84
Views
0
CrossRef citations to date
0
Altmetric
Articles

A secure authenticated image encryption scheme based on elliptic curve cryptography

, , , &
Pages 184-193 | Received 09 Aug 2023, Accepted 20 Dec 2023, Published online: 30 Dec 2023

References

  • Jasara B, Saqib M, Moon AH. Image encryption using logistic-cosine-sine chaos map and elliptic curve cryptography. J Theor Appl Inf Technol. 2021;99(16):3970–3986.
  • Zhu S, Wang G, Zhu C. A secure and fast image encryption scheme based on double chaotic s-boxes. Entropy. 2019;21(8):790. doi: 10.3390/e21080790
  • Makki QH, Abdalla AM, Tamimi AA. A survey of image encryption algorithms. In: 2021 International Conference on Information Technology (ICIT). IEEE; 2021. p. 598–602.
  • Jain K, Aji A, Krishnan P. Medical image encryption scheme using multiple chaotic maps. Pattern Recognit Lett. 2021;152:356–364. doi: 10.1016/j.patrec.2021.10.033
  • Banthia AK, Tiwari N. Image encryption using pseudo random number generators. Int J Comput Appl. 2013;67(20):3970–3986.
  • Jassim SA, Farhan AK. Combined Chebyshev and logistic maps to generate pseudorandom number generator for internet of things. Int J Electr Comput Eng. 2022;12(3):3287.
  • Koubaâ K, Derbel N. Dna image encryption scheme based on a chaotic LSTM pseudo-random number generator. Int J Bifurc Chaos. 2023;33(6):2350067. doi: 10.1142/S0218127423500670
  • Ramesh A, Jain A. Hybrid image encryption using pseudo random number generators, and transposition and substitution techniques. In: 2015 International Conference on Trends in Automation, Communications and Computing Technology (I-TACT-15). IEEE; 2015. p. 1–6.
  • Farhan AK, Al-Saidi NM, Maolood AT, et al. Entropy analysis and image encryption application based on a new chaotic system crossing a cylinder. Entropy. 2019;21(10):958. doi: 10.3390/e21100958
  • Laiphrakpam DS, Khumanthem MS. A robust image encryption scheme based on chaotic system and elliptic curve over finite field. Multimed Tools Appl. 2018;77(7):8629–8652. doi: 10.1007/s11042-017-4755-1
  • Murugadoss B, Karna SNR, Kode JS, et al. Blind digital image watermarking using Henon chaotic map and elliptic curve cryptography in discrete wavelets with singular value decomposition. In: 2021 International Symposium of Asian Control Association on Intelligent Robotics and Industrial Automation (IRIA). IEEE; 2021. p. 203–208.
  • Singh LD, Singh KM. Image encryption using elliptic curve cryptography. Procedia Comput Sci. 2015;54:472–481. doi: 10.1016/j.procs.2015.06.054
  • Rajvir C, Satapathy S, Rajkumar S, et al. Image encryption using modified elliptic curve cryptography and hill cipher. In: Smart Intelligent Computing and Applications: Proceedings of the Third International Conference on Smart Computing and Informatics, Vol. 1. Springer; 2020. p. 675–683.
  • Dhall S, Pal SK, Sharma K. Cryptanalysis of image encryption scheme based on a new 1d chaotic system. Signal Process. 2018;146:22–32. doi: 10.1016/j.sigpro.2017.12.021
  • Lian S, Sun J, Wang Z. Security analysis of a chaos-based image encryption algorithm. Phys A Stat Mech Appl. 2005;351(2–4):645–661. doi: 10.1016/j.physa.2005.01.001
  • Ratan R. Key independent decryption of graphically encrypted images. In: Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010. Proceedings. Springer; 2010. p. 88–97.
  • Ratan R, Yadav A. Security analysis of bit-plane level image encryption schemes. Def Sci J. 2021;71(2):209–221. doi: 10.14429/dsj.71.15643
  • Gilchrist J. Encryption. In: Bidgoli H, editor. Encyclopedia of information systems. New York: Elsevier; 2003. p. 87–100.
  • Zhou S, Wang X, Zhang Y, et al. A novel image encryption cryptosystem based on true random numbers and chaotic systems. Multimed Syst. 2022;28(1):1–18.
  • Bendaoud S, Amounas F, El Kinani EH. A new image encryption scheme based on enhanced elliptic curve cryptosystem using dna computing. In: Proceedings of the 2nd International Conference on Networking, Information Systems & Security. 2019. p. 1–5.
  • Zhao Z, Zhang X. ECC-based image encryption using code computing. In: Proceedings of the 2012 International Conference on Communication, Electronics and Automation Engineering. Springer; 2013. p. 859–865.
  • Ganavi M, Prabhudeva S. A novel approach to enhance image security using hyperchaos with elliptic curve cryptography. Int J Rough Sets Data Anal (IJRSDA). 2021;7(1):1–17. doi: 10.4018/IJRSDA
  • Kumar D, Joshi AB, Singh S, et al. Digital color-image encryption scheme based on elliptic curve cryptography ElGamal encryption and 3D Lorenz map. In: AIP Conference Proceedings, Vol. 2364. AIP Publishing LLC; 2021. p. 020026.
  • Parida P, Pradhan C, Gao XZ, et al. Image encryption and authentication with elliptic curve cryptography and multidimensional chaotic maps. IEEE Access. 2021;9:76191–76204. doi: 10.1109/ACCESS.2021.3072075
  • Matthews R. Maximally periodic reciprocals. Bull Inst Math Appl. 1992;28:147–148.
  • Edwards HM. Fermat's last theorem: a genetic introduction to algebraic number theory. Vol.50. Springer Science & Business Media; 1996. ISBN - 0-387-95002-8, New York, NY, USA.
  • Jankovic MV. A proof of Sophie Germain primes conjecture. 2020. Preprint. Available in https://hal.science/hal-02169242v12
  • Banik A, Laiphrakpam DS, Agrawal A, et al. Secret image encryption based on chaotic system and elliptic curve cryptography. Digit Signal Process. 2022;129:103639. doi: 10.1016/j.dsp.2022.103639
  • Adhikari S, Karforma S. A novel image encryption method for e-governance application using elliptic curve pseudo random number and chaotic random number sequence. Multimed Tools Appl. 2022;81(1):759–784. doi: 10.1007/s11042-021-11323-y
  • Parida P, Pradhan C, Alzubi JA, et al. Elliptic curve cryptographic image encryption using Henon map and Hopfield chaotic neural network. Multimed Tools Appl. 2023;82(22):1–26.
  • Azam NA, Murtaza G, Hayat U. A novel image encryption scheme based on elliptic curves and coupled map lattices. Optik. 2023;274:170517. doi: 10.1016/j.ijleo.2023.170517
  • Ganavi M, Prabhudeva S. Two-layer security of images using elliptic curve cryptography with discrete wavelet transform. Int J Comput Netw Inf Secur. 2023;13(2):31.
  • Sheng Q, Fu C, Lin Z, et al. An efficient chaotic image encryption scheme using simultaneous permutation–diffusion operation. Vis Comput. 2023;1–16. doi: 10.1007/s00371-023-02876-0.
  • Agoh T. On Sophie Germain primes. Tatra Mt Math Publ. 2000;20:65–73.
  • Agrawal M, Kayal N, Saxena N. Primes is in p. Ann Math. 2004;160(22):781–793. doi: 10.4007/annals
  • Yap WS, Yeo SL, Heng SH, et al. Security analysis of GCM for communication. Secur Commun Netw. 2014;7(5):854–864. doi: 10.1002/sec.v7.5
  • Lehmer DH. Mathematical models in large-scale computing units. Ann Comput Lab (Harvard University). 1951;26:141–146.
  • Gallagher P. Federal information processing standards publication digital signature standard (DSS). Fips pub 186-3. 2009. doi: 10.6028/NIST.FIPS.186-4
  • Ahmad M, Alsharari HD, Nizam M. Security improvement of an image encryption based on mPixel-chaotic-shuffle and pixel-chaotic-diffusion. 2014. arXiv preprint arXiv:1403.6626.
  • Huang CK, Nien HH. Multi chaotic systems based pixel shuffle for image encryption. Opt Commun. 2009;282(11):2123–2127. doi: 10.1016/j.optcom.2009.02.044
  • Xiao D, Shih FY. Using the self-synchronizing method to improve security of the multi-chaotic systems-based image encryption. In: Multimedia security. CRC Press; 2017. p. 343–355.
  • Zhang X, Wang X. Digital image encryption algorithm based on elliptic curve public cryptosystem. IEEE Access. 2018;6:70025–70034. doi: 10.1109/Access.6287639

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.