Open Access Open Access  Restricted Access Subscription or Fee Access

A Light Weight and Secure Color Image Cryptography using ECC Algorithm

Honey Kothari, Pragya Shukla, Nilima Karankar

Abstract


Elliptic curve cryptography (ECC) is an algorithm based on the algebraic structure of elliptic curves over finite fields. It provides security to information using shorter keys than other known public-key crypto-algorithms without decreasing the security level. This makes ECC a good choice for the implementation in security services. This paper proposed a hybrid cryptographic approach for color images using ECC algorithm and some mathematical computations. It also compared the various existing image cryptographic techniques and the various issues involved. Regardless there are several related works in the literature, to our knowledge this is the first hybrid approach in order to encrypt and decrypt the color images using some mathematical computations.


Keywords


Cryptography, Decryption, Encryption, Image Encryption.

Full Text:

PDF

References


Image Encryption and Compression for Medical Image Security W. Puech LIRMM Laboratory, UMR 5506 CNRS University of MONTPELLIER, 161, rue Ada, 34392 MONTPELLIER CEDEX 05 ,FRANCE University of NIMES, Place G. Peri, 30021 NIMES CEDEX 1, FRANCE

International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, Volume 1, Issue 1, November 2011) Image Encryption Using Different Techniques : A Review, Komal D Patel, Sonal Belani, CSE Dept, PIT, Bhopal, Madhya Pradesh, India, CSE Dept, PCST, Bhopal, Madhya Pradesh, India.

A reconfigurable gf (2M) elliptic curve cryptographic coprocessor, M. Morales-Sandoval, C. Feregrino-Uribe, R. Cumplido and I. Algredo-Badillo, Polytechnic University of Victoria Cd. Victoria, Tam. Mexico. 87138, mmoraless@upv.edu.mx, National Institute for Astrophysics, Optics and Electronics Tonantzintla, Pue. Mexico. 72840, cferegrino@inaoep.mx, rcumplido@inaoep.mx and University of Istmo Tehuantepec, Oax. Mexico. 70760, algredobadillo@gmail.com

An Overview of Cryptography, Gary C. Kessler, 16 November 2014 © 1998-2014 A much shorter, edited version of this paper appears in the 1999 Edition of Handbook on Local Area Networks, published by Auerbach in September 1998.

Andrey Bogdanov, Miroslav Knezevic, Gregor Leander, Deniz Toz, Kerem Varici, and Ingrid Verbauwhede, “SPONGENT: The Design Space of Lightweight Cryptographic Hashing”, IEEE Transactions on Computers, (Volume:62 , Issue: 10 )

Xiaokang Xiong, Duncan S. Wong, and Xiaotie Deng, “Tiny Pairing: A Fast and Lightweight Pairing-based Cryptographic Library for Wireless Sensor Networks”,978-1-4244-6398-5/10/$26.00 ©2010 IEEE

Sergey Morozov, Christian Tergino, Patrick Schaumont, “System Integration of Elliptic Curve Cryptography on an OMAP Platform”, 2011 IEEE 9th Symposium on Application Specific Processors (SASP).

Taranjit Kaur, Reecha Sharma, “Image Cryptography by TJ-SCA: Supplementary Cryptographic Algorithm for Color Images”, International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013 1355 ISSN 2229-5518

M. Zeghid, M. Machhout, L. Khriji, A. Baganne,R. Tourki, “A Modified AES Based Algorithm for Image Encryption”, World Academy of Science, Engineering and Technology 27 2007.

Bibhudendra Acharya, Saroj Kumar Panigrahy, Sarat Kumar Patra, and Ganapati Panda, “Image Encryption Using Advanced Hill Cipher Algorithm”, International Journal of Recent Trends in Engineering, Vol. 1, No. 1, May 2009

Zhang Yun-peng, Liu Wei, Cao Shui-ping, Zhai Zheng-jun, Nie Xuan , Dai Wei-di, “Digital image encryption algorithm based on chaos and improved DES”, IEEE International Conference on Systems, Man and Cybernetics, 2009.

Seyed Mohammad Seyedzade, Reza Ebrahimi Atani and Sattar Mirzakuchaki, “A Novel Image Encryption Algorithm Based on Hash Function” 6th Iranian Conference on Machine Vision and Image Processing, 2010.

Kamali, S.H., Shakerian, R., Hedayati, M.,Rahmani, M., “A new modified version of Advance Encryption Standard based algorithm for image encryption”, Electronics and Information Engineering (ICEIE), 2010 International Conference.

Majid Khan, Tariq Shah, “A literature review on Image Encryption Techniques”, 3D Research Center, Kwangwoon University and Springer-Verlag Berlin Heidelberg, 2014.

Marc Van Droogenbroeck “Partial encryption of images for real-time applications” In Fourth IEEE Benelux Signal Processing, Hilvarenbeek, The Netherlands, pages 11-15, April 2004.

Keywords: Image processing, Information, Encryption. [bibtex-entry]

http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=883383&url=http%3A%2F%2Fieeexplore.ieee.org%2Fiel5%2F30%2F19114%2F00883383

en.wikipedia.org/wiki/Elliptic_curve_cryptography

http://en.wikipedia.org/wiki/Data_security

www.techopedia.com/definition/26464/data-security

http://www.spamlaws.com/data-security.html

http://www.computerworld.com/article/2546352/data-center/top-10-ways-to-secure-your-stored-data.html?page=3

http://resources.infosecinstitute.com/role-of-cryptography/

http://gcnep.gov.in/publications/nl/2005/200507-1.pdf


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.