cryptography (ECC) has proven to be the best solution for public key encryption. It provides a good level of security with smaller key size. In this paper we attempt to develop an enhanced Image Encryption Scheme based on ECC and PWLCM (Piecewise Linear Chaotic Map). Here, we generate a key image to enhance data security using ECC and PWLCM. From the experiment results and security analysis, we prove that our scheme cannot only achieve good encryption, but also resist the exhaustive, statistical and differential attacks.


Sign in / Sign up

Export Citation Format

Share Document