SlideShare uma empresa Scribd logo
1 de 9
Baixar para ler offline
International Journal of Engineering Inventions
e-ISSN: 2278-7461, p-ISSN: 2319-6491
Volume 3, Issue 11 (June 2014) PP: 8-16
www.ijeijournal.com Page | 8
Security Enhancement of Image Encryption Based on
Matrix Approach using Elliptic Curve
F. Amounas1
and E.H. El Kinani2
,
1, 2
(R.O.I Group, Computer Sciences Department, A.A Group, Mathematical Department, Moulay Ismaïl
University, Faculty of Sciences and Technics, Errachidia, Morocco)
Abstract: Encryption is used to securely transmit data in open networks. Each type of data has its own
features. With the rapid growth of internet, security of digital images has become more and more important.
Therefore different techniques should be used to protect confidential image data from unauthorized access. In
this paper an encryption technique based on elliptic curves for securing images to transmit over public channels
will be proposed. Encryption and decryption process are given in details with an example. The comparative
study of the proposed scheme and the existing scheme is made. Our proposed algorithm is aimed at better
encryption of all types of images even ones with uniform background and makes the image encryption scheme
more secure. The output encrypted images reveal that the proposed method is robust.
Keywords: Image Encryption, Elliptic Curve Cryptography, Involutory Matrix, Elliptic Curve Discrete
Logarithm Problem, Mapping technique.
I. INTRODUCTION
With the huge growth of computer networks and the latest advances in digital technologies, a huge
amount of digital data is being exchanged over various networks. And therefore, with rapid evolution of
internet, confidentiality of digital images has become prime concern.
Multimedia data including video, audio, images, etc form large files, thus making their transmission
difficult. But, with rapid growth of internet large multimedia files are easily transmitted over networks.
Research work on image encryption methods has become prime concern and has attracted attention recently.
But, the problem identified in this route is, that most of the available encryption algorithms are used for text
data. Though, the multimedia storage and transmission also needs to be protected against unauthorised
duplication and consumption, and, unauthorized disclosure and misuse. There by, posing a need of good
encryption technique ensuring users privacy and copyright ownership. Many different image encryption
methods have been proposed to enhance digital image security. Image encryption techniques try to convert an
image to another one that is hard to understand. On the other hand, image decryption retrieves the original
image from the encrypted one.
In the literature, there are two major groups of image encryption algorithms: (a) non-chaos selective
methods and (b) chaos-based selective or non-selective methods. Most of these algorithms are designed for a
specific image format compressed or uncompressed, and some of them are even format compliant. In [1], the
authors have studied the encryption and decryption of the text with simple example and the work is extended to
the image applications. In [2], Megha Kolhekar and al. have studied application of elliptic curves over finite
fields for traditional key exchange and encryption of text. It has implemented the proposed scheme for
encryption of images. In [3], G. Zhu et al. have tried to encrypt an image by scrambling pixels and then adding a
watermark to scrambled image. Then, they encrypted scrambling parameters using ECC. In our previous works
[4], [5] and [6], we have proposed cryptographic algorithm for text encryption using elliptic curve. We also
described how to combine steganography with cryptography using Amazigh alphabet [7].
The main motivation of this work is to propose a novel encryption algorithm to encrypt an image based
elliptic curve. The most important phase in encryption based ECC is transformation algorithm using mapping
technique. The paper is organized as follows: the basic concept of elliptic curve is outlined in section 2. Section
3 discusses about the involutory matrix. In section 4, the proposed method is explained in detail. Section 5
presents the implementation with an example. Experimental results are discussed in section 6. Finally, section 7
describes the concluding remarks.
II. MATHEMATICAL BACKGROUND OF ELLIPTIC CURVE
The elliptic curves are not the same as an ellipse. They are named so because they are described by
cubic equations. An elliptic curve may be defined as a set of points on the coordinate planes, satisfying the
equation of the form,
Security Enhancement of Image Encryption Based on Matrix Approach using Elliptic Curve
www.ijeijournal.com Page | 9
E: y2
= x3
+ ax + b mod p, (1)
(where p  2, 3 is a prime number).
2.1. Curve Operations
The crucial property of an elliptic curve is that, the resultant point obtained by adding two points on the
curve is also on the curve. The addition rule satisfies the normal properties of addition. If P1 = (x1, y1) and P2 =
(x2, y2) are points on the elliptic curve, the addition rule has the form:
(x1, y1) + (x2, y2) = (x3, y3) (2)
where
x3 = t2
- x1 - x2 mod (p) (3)
y3 = t(x1 - x3) - y1 mod (p) (4)
with
12
12
xx
yy


if P1  P2
t=
1
2
1
2
3
y
ax 
if P1 = P2
It is know that rational points form an additive group in the addition over the elliptic curve shown in the
following figure:
Figure 1. Addition of points on elliptic curve
Multiplication P over an elliptic group is computed by repeating the addition operation  times by (3)
and (4). The strength of an ECC cryptosystem is depends on difficulty of finding the number of times that P is
added to itself to get P. Reverse operation known as Elliptic Curve Discrete Logarithm Problem (ECDLP).
2.2. Discrete Logarithm Problem on Elliptic Curve (ECDLP)
ECC is based on the discrete logarithm problem applied to elliptic curves over a finite field [8]. More
precisely, for an elliptic curve E, it relies on the fact that it is easy to compute Q = P, for  in Fp and P, Q in E.
However there is currently no known sub exponential algorithm to compute  given P and Q. In fact the discrete
logarithm problem can be used to build cryptosystems with finite Abelian group. Indeed multiplicative groups in
a finite field were originally proposed. In fact, the difficulty of the problem depends on the group, and at
present, the problem in elliptic curve groups is orders of magnitude harder than the same problem in a
multiplicative group of a finite field. This feature is a main strength of elliptic curve cryptosystems.
III. INVOLUTORY KEY MATRIX
In the literature, the various proposed methods can be found, some of them in [9, 10]. One of the
methods is explained below. A is called involutory matrix if A = A-1
. In our case, we generate the involutory key
matrix with elements are integers values that are the residus of modulo arithmetic of a number. This algorithm
can generate involutory matrices of order (nn) where n is even. Let A be an (nn) involutory matrix partitioned
to four sub-matrix noted A11, A12, A21 and A22.
Security Enhancement of Image Encryption Based on Matrix Approach using Elliptic Curve
www.ijeijournal.com Page | 10
a1,1 a1,2 … a1,n
a2,1 a2,2 … a2,n
A = ...
an,1 an,2 … an,n
where Aij is a matrix of (
2
n

2
n
) order.
So that, A12A21 = I - 2
11A = (I - A11)(I + A11).
If A12 is one of the factors of (I- 2
11A ), then A21 is the other. Solving the second matrix equation results A11+A22 = 0, then
form the matrix.
The algorithm is given below:
1. Select any arbitrary matrix A22 of (
2
n

2
n
) order.
2. Obtain A11 = -A22.
3. Take A12 =  (I - A11) or  (I + A11) where  is a non-vanishing number (0).
4. Then A21 =

1
(I + A11) or

1
(I - A11).
5. Form the matrix completely.
The proposed method uses an involutory key matrix for encryption process.
IV. MAIN RESULTS
4.1. Proposed Method
The common feature of our previous works [11, 12], is the use of ECC mechanism for text encryption
based matrix approach. Here, we extend this approach to encrypt image using transformation Algorithm.
Every image consists of pixels. In gray scale images each pixel has an 8-bit value between 0 and 255. In color
images each pixel defined by three 8-bit values separately demonstrate the Red, Green and Blue intensity. To
encrypt an image using ECC, each pixel is considered as a point on elliptic curve.
4.1.1. Transformation Algorithm
In this paper, proposed mapping technique is based on transformation process that works as follows:
To define the map matrix, the elliptic group Ep (a, b) which is all possible points on the finite field are generated
first and then the original image is divided into data matrices of 88. The row indexes are start from 0 and end
with 63 for the first matrix, from 64 to 127 for the second, … Each row stands for a pixel intensity value.
Starting from the first pixel in plain image, the corresponded point with the intensity value in the matrix is
mapped to this pixel and continue to the last pixel. For any matrix, 64 points are selected in such directory by
following spiral technique with the first point is a secure key generated.
The generated (or transformed) image is then fed to the encryption algorithm. The main idea is that an image
can be viewed as an arrangement of matrices with its elements are points on elliptic curve.
Figure 2. Example of spiral matrix (4 4).
Security Enhancement of Image Encryption Based on Matrix Approach using Elliptic Curve
www.ijeijournal.com Page | 11
The overview model of the proposed method using elliptic curve based Transformation Algorithm is shown in
Figure 3.
Figure 3.An overview diagram of the proposed method.
4.1.2. Encryption Algorithm
The output of the transformation process is served as input to the encryption algorithm. Image
encryption procedure is discussed below.
Suppose that we have some elliptic curve E defined over a finite field Fp and a point P on E (Fp) that P has prime
order N. The curve E and P are publicly known, as is the embedding system m  Pm which imbed intensity
values on an elliptic curve E. Bob chooses a random integer nB, and publishes the point PB = nBP (while nB
remains secret).
Then when Alice wishes to encrypt an image and send it to Bob, she proceeds thus:
Step 1. Chooses a random integer k with 1  k  N and compute R = kPB.
Step 2. Imbed the original image into points on elliptic curve using the transformation algorithm.
Then, the plain image is divided into data matrices of n  n, noted Mi, i = 1, 2, …
P1,1 P1,2 … P1,n
P2,1 P2,2 … P2,n
Mi = …
Pn,1 Pn,2 … Pn,n
where Pm is the mapping point of intensity value m.
Step 3. A involutory matrix A of n  n is constructed.
Step 4. Perform the product: Ci = MiA, (i=1, 2, … ) using addition and doubling points on elliptic curve.
Now, continue the same process until all pixels are crypted. The result can be represented as an
image.
Step 5. The cipher text is represented by (kP, Ci) where the second part is the encrypted image.
Therefore, the cipher text is transmitted to Bob through an insecure channel.
To decrypt the received image, Bob does the following:
Step 1. Extract the first block from the received cipher text. It is mapped to find its equivalent point noted
P1 = kP. Then, applies his secret key and Compute R = nBP1.
Step 2. Extract the remaining blocks and stored into square matrices of (n  n).
Step 3. Generate the involutory matrix and compute Mi.
To view the encrypted points as an image, we refer to the data matrix (section 4.1.1) and find the current index
according to each point.
Security Enhancement of Image Encryption Based on Matrix Approach using Elliptic Curve
www.ijeijournal.com Page | 12
V. ILLUSTRATION AND RESULTS
In this section, we consider the elliptic curve E73 (70, 57) given by the Weierstrass equation:
E: y2
mod 73 = x3
+ 70x + 57 mod 73 (5)
The elliptic curve contains 74 points. The base point P is selected as (3, 41).
To create the data matrix, the secure key will place in the row 0 which is corresponded to pixel with intensity
value of 0, and then continue next point with next value. After placing first 64 points in first matrix, next we
choose another point in the first row 0, then 64 points will place in second matrix and hereafter will do the same
for next points to the last. In this example, there are 74 points on the curve. These points completely fill 64
cellule of each matrix.
Hence we shall assume that nB = 13, k = 29, PB = (19; 56), R = (41, 69), for instance,
The data matrices generated is shown in Table 1.
(41, 69) (53, 72) … (19,56) (63, 67) (44, 31) (22, 28) … (58, 31) (41, 69)
(11, 48) (13, 5) … (4, 67) (12, 17) (23, 16) (1, 36) … (6, 6) (53, 72)
… … … … … … … … … …
(52, 38) (26, 20) … (19, 17) (35, 7) (12, 17) (22, 45) … (58, 42) (19,56)
(42, 17) (64, 42) … (47, 15) (60, 69) (4, 67) (50, 2) … (11, 48) (63, 67)
(63, 67) (11, 48) … (50,2) (4, 67) (6, 67) (12, 17) … (23,16) (44, 65)
(19, 56) (58, 42) … (22, 45) (12, 17) (50, 2) (22, 45) … (1, 36) (22, 28)
… … … … … … … … … …
(53, 72) (6, 6) … (1, 36) (23, 16) (11, 48) (58, 42) … (6, 6) (58, 31)
(41, 69) (58, 31) … (22, 28) (44, 65) (63, 67) (19, 56) … (53, 72) (41, 69)
Table 1. Data Grid generated.
To encrypt an image using this method, all pixels are mapped into points on elliptic curve using data
Grid generated (Table 1). The Table 2 demonstrate some pixels intensity value of the image chosen (“Lena”),
the result of mapping transformation of pixel to point on elliptic curve and the corresponding encrypted points.
After encrypting all the points using involutory matrix, in order to show the encrypted points as an image, first
create a matrix the same size of image, find each point in the data grid and then place the rang index in
equivalent element of created matrix.
To view the encrypted points as an image, we refer to the mapping data grid and find the current Number
according to each point and replace with the related value.
In our case, we use the involutory matrix given as follow:
3 11 9 4
10 9 6 10
A= 2 12 10 2
5 5 3 4
Table 2. Result of Mapping technique of pixels to points and the corresponding encrypted points.
VI. EXPRIMENTAL RESULTS
This section represents the simulation results illustrating the performance of the proposed encryption
algorithm. Netbeans is chosen as simulation software. Our algorithm has been validated using grayscale and
color images. The results of application of our algorithm on Lena image are given in Figures (Figure 4, Figure 5,
Figure 6, Figure 7).
Intensity
value
130 129 193 192 194 157 158 159
Mapping
point
(57, 30) (12, 17) (11, 48) (63, 67) (13, 5) (42, 17) (12, 56) (55, 22)
Encrypted
point
(52, 35) (6, 6) (19, 56) (44, 65) (47, 15) (60, 69) (62, 0) (50, 71)
Security Enhancement of Image Encryption Based on Matrix Approach using Elliptic Curve
www.ijeijournal.com Page | 13
Figure 4. Layout of Proposed System
Figure 5. Select Input Image
Security Enhancement of Image Encryption Based on Matrix Approach using Elliptic Curve
www.ijeijournal.com Page | 14
Figure 6. Encrypted Image of “Lena image”.
Figure 7. Decrypted Image of “Lena image”.
In [13], the authors demonstrate that Hill cipher can’t encrypt the image properly if the image consists
of large area covered with same color and gray level. In our case, we have taken Lena image and encrypted it
using the proposed algorithm. The proposed method works for any images with different gray scale as well as
color images. The result in Figure 7 shows that the proposed method encrypt image properly as compared to the
original Hill cipher algorithm. Moreover, this total process of image-encryption has highly time efficient, and
secure, and gives a very simple and flexible approach.
The above algorithm is tested on the color image “FSTE”. Figure 8 and Figure 9 show result of
application of our algorithm on color image to obtain encrypted and decrypted images. Encrypted images
visually appear secure enough and decryption leads to successful retrieval of original image.
Security Enhancement of Image Encryption Based on Matrix Approach using Elliptic Curve
www.ijeijournal.com Page | 15
Figure 8. Encrypted Image of “FSTE image”.
Figure 9. Decrypted Image of “FSTE image”.
VII. CONCLUSION
This paper introduced a new approach for image encryption using elliptic curve. In fact, the plain
image is divided into blocks: data matrix. The proposed cryptosystem uses a different key for mapping and
encryption process and the possibility of known plaintext attack is highly reduced as the key used changes with
every block and it is generated randomly using transformation algorithm based ECC. In this paper a new
mapping method introduced to convert an image pixel value to a point on a predefined elliptic curve over finite
field Fp using transformation algorithm. This mapping technique is very fast with low complexity and
Security Enhancement of Image Encryption Based on Matrix Approach using Elliptic Curve
www.ijeijournal.com Page | 16
computation. This technique will results a high distribution of different points for repetitive intensity values. The
result shows that the proposed method is more secure to force attacks as compared to the original Hill cipher
algorithm. As a future work, the proposed cryptosystem can be extended for encrypting the video messages as
well as sound encryption process.
REFERENCES
[1] S.Maria Celestin Vigila1and K. Muneeswaran2,”Nonce Based Elliptic Curve Cryptosystem for Text and Image Applications,”
International Journal of Network Security, 2012, vol.14, No.4, PP.240-246.
[2] Megha Kolhekar and Anita Jadhav ”implementation of elliptic curve cryptography on text and image”, International Journal of
Enterprise Computing and Business Systems, ISSN (Online): 2230-8849, 2011, vol. 1, Issue 2.
[3] G. Zhu, W. Wang, X. Zhang, and M. Wang, ”Digital image encryption algorithm based on pixels,” IEEE International Conference
on Intelligent Computing and Intelligent Systems (ICIS), 2010, pp.769-772.
[4] F.Amounas, E.H. El Kinani and A.Chillali, ”An application of discrete algorithms in asymmetric cryptography, ” International
Mathematical Forum, 2011, vol. 6, no. 49, pp. 2409-2418.
[5] F.Amounas and E.H. El Kinani, ”Elliptic Curve Digital Signature Algorithm Using Boolean Permutation based ECC”, International
Journal of Information & Network Security, 2012, vol.1, No.3, pp. 216-222.
[6] F.Amounas and E.H. El Kinani, ”Proposed Developments of Blind Signature Scheme based on The Elliptic Curve Discrete
Logarithm Problem”, Computer Engineering and Applications Journal, 2013, vol 2, No 1.
[7] H.Sadki, F.Amounas and E.H. El Kinani, ”A Novel Approach of Amazigh Text Steganography based Elliptic Curve”, International
Journal of Information & Network Security, 2014, vol 3, No 2, pp. 83-91.
[8] N. Koblitz, A. Menezes, and S. Vanstone, ”The state of elliptic curve cryptography”, Designs, Codes, Cryptography, 2000, vol. 19,
pp. 173-193.
[9] Bibhudendra Acharya, Girija Sankar Rath, Sarat Kumar Patra, Saroj Kumar Panigrahy. ”Novel Methods of Generating Self-
Invertible Matrix for Hill Cipher Algorithm”, International Journal of Security, 2007, vol 1, Issue 1, pp. 14-21.
[10] Bibhudendra Acharya, Debasish Jena, Sarat Kumar Patra and Ganapati Panda,”Invertible, Involutory and Permutation Matrix
Generation Methods for Hill Cipher System”, Proceedings of the 2009 International Conference on Advanced Computer Control,
ICACC ’09, 2009, pp. 410-414.
[11] F.Amounas and E.H. El Kinani, ”An Efficient Elliptic Curve Cryptography protocol Based on Matrices”, International Journal of
Engineering Inventions, 2012, vol 1, Issue 9, pp. 49-54.
[12] F.Amounas and E.H. El Kinani, ”Fast mapping method based on matrix approach for elliptic curve cryptography”, International
Journal of Information & Network Security, 2012, vol.1, No.2, pp. 54-59.
[13] Shahrokh Saeednia, " How to make the Hill cipher secure. Cryptologia, 2000, 24 (4), pp. 353-360.

Mais conteúdo relacionado

Mais procurados

11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature mapsAlexander Decker
 
Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...eSAT Publishing House
 
Analysis of image storage and retrieval in graded memory
Analysis of image storage and retrieval in graded memoryAnalysis of image storage and retrieval in graded memory
Analysis of image storage and retrieval in graded memoryeSAT Journals
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Efficient & Secure Data Hiding Using Secret Reference Matrix
Efficient & Secure Data Hiding Using Secret Reference MatrixEfficient & Secure Data Hiding Using Secret Reference Matrix
Efficient & Secure Data Hiding Using Secret Reference MatrixIJNSA Journal
 
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSIONSECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSIONsipij
 
IMPROVING OF ARTIFICIAL NEURAL NETWORKS PERFORMANCE BY USING GPU’S: A SURVEY
IMPROVING OF ARTIFICIAL NEURAL NETWORKS PERFORMANCE BY USING GPU’S: A SURVEYIMPROVING OF ARTIFICIAL NEURAL NETWORKS PERFORMANCE BY USING GPU’S: A SURVEY
IMPROVING OF ARTIFICIAL NEURAL NETWORKS PERFORMANCE BY USING GPU’S: A SURVEYcsandit
 
Improving of artifical neural networks performance by using gpu's a survey
Improving of artifical neural networks performance by using gpu's  a surveyImproving of artifical neural networks performance by using gpu's  a survey
Improving of artifical neural networks performance by using gpu's a surveycsandit
 
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...IJORCS
 
Performance Evaluation of Object Tracking Technique Based on Position Vectors
Performance Evaluation of Object Tracking Technique Based on Position VectorsPerformance Evaluation of Object Tracking Technique Based on Position Vectors
Performance Evaluation of Object Tracking Technique Based on Position VectorsCSCJournals
 
Performance Anaysis for Imaging System
Performance Anaysis for Imaging SystemPerformance Anaysis for Imaging System
Performance Anaysis for Imaging SystemVrushali Lanjewar
 
Robust Adaptive Threshold Algorithm based on Kernel Fuzzy Clustering on Image...
Robust Adaptive Threshold Algorithm based on Kernel Fuzzy Clustering on Image...Robust Adaptive Threshold Algorithm based on Kernel Fuzzy Clustering on Image...
Robust Adaptive Threshold Algorithm based on Kernel Fuzzy Clustering on Image...cscpconf
 
Data Hiding Method With High Embedding Capacity Character
Data Hiding Method With High Embedding Capacity CharacterData Hiding Method With High Embedding Capacity Character
Data Hiding Method With High Embedding Capacity CharacterCSCJournals
 
Performance boosting of discrete cosine transform using parallel programming ...
Performance boosting of discrete cosine transform using parallel programming ...Performance boosting of discrete cosine transform using parallel programming ...
Performance boosting of discrete cosine transform using parallel programming ...IAEME Publication
 
Black-box modeling of nonlinear system using evolutionary neural NARX model
Black-box modeling of nonlinear system using evolutionary neural NARX modelBlack-box modeling of nonlinear system using evolutionary neural NARX model
Black-box modeling of nonlinear system using evolutionary neural NARX modelIJECEIAES
 
Comparison of thresholding methods
Comparison of thresholding methodsComparison of thresholding methods
Comparison of thresholding methodsVrushali Lanjewar
 
TRANSFER LEARNING BASED IMAGE VISUALIZATION USING CNN
TRANSFER LEARNING BASED IMAGE VISUALIZATION USING CNNTRANSFER LEARNING BASED IMAGE VISUALIZATION USING CNN
TRANSFER LEARNING BASED IMAGE VISUALIZATION USING CNNijaia
 
Human Action Recognition using Contour History Images and Neural Networks Cla...
Human Action Recognition using Contour History Images and Neural Networks Cla...Human Action Recognition using Contour History Images and Neural Networks Cla...
Human Action Recognition using Contour History Images and Neural Networks Cla...IRJET Journal
 
Real-time Multi-object Face Recognition Using Content Based Image Retrieval (...
Real-time Multi-object Face Recognition Using Content Based Image Retrieval (...Real-time Multi-object Face Recognition Using Content Based Image Retrieval (...
Real-time Multi-object Face Recognition Using Content Based Image Retrieval (...IJECEIAES
 

Mais procurados (19)

11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps
 
Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...
 
Analysis of image storage and retrieval in graded memory
Analysis of image storage and retrieval in graded memoryAnalysis of image storage and retrieval in graded memory
Analysis of image storage and retrieval in graded memory
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Efficient & Secure Data Hiding Using Secret Reference Matrix
Efficient & Secure Data Hiding Using Secret Reference MatrixEfficient & Secure Data Hiding Using Secret Reference Matrix
Efficient & Secure Data Hiding Using Secret Reference Matrix
 
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSIONSECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
 
IMPROVING OF ARTIFICIAL NEURAL NETWORKS PERFORMANCE BY USING GPU’S: A SURVEY
IMPROVING OF ARTIFICIAL NEURAL NETWORKS PERFORMANCE BY USING GPU’S: A SURVEYIMPROVING OF ARTIFICIAL NEURAL NETWORKS PERFORMANCE BY USING GPU’S: A SURVEY
IMPROVING OF ARTIFICIAL NEURAL NETWORKS PERFORMANCE BY USING GPU’S: A SURVEY
 
Improving of artifical neural networks performance by using gpu's a survey
Improving of artifical neural networks performance by using gpu's  a surveyImproving of artifical neural networks performance by using gpu's  a survey
Improving of artifical neural networks performance by using gpu's a survey
 
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
 
Performance Evaluation of Object Tracking Technique Based on Position Vectors
Performance Evaluation of Object Tracking Technique Based on Position VectorsPerformance Evaluation of Object Tracking Technique Based on Position Vectors
Performance Evaluation of Object Tracking Technique Based on Position Vectors
 
Performance Anaysis for Imaging System
Performance Anaysis for Imaging SystemPerformance Anaysis for Imaging System
Performance Anaysis for Imaging System
 
Robust Adaptive Threshold Algorithm based on Kernel Fuzzy Clustering on Image...
Robust Adaptive Threshold Algorithm based on Kernel Fuzzy Clustering on Image...Robust Adaptive Threshold Algorithm based on Kernel Fuzzy Clustering on Image...
Robust Adaptive Threshold Algorithm based on Kernel Fuzzy Clustering on Image...
 
Data Hiding Method With High Embedding Capacity Character
Data Hiding Method With High Embedding Capacity CharacterData Hiding Method With High Embedding Capacity Character
Data Hiding Method With High Embedding Capacity Character
 
Performance boosting of discrete cosine transform using parallel programming ...
Performance boosting of discrete cosine transform using parallel programming ...Performance boosting of discrete cosine transform using parallel programming ...
Performance boosting of discrete cosine transform using parallel programming ...
 
Black-box modeling of nonlinear system using evolutionary neural NARX model
Black-box modeling of nonlinear system using evolutionary neural NARX modelBlack-box modeling of nonlinear system using evolutionary neural NARX model
Black-box modeling of nonlinear system using evolutionary neural NARX model
 
Comparison of thresholding methods
Comparison of thresholding methodsComparison of thresholding methods
Comparison of thresholding methods
 
TRANSFER LEARNING BASED IMAGE VISUALIZATION USING CNN
TRANSFER LEARNING BASED IMAGE VISUALIZATION USING CNNTRANSFER LEARNING BASED IMAGE VISUALIZATION USING CNN
TRANSFER LEARNING BASED IMAGE VISUALIZATION USING CNN
 
Human Action Recognition using Contour History Images and Neural Networks Cla...
Human Action Recognition using Contour History Images and Neural Networks Cla...Human Action Recognition using Contour History Images and Neural Networks Cla...
Human Action Recognition using Contour History Images and Neural Networks Cla...
 
Real-time Multi-object Face Recognition Using Content Based Image Retrieval (...
Real-time Multi-object Face Recognition Using Content Based Image Retrieval (...Real-time Multi-object Face Recognition Using Content Based Image Retrieval (...
Real-time Multi-object Face Recognition Using Content Based Image Retrieval (...
 

Destaque

Destaque (8)

Multi-Parameter Measurement of ICU Patient Using GSM and Embedded Technology
Multi-Parameter Measurement of ICU Patient Using GSM and Embedded TechnologyMulti-Parameter Measurement of ICU Patient Using GSM and Embedded Technology
Multi-Parameter Measurement of ICU Patient Using GSM and Embedded Technology
 
Supercapacitors: the near Future of Batteries
Supercapacitors: the near Future of BatteriesSupercapacitors: the near Future of Batteries
Supercapacitors: the near Future of Batteries
 
Study on the Anticipatory Coarticulatory Effect of Chinese Bi-syllabic Words
Study on the Anticipatory Coarticulatory Effect of Chinese Bi-syllabic WordsStudy on the Anticipatory Coarticulatory Effect of Chinese Bi-syllabic Words
Study on the Anticipatory Coarticulatory Effect of Chinese Bi-syllabic Words
 
Science Attitude as a Determinant to Educational Aspiration in Students
Science Attitude as a Determinant to Educational Aspiration in StudentsScience Attitude as a Determinant to Educational Aspiration in Students
Science Attitude as a Determinant to Educational Aspiration in Students
 
Dimensionality Reduction for Classification with High-Dimensional Data
Dimensionality Reduction for Classification with High-Dimensional DataDimensionality Reduction for Classification with High-Dimensional Data
Dimensionality Reduction for Classification with High-Dimensional Data
 
MHD Stagnation Point Flow of A MICROPOLAR Fluid over a Stretching Surface wit...
MHD Stagnation Point Flow of A MICROPOLAR Fluid over a Stretching Surface wit...MHD Stagnation Point Flow of A MICROPOLAR Fluid over a Stretching Surface wit...
MHD Stagnation Point Flow of A MICROPOLAR Fluid over a Stretching Surface wit...
 
Air Flow Characteristics of an Air Cooled Condenser used in Thermal Power Plant
Air Flow Characteristics of an Air Cooled Condenser used in Thermal Power PlantAir Flow Characteristics of an Air Cooled Condenser used in Thermal Power Plant
Air Flow Characteristics of an Air Cooled Condenser used in Thermal Power Plant
 
Improved Hybrid Behavior Ant Colony Algorithm to Solve the Vehicle Routing Pr...
Improved Hybrid Behavior Ant Colony Algorithm to Solve the Vehicle Routing Pr...Improved Hybrid Behavior Ant Colony Algorithm to Solve the Vehicle Routing Pr...
Improved Hybrid Behavior Ant Colony Algorithm to Solve the Vehicle Routing Pr...
 

Semelhante a Security Enhancement of Image Encryption Based on Matrix Approach using Elliptic Curve

An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...IJEACS
 
Image Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher AlgorithmImage Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher AlgorithmIDES Editor
 
Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229Editor IJARCET
 
Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229Editor IJARCET
 
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...idescitation
 
Image encryption using chaotic sequence and its cryptanalysis
Image encryption using chaotic sequence and its cryptanalysisImage encryption using chaotic sequence and its cryptanalysis
Image encryption using chaotic sequence and its cryptanalysisIOSR Journals
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
 
Design a cryptosystem using elliptic curves cryptography and Vigenère symmetr...
Design a cryptosystem using elliptic curves cryptography and Vigenère symmetr...Design a cryptosystem using elliptic curves cryptography and Vigenère symmetr...
Design a cryptosystem using elliptic curves cryptography and Vigenère symmetr...IJECEIAES
 
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...CSCJournals
 
Encryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix MultiplicationEncryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix Multiplicationijcsit
 
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEDESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEIJNSA Journal
 
A new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systemsA new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systemsTELKOMNIKA JOURNAL
 
Survey ecc 09june12
Survey ecc 09june12Survey ecc 09june12
Survey ecc 09june12IJASCSE
 
IRJET- An Image Cryptography using Henon Map and Arnold Cat Map
IRJET-  	  An Image Cryptography using Henon Map and Arnold Cat MapIRJET-  	  An Image Cryptography using Henon Map and Arnold Cat Map
IRJET- An Image Cryptography using Henon Map and Arnold Cat MapIRJET Journal
 
Image encryption using elliptical curve cryptosytem with hill cipher
Image encryption using elliptical curve cryptosytem with hill cipherImage encryption using elliptical curve cryptosytem with hill cipher
Image encryption using elliptical curve cryptosytem with hill cipherkarthik kedarisetti
 
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...Editor IJCATR
 

Semelhante a Security Enhancement of Image Encryption Based on Matrix Approach using Elliptic Curve (20)

Ew4301904907
Ew4301904907Ew4301904907
Ew4301904907
 
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
 
Image Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher AlgorithmImage Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher Algorithm
 
Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229
 
Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229
 
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
 
Image encryption using chaotic sequence and its cryptanalysis
Image encryption using chaotic sequence and its cryptanalysisImage encryption using chaotic sequence and its cryptanalysis
Image encryption using chaotic sequence and its cryptanalysis
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
Design a cryptosystem using elliptic curves cryptography and Vigenère symmetr...
Design a cryptosystem using elliptic curves cryptography and Vigenère symmetr...Design a cryptosystem using elliptic curves cryptography and Vigenère symmetr...
Design a cryptosystem using elliptic curves cryptography and Vigenère symmetr...
 
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
 
Encryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix MultiplicationEncryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix Multiplication
 
T01022103108
T01022103108T01022103108
T01022103108
 
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEDESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
 
A new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systemsA new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systems
 
Survey ecc 09june12
Survey ecc 09june12Survey ecc 09june12
Survey ecc 09june12
 
IRJET- An Image Cryptography using Henon Map and Arnold Cat Map
IRJET-  	  An Image Cryptography using Henon Map and Arnold Cat MapIRJET-  	  An Image Cryptography using Henon Map and Arnold Cat Map
IRJET- An Image Cryptography using Henon Map and Arnold Cat Map
 
Image encryption using elliptical curve cryptosytem with hill cipher
Image encryption using elliptical curve cryptosytem with hill cipherImage encryption using elliptical curve cryptosytem with hill cipher
Image encryption using elliptical curve cryptosytem with hill cipher
 
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
 

Mais de International Journal of Engineering Inventions www.ijeijournal.com

Mais de International Journal of Engineering Inventions www.ijeijournal.com (20)

H04124548
H04124548H04124548
H04124548
 
G04123844
G04123844G04123844
G04123844
 
F04123137
F04123137F04123137
F04123137
 
E04122330
E04122330E04122330
E04122330
 
C04121115
C04121115C04121115
C04121115
 
B04120610
B04120610B04120610
B04120610
 
A04120105
A04120105A04120105
A04120105
 
F04113640
F04113640F04113640
F04113640
 
E04112135
E04112135E04112135
E04112135
 
D04111520
D04111520D04111520
D04111520
 
C04111114
C04111114C04111114
C04111114
 
B04110710
B04110710B04110710
B04110710
 
A04110106
A04110106A04110106
A04110106
 
I04105358
I04105358I04105358
I04105358
 
H04104952
H04104952H04104952
H04104952
 
G04103948
G04103948G04103948
G04103948
 
F04103138
F04103138F04103138
F04103138
 
E04102330
E04102330E04102330
E04102330
 
D04101822
D04101822D04101822
D04101822
 
C04101217
C04101217C04101217
C04101217
 

Último

Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksMagic Marks
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Call Girls Mumbai
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...Health
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfsmsksolar
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadhamedmustafa094
 

Último (20)

Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdf
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 

Security Enhancement of Image Encryption Based on Matrix Approach using Elliptic Curve

  • 1. International Journal of Engineering Inventions e-ISSN: 2278-7461, p-ISSN: 2319-6491 Volume 3, Issue 11 (June 2014) PP: 8-16 www.ijeijournal.com Page | 8 Security Enhancement of Image Encryption Based on Matrix Approach using Elliptic Curve F. Amounas1 and E.H. El Kinani2 , 1, 2 (R.O.I Group, Computer Sciences Department, A.A Group, Mathematical Department, Moulay Ismaïl University, Faculty of Sciences and Technics, Errachidia, Morocco) Abstract: Encryption is used to securely transmit data in open networks. Each type of data has its own features. With the rapid growth of internet, security of digital images has become more and more important. Therefore different techniques should be used to protect confidential image data from unauthorized access. In this paper an encryption technique based on elliptic curves for securing images to transmit over public channels will be proposed. Encryption and decryption process are given in details with an example. The comparative study of the proposed scheme and the existing scheme is made. Our proposed algorithm is aimed at better encryption of all types of images even ones with uniform background and makes the image encryption scheme more secure. The output encrypted images reveal that the proposed method is robust. Keywords: Image Encryption, Elliptic Curve Cryptography, Involutory Matrix, Elliptic Curve Discrete Logarithm Problem, Mapping technique. I. INTRODUCTION With the huge growth of computer networks and the latest advances in digital technologies, a huge amount of digital data is being exchanged over various networks. And therefore, with rapid evolution of internet, confidentiality of digital images has become prime concern. Multimedia data including video, audio, images, etc form large files, thus making their transmission difficult. But, with rapid growth of internet large multimedia files are easily transmitted over networks. Research work on image encryption methods has become prime concern and has attracted attention recently. But, the problem identified in this route is, that most of the available encryption algorithms are used for text data. Though, the multimedia storage and transmission also needs to be protected against unauthorised duplication and consumption, and, unauthorized disclosure and misuse. There by, posing a need of good encryption technique ensuring users privacy and copyright ownership. Many different image encryption methods have been proposed to enhance digital image security. Image encryption techniques try to convert an image to another one that is hard to understand. On the other hand, image decryption retrieves the original image from the encrypted one. In the literature, there are two major groups of image encryption algorithms: (a) non-chaos selective methods and (b) chaos-based selective or non-selective methods. Most of these algorithms are designed for a specific image format compressed or uncompressed, and some of them are even format compliant. In [1], the authors have studied the encryption and decryption of the text with simple example and the work is extended to the image applications. In [2], Megha Kolhekar and al. have studied application of elliptic curves over finite fields for traditional key exchange and encryption of text. It has implemented the proposed scheme for encryption of images. In [3], G. Zhu et al. have tried to encrypt an image by scrambling pixels and then adding a watermark to scrambled image. Then, they encrypted scrambling parameters using ECC. In our previous works [4], [5] and [6], we have proposed cryptographic algorithm for text encryption using elliptic curve. We also described how to combine steganography with cryptography using Amazigh alphabet [7]. The main motivation of this work is to propose a novel encryption algorithm to encrypt an image based elliptic curve. The most important phase in encryption based ECC is transformation algorithm using mapping technique. The paper is organized as follows: the basic concept of elliptic curve is outlined in section 2. Section 3 discusses about the involutory matrix. In section 4, the proposed method is explained in detail. Section 5 presents the implementation with an example. Experimental results are discussed in section 6. Finally, section 7 describes the concluding remarks. II. MATHEMATICAL BACKGROUND OF ELLIPTIC CURVE The elliptic curves are not the same as an ellipse. They are named so because they are described by cubic equations. An elliptic curve may be defined as a set of points on the coordinate planes, satisfying the equation of the form,
  • 2. Security Enhancement of Image Encryption Based on Matrix Approach using Elliptic Curve www.ijeijournal.com Page | 9 E: y2 = x3 + ax + b mod p, (1) (where p  2, 3 is a prime number). 2.1. Curve Operations The crucial property of an elliptic curve is that, the resultant point obtained by adding two points on the curve is also on the curve. The addition rule satisfies the normal properties of addition. If P1 = (x1, y1) and P2 = (x2, y2) are points on the elliptic curve, the addition rule has the form: (x1, y1) + (x2, y2) = (x3, y3) (2) where x3 = t2 - x1 - x2 mod (p) (3) y3 = t(x1 - x3) - y1 mod (p) (4) with 12 12 xx yy   if P1  P2 t= 1 2 1 2 3 y ax  if P1 = P2 It is know that rational points form an additive group in the addition over the elliptic curve shown in the following figure: Figure 1. Addition of points on elliptic curve Multiplication P over an elliptic group is computed by repeating the addition operation  times by (3) and (4). The strength of an ECC cryptosystem is depends on difficulty of finding the number of times that P is added to itself to get P. Reverse operation known as Elliptic Curve Discrete Logarithm Problem (ECDLP). 2.2. Discrete Logarithm Problem on Elliptic Curve (ECDLP) ECC is based on the discrete logarithm problem applied to elliptic curves over a finite field [8]. More precisely, for an elliptic curve E, it relies on the fact that it is easy to compute Q = P, for  in Fp and P, Q in E. However there is currently no known sub exponential algorithm to compute  given P and Q. In fact the discrete logarithm problem can be used to build cryptosystems with finite Abelian group. Indeed multiplicative groups in a finite field were originally proposed. In fact, the difficulty of the problem depends on the group, and at present, the problem in elliptic curve groups is orders of magnitude harder than the same problem in a multiplicative group of a finite field. This feature is a main strength of elliptic curve cryptosystems. III. INVOLUTORY KEY MATRIX In the literature, the various proposed methods can be found, some of them in [9, 10]. One of the methods is explained below. A is called involutory matrix if A = A-1 . In our case, we generate the involutory key matrix with elements are integers values that are the residus of modulo arithmetic of a number. This algorithm can generate involutory matrices of order (nn) where n is even. Let A be an (nn) involutory matrix partitioned to four sub-matrix noted A11, A12, A21 and A22.
  • 3. Security Enhancement of Image Encryption Based on Matrix Approach using Elliptic Curve www.ijeijournal.com Page | 10 a1,1 a1,2 … a1,n a2,1 a2,2 … a2,n A = ... an,1 an,2 … an,n where Aij is a matrix of ( 2 n  2 n ) order. So that, A12A21 = I - 2 11A = (I - A11)(I + A11). If A12 is one of the factors of (I- 2 11A ), then A21 is the other. Solving the second matrix equation results A11+A22 = 0, then form the matrix. The algorithm is given below: 1. Select any arbitrary matrix A22 of ( 2 n  2 n ) order. 2. Obtain A11 = -A22. 3. Take A12 =  (I - A11) or  (I + A11) where  is a non-vanishing number (0). 4. Then A21 =  1 (I + A11) or  1 (I - A11). 5. Form the matrix completely. The proposed method uses an involutory key matrix for encryption process. IV. MAIN RESULTS 4.1. Proposed Method The common feature of our previous works [11, 12], is the use of ECC mechanism for text encryption based matrix approach. Here, we extend this approach to encrypt image using transformation Algorithm. Every image consists of pixels. In gray scale images each pixel has an 8-bit value between 0 and 255. In color images each pixel defined by three 8-bit values separately demonstrate the Red, Green and Blue intensity. To encrypt an image using ECC, each pixel is considered as a point on elliptic curve. 4.1.1. Transformation Algorithm In this paper, proposed mapping technique is based on transformation process that works as follows: To define the map matrix, the elliptic group Ep (a, b) which is all possible points on the finite field are generated first and then the original image is divided into data matrices of 88. The row indexes are start from 0 and end with 63 for the first matrix, from 64 to 127 for the second, … Each row stands for a pixel intensity value. Starting from the first pixel in plain image, the corresponded point with the intensity value in the matrix is mapped to this pixel and continue to the last pixel. For any matrix, 64 points are selected in such directory by following spiral technique with the first point is a secure key generated. The generated (or transformed) image is then fed to the encryption algorithm. The main idea is that an image can be viewed as an arrangement of matrices with its elements are points on elliptic curve. Figure 2. Example of spiral matrix (4 4).
  • 4. Security Enhancement of Image Encryption Based on Matrix Approach using Elliptic Curve www.ijeijournal.com Page | 11 The overview model of the proposed method using elliptic curve based Transformation Algorithm is shown in Figure 3. Figure 3.An overview diagram of the proposed method. 4.1.2. Encryption Algorithm The output of the transformation process is served as input to the encryption algorithm. Image encryption procedure is discussed below. Suppose that we have some elliptic curve E defined over a finite field Fp and a point P on E (Fp) that P has prime order N. The curve E and P are publicly known, as is the embedding system m  Pm which imbed intensity values on an elliptic curve E. Bob chooses a random integer nB, and publishes the point PB = nBP (while nB remains secret). Then when Alice wishes to encrypt an image and send it to Bob, she proceeds thus: Step 1. Chooses a random integer k with 1  k  N and compute R = kPB. Step 2. Imbed the original image into points on elliptic curve using the transformation algorithm. Then, the plain image is divided into data matrices of n  n, noted Mi, i = 1, 2, … P1,1 P1,2 … P1,n P2,1 P2,2 … P2,n Mi = … Pn,1 Pn,2 … Pn,n where Pm is the mapping point of intensity value m. Step 3. A involutory matrix A of n  n is constructed. Step 4. Perform the product: Ci = MiA, (i=1, 2, … ) using addition and doubling points on elliptic curve. Now, continue the same process until all pixels are crypted. The result can be represented as an image. Step 5. The cipher text is represented by (kP, Ci) where the second part is the encrypted image. Therefore, the cipher text is transmitted to Bob through an insecure channel. To decrypt the received image, Bob does the following: Step 1. Extract the first block from the received cipher text. It is mapped to find its equivalent point noted P1 = kP. Then, applies his secret key and Compute R = nBP1. Step 2. Extract the remaining blocks and stored into square matrices of (n  n). Step 3. Generate the involutory matrix and compute Mi. To view the encrypted points as an image, we refer to the data matrix (section 4.1.1) and find the current index according to each point.
  • 5. Security Enhancement of Image Encryption Based on Matrix Approach using Elliptic Curve www.ijeijournal.com Page | 12 V. ILLUSTRATION AND RESULTS In this section, we consider the elliptic curve E73 (70, 57) given by the Weierstrass equation: E: y2 mod 73 = x3 + 70x + 57 mod 73 (5) The elliptic curve contains 74 points. The base point P is selected as (3, 41). To create the data matrix, the secure key will place in the row 0 which is corresponded to pixel with intensity value of 0, and then continue next point with next value. After placing first 64 points in first matrix, next we choose another point in the first row 0, then 64 points will place in second matrix and hereafter will do the same for next points to the last. In this example, there are 74 points on the curve. These points completely fill 64 cellule of each matrix. Hence we shall assume that nB = 13, k = 29, PB = (19; 56), R = (41, 69), for instance, The data matrices generated is shown in Table 1. (41, 69) (53, 72) … (19,56) (63, 67) (44, 31) (22, 28) … (58, 31) (41, 69) (11, 48) (13, 5) … (4, 67) (12, 17) (23, 16) (1, 36) … (6, 6) (53, 72) … … … … … … … … … … (52, 38) (26, 20) … (19, 17) (35, 7) (12, 17) (22, 45) … (58, 42) (19,56) (42, 17) (64, 42) … (47, 15) (60, 69) (4, 67) (50, 2) … (11, 48) (63, 67) (63, 67) (11, 48) … (50,2) (4, 67) (6, 67) (12, 17) … (23,16) (44, 65) (19, 56) (58, 42) … (22, 45) (12, 17) (50, 2) (22, 45) … (1, 36) (22, 28) … … … … … … … … … … (53, 72) (6, 6) … (1, 36) (23, 16) (11, 48) (58, 42) … (6, 6) (58, 31) (41, 69) (58, 31) … (22, 28) (44, 65) (63, 67) (19, 56) … (53, 72) (41, 69) Table 1. Data Grid generated. To encrypt an image using this method, all pixels are mapped into points on elliptic curve using data Grid generated (Table 1). The Table 2 demonstrate some pixels intensity value of the image chosen (“Lena”), the result of mapping transformation of pixel to point on elliptic curve and the corresponding encrypted points. After encrypting all the points using involutory matrix, in order to show the encrypted points as an image, first create a matrix the same size of image, find each point in the data grid and then place the rang index in equivalent element of created matrix. To view the encrypted points as an image, we refer to the mapping data grid and find the current Number according to each point and replace with the related value. In our case, we use the involutory matrix given as follow: 3 11 9 4 10 9 6 10 A= 2 12 10 2 5 5 3 4 Table 2. Result of Mapping technique of pixels to points and the corresponding encrypted points. VI. EXPRIMENTAL RESULTS This section represents the simulation results illustrating the performance of the proposed encryption algorithm. Netbeans is chosen as simulation software. Our algorithm has been validated using grayscale and color images. The results of application of our algorithm on Lena image are given in Figures (Figure 4, Figure 5, Figure 6, Figure 7). Intensity value 130 129 193 192 194 157 158 159 Mapping point (57, 30) (12, 17) (11, 48) (63, 67) (13, 5) (42, 17) (12, 56) (55, 22) Encrypted point (52, 35) (6, 6) (19, 56) (44, 65) (47, 15) (60, 69) (62, 0) (50, 71)
  • 6. Security Enhancement of Image Encryption Based on Matrix Approach using Elliptic Curve www.ijeijournal.com Page | 13 Figure 4. Layout of Proposed System Figure 5. Select Input Image
  • 7. Security Enhancement of Image Encryption Based on Matrix Approach using Elliptic Curve www.ijeijournal.com Page | 14 Figure 6. Encrypted Image of “Lena image”. Figure 7. Decrypted Image of “Lena image”. In [13], the authors demonstrate that Hill cipher can’t encrypt the image properly if the image consists of large area covered with same color and gray level. In our case, we have taken Lena image and encrypted it using the proposed algorithm. The proposed method works for any images with different gray scale as well as color images. The result in Figure 7 shows that the proposed method encrypt image properly as compared to the original Hill cipher algorithm. Moreover, this total process of image-encryption has highly time efficient, and secure, and gives a very simple and flexible approach. The above algorithm is tested on the color image “FSTE”. Figure 8 and Figure 9 show result of application of our algorithm on color image to obtain encrypted and decrypted images. Encrypted images visually appear secure enough and decryption leads to successful retrieval of original image.
  • 8. Security Enhancement of Image Encryption Based on Matrix Approach using Elliptic Curve www.ijeijournal.com Page | 15 Figure 8. Encrypted Image of “FSTE image”. Figure 9. Decrypted Image of “FSTE image”. VII. CONCLUSION This paper introduced a new approach for image encryption using elliptic curve. In fact, the plain image is divided into blocks: data matrix. The proposed cryptosystem uses a different key for mapping and encryption process and the possibility of known plaintext attack is highly reduced as the key used changes with every block and it is generated randomly using transformation algorithm based ECC. In this paper a new mapping method introduced to convert an image pixel value to a point on a predefined elliptic curve over finite field Fp using transformation algorithm. This mapping technique is very fast with low complexity and
  • 9. Security Enhancement of Image Encryption Based on Matrix Approach using Elliptic Curve www.ijeijournal.com Page | 16 computation. This technique will results a high distribution of different points for repetitive intensity values. The result shows that the proposed method is more secure to force attacks as compared to the original Hill cipher algorithm. As a future work, the proposed cryptosystem can be extended for encrypting the video messages as well as sound encryption process. REFERENCES [1] S.Maria Celestin Vigila1and K. Muneeswaran2,”Nonce Based Elliptic Curve Cryptosystem for Text and Image Applications,” International Journal of Network Security, 2012, vol.14, No.4, PP.240-246. [2] Megha Kolhekar and Anita Jadhav ”implementation of elliptic curve cryptography on text and image”, International Journal of Enterprise Computing and Business Systems, ISSN (Online): 2230-8849, 2011, vol. 1, Issue 2. [3] G. Zhu, W. Wang, X. Zhang, and M. Wang, ”Digital image encryption algorithm based on pixels,” IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS), 2010, pp.769-772. [4] F.Amounas, E.H. El Kinani and A.Chillali, ”An application of discrete algorithms in asymmetric cryptography, ” International Mathematical Forum, 2011, vol. 6, no. 49, pp. 2409-2418. [5] F.Amounas and E.H. El Kinani, ”Elliptic Curve Digital Signature Algorithm Using Boolean Permutation based ECC”, International Journal of Information & Network Security, 2012, vol.1, No.3, pp. 216-222. [6] F.Amounas and E.H. El Kinani, ”Proposed Developments of Blind Signature Scheme based on The Elliptic Curve Discrete Logarithm Problem”, Computer Engineering and Applications Journal, 2013, vol 2, No 1. [7] H.Sadki, F.Amounas and E.H. El Kinani, ”A Novel Approach of Amazigh Text Steganography based Elliptic Curve”, International Journal of Information & Network Security, 2014, vol 3, No 2, pp. 83-91. [8] N. Koblitz, A. Menezes, and S. Vanstone, ”The state of elliptic curve cryptography”, Designs, Codes, Cryptography, 2000, vol. 19, pp. 173-193. [9] Bibhudendra Acharya, Girija Sankar Rath, Sarat Kumar Patra, Saroj Kumar Panigrahy. ”Novel Methods of Generating Self- Invertible Matrix for Hill Cipher Algorithm”, International Journal of Security, 2007, vol 1, Issue 1, pp. 14-21. [10] Bibhudendra Acharya, Debasish Jena, Sarat Kumar Patra and Ganapati Panda,”Invertible, Involutory and Permutation Matrix Generation Methods for Hill Cipher System”, Proceedings of the 2009 International Conference on Advanced Computer Control, ICACC ’09, 2009, pp. 410-414. [11] F.Amounas and E.H. El Kinani, ”An Efficient Elliptic Curve Cryptography protocol Based on Matrices”, International Journal of Engineering Inventions, 2012, vol 1, Issue 9, pp. 49-54. [12] F.Amounas and E.H. El Kinani, ”Fast mapping method based on matrix approach for elliptic curve cryptography”, International Journal of Information & Network Security, 2012, vol.1, No.2, pp. 54-59. [13] Shahrokh Saeednia, " How to make the Hill cipher secure. Cryptologia, 2000, 24 (4), pp. 353-360.