scholarly journals Selective Image Encryption Based On Chaotic Maps And Elliptic Curve Cryptography

Author(s):  
Ali Soleymani ◽  
Md Jan Nordin

Abstract The rapid evolution of imaging and communication technologies has transformed images into a widespread data type. Different types of data, such as medical information, official correspondence or governmental and military documents saved and transmitted in the form of images over public networks. Cryptography is a solution to protect confidential images by encrypting before transmission over unsecure channels. Most of the current image encryption methods based on symmetric cryptosystems, which the encryption and the decryption keys are the same and will be shared. However, asymmetric cryptosystems are more useful and secure because of the decryption key kept secret. This paper will focus on asymmetric image encryption algorithms to improve and enhance the security of transmission. Elliptic Curve Cryptography (ECC) is a new public key cryptosystem and provides equivalent security with shorter key length, low mathematical complexity and more computationally efficient rather than RSA. Selective encryption is a solution to decrease the consumed time for asymmetric cryptosystems, which reduce the encryption regions as small as possible. Hence, a hybrid cryptosystem is proposed based on the combination of ECC and chaotic maps that detects the face(s) in an image and encrypt the selected regions. This scheme will encrypt around five percent of the whole image and only confidential regions rather than whole image. The results of security analysis demonstrate the strength of the proposed cryptosystem against statistical, brute force and differential attacks. The evaluated running time for both encryption and decryption processes guarantee that the cryptosystem can work effectively in real-time applications.

IEEE Access ◽  
2021 ◽  
pp. 1-1
Author(s):  
Priyansi Parida ◽  
Chittaranjan Pradhan ◽  
Xiao-zhi Gao ◽  
Diptendu Sinha Roy ◽  
Rabindra Kumar Barik

Author(s):  
Salma Bendaoud ◽  
Fatima Amounas ◽  
El Hassan El Kinani

Elliptic curve cryptography (ECC) is an effective approach to protect privacy and security of information. Digital Image encryption is an important issue widely used to protect the data and to ensure the security. Several encryption and decryption cryptosystems are available to keep image secure from unauthorized user. Elliptic Curve Cryptography (ECC) has proven to be the best solution for public key encryption. It provides a good level of security with smaller key size. In this paper we attempt to develop an enhanced Image Encryption Scheme based on ECC and PWLCM (Piecewise Linear Chaotic Map). Here, we generate a key image to enhance data security using ECC and PWLCM. From the experiment results and security analysis, we prove that our scheme cannot only achieve good encryption, but also resist the exhaustive, statistical and differential attacks.


2014 ◽  
Vol 2014 ◽  
pp. 1-21 ◽  
Author(s):  
Ali Soleymani ◽  
Md Jan Nordin ◽  
Elankovan Sundararajan

The rapid evolution of imaging and communication technologies has transformed images into a widespread data type. Different types of data, such as personal medical information, official correspondence, or governmental and military documents, are saved and transmitted in the form of images over public networks. Hence, a fast and secure cryptosystem is needed for high-resolution images. In this paper, a novel encryption scheme is presented for securing images based on Arnold cat and Henon chaotic maps. The scheme uses Arnold cat map for bit- and pixel-level permutations on plain and secret images, while Henon map creates secret images and specific parameters for the permutations. Both the encryption and decryption processes are explained, formulated, and graphically presented. The results of security analysis of five different images demonstrate the strength of the proposed cryptosystem against statistical, brute force and differential attacks. The evaluated running time for both encryption and decryption processes guarantee that the cryptosystem can work effectively in real-time applications.


2012 ◽  
Vol 4 (3) ◽  
pp. 106-123 ◽  
Author(s):  
Mohammed A. Mahdi ◽  
Mohamed M. Abd-Eld ◽  
Salwa S. Elgamal ◽  
Tat-Chee Wan

Author(s):  
Mona F. M. Mursi ◽  
Hossam Eldin H. Ahmed ◽  
Fathi E. Abd El-Samie ◽  
Ayman H. Abd El-Aziem

In this paper, the authors propose an image encryption scheme based on the development of a Hénon chaotic map using fractional Fourier transform (FRFT) which is introduced to satisfy the necessity of high secure image. This proposed algorithm combines the main advantages of confusion and diffusion with (FRFT), it use Arnold Cat map for confusion and Hénon chaotic map or one of the proposed Hénon chaotic maps for diffusion. The proposed algorithm is compared with some image encryption algorithms based on Arnold Cat map, Baker chaotic map, Hénon chaotic map and RC6. The authors perform a comparison between them in several experimental tests as statistical analyses, processing time and security analysis. The authors find from these comparison tests that the proposed algorithm demonstrates good result even better than RC6 and other chaotic maps in some cases.


Entropy ◽  
2018 ◽  
Vol 20 (11) ◽  
pp. 843 ◽  
Author(s):  
Congxu Zhu ◽  
Guojun Wang ◽  
Kehui Sun

This paper presents an improved cryptanalysis of a chaos-based image encryption scheme, which integrated permutation, diffusion, and linear transformation process. It was found that the equivalent key streams and all the unknown parameters of the cryptosystem can be recovered by our chosen-plaintext attack algorithm. Both a theoretical analysis and an experimental validation are given in detail. Based on the analysis of the defects in the original cryptosystem, an improved color image encryption scheme was further developed. By using an image content–related approach in generating diffusion arrays and the process of interweaving diffusion and confusion, the security of the cryptosystem was enhanced. The experimental results and security analysis demonstrate the security superiority of the improved cryptosystem.


2019 ◽  
Vol 8 (3) ◽  
pp. 4481-4484

Image encryption has proven a successful method to communicate the confidential information. Some of the images may or may not be confidential. So there is a need to secure the confidential images. Initially, symmetric encryption is used for security purpose. But it has the problem that if the key is revealed the interceptors can immediately decode it. To make the key transformation more secure, asymmetric encryption is introduced. In this two different keys are used for encoding and decoding. So even the interceptors hacked the key it cannot be possible to decode. In this project Elliptic Curve Cryptography (ECC) is utilized for generating the keys and the cross chaotic map used for generating the chaotic sequence. These chaotic sequences are utilized to encode the image for secure communication.


Sign in / Sign up

Export Citation Format

Share Document