Abstract
The recent advancements in the internet technology have created the urgency in developing critical data security framework around the globe. One of the most shared multimedia objects is the image which is safeguarded through a task called image encryption. An integrated approach to image encryption is the need of the hour which can combine algorithm and communication model. In this context, this work presents the first- of- its- kind approach addressing Elliptic Curve Cryptography (ECC) to encrypt and decrypt the images to enhance their security during transmission via Single Carrier Frequency Division Multiple Access (SC-FDMA) communication systems. The uniqueness of this work is to combine the encryption scheme and subsequent wireless transmission. Modified Huffman coding has been employed to achieve compression. The viability of the proposed approach was tested and the performance metrics namely Entropy, PSNR, Histogram, correlation coefficient, differential attack, NIST test, and occulation attack analyses were evaluated. The simulation results prove the efficiency of the proposed integrated encryption – compression – communication schema.
Similar content being viewed by others
References
Babaheidarian P, Delavar M, Mohajeri J (2012) On the security of an ECC based RFID authentication protocol. In: 2012 9th international ISC conference on information security and cryptology. IEEE, pp 111–114
Bharti SS, Gupta M, Agarwal S (2018) A novel approach for verifiable (n, n) audio secret sharing scheme. Multimed Tools Appl 77:25629–25657. https://doi.org/10.1007/s11042-018-5810-2
Bharti SS, Gupta M, Agarwal S (2019) A novel approach for audio steganography by processing of amplitudes and signs of secret audio separately. Multimed Tools Appl 78:23179–23201. https://doi.org/10.1007/s11042-019-7630-4
Britto J, Roja MM (2017) Gaussian noise analysis in elliptic curve encrypted images. In: 2017 international conference on intelligent sustainable systems (ICISS). IEEE, pp 791–794
Chai X, Zheng X, Gan Z et al (2018) An image encryption algorithm based on chaotic system and compressive sensing. Signal Process 148:124–144. https://doi.org/10.1016/J.SIGPRO.2018.02.007
Chai X, Fu X, Gan Z et al (2019) A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process 155:44–62. https://doi.org/10.1016/J.SIGPRO.2018.09.029
El-Latif AAA, Li L, Niu X (2014) A new image encryption scheme based on cyclic elliptic curve and chaotic system. Multimed Tools Appl 70:1559–1584. https://doi.org/10.1007/s11042-012-1173-2
Gupta K, Silakari S, Gupta R, Khan SA (2009) An ethical way of image encryption using ECC. In: 2009 first international conference on computational intelligence, Communication Systems and Networks. IEEE, pp 342–345
Hu Z, Chan C-K (2018) A real-valued chaotic orthogonal matrix transform-based encryption for OFDM-PON. IEEE Photon Technol Lett 30:1455–1458. https://doi.org/10.1109/LPT.2018.2853155
Ismail SM, Said LA, Rezk AA, et al (2017) Biomedical image encryption based on double-humped and fractional logistic maps. In: 2017 6th international conference on modern circuits and systems technologies (MOCAST). IEEE, pp 1–4
Khanzadi H, Eshghi M, Borujeni SE (2014) Image encryption using random bit sequence based on chaotic maps. Arab J Sci Eng 39:1039–1047. https://doi.org/10.1007/s13369-013-0713-z
Koblitz N, Menezes A, Vanstone S (2000) The state of elliptic curve cryptography. Des Codes Crypt 19:173–193. https://doi.org/10.1023/A:1008354106356
Lee J-W, Chen Y-L, Tseng C-Y, et al (2010) A 521-bit dual-field elliptic curve cryptographic processor with power analysis resistance. In: 2010 proceedings of ESSCIRC. IEEE, pp 206–209
Li L, Abd El-Latif AA, Niu X (2012) Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret images. Signal Process 92:1069–1078. https://doi.org/10.1016/J.SIGPRO.2011.10.020
Litasari, Rahadjo B (2017) Design and implementation stegocrypto based on elgamal elliptic curve. In: 2017 2nd international conferences on information technology, Information Systems and Electrical Engineering (ICITISEE). IEEE, pp 95–99
Lohachab A, Karambir (2019) ECC based inter-device authentication and authorization scheme using MQTT for IoT networks. J Inf Secur Appl 46:1–12. https://doi.org/10.1016/J.JISA.2019.02.005
Mowafi M, Tawalbeh L, Aljoby W (2013) Use of elliptic curve cryptography for multimedia encryption. IET Inf Secur 7:67–74. https://doi.org/10.1049/iet-ifs.2012.0147
Norouzi B, Seyedzadeh SM, Mirzakuchaki S, Mosavi MR (2015) A novel image encryption based on row-column, masking and main diffusion processes with hyper chaos. Multimed Tools Appl 74:781–811. https://doi.org/10.1007/s11042-013-1699-y
Pandey A, Saini BS, Singh B, Sood N (2019) Complexity sorting and coupled chaotic map based on 2D ECG data compression-then-encryption and its OFDM transmission with impair sample correction. Multimed Tools Appl 78:11223–11261. https://doi.org/10.1007/s11042-018-6681-2
Rajagopalan S, Rethinam S, Arumugham S, Upadhyay HN, Rayappan JBB, Amirtharajan R (2018) Networked hardware assisted key image and chaotic attractors for secure RGB image communication. Multimed Tools Appl 77:23449–23482. https://doi.org/10.1007/s11042-017-5566-0
Ravichandran D, Praveenkumar P, Rayappan JBB, Amirtharajan R (2017) DNA Chaos blend to secure medical privacy. IEEE Trans Nanobioscience 16:850–858. https://doi.org/10.1109/TNB.2017.2780881
Singh LD, Singh KM (2015) Implementation of text encryption using elliptic curve cryptography. Procedia Comput Sci 54:73–82. https://doi.org/10.1016/J.PROCS.2015.06.009
Singh LD, Singh KM (2015) Image encryption using elliptic curve cryptography. Procedia Comput Sci 54:472–481. https://doi.org/10.1016/J.PROCS.2015.06.054
Sokouti M, Sokouti B (2018) A PRISMA-compliant systematic review and analysis on color image encryption using DNA properties. Comput Sci Rev 29:14–20. https://doi.org/10.1016/J.COSREV.2018.05.002
Sujihelen L, Jayakumar C (2018) Inclusive elliptical curve cryptography (IECC) for wireless sensor network efficient operations. Wirel Pers Commun 99:893–914. https://doi.org/10.1007/s11277-017-5157-4
Vanstone SA (1997) Elliptic curve cryptosystem — the answer to strong, fast public-key cryptography for securing constrained environments. Inf Secur Tech Rep 2:78–87. https://doi.org/10.1016/S1363-4127(97)81331-3
Wu Y, Member S, Noonan JP, Member L (2011) NPCR and UACI randomness tests for image encryption. Cyber Journals Multidiscip Journals Sci Technol J Sel Areas Telecommun:31–38
Xu L, Gou X, Li Z, Li J (2017) A novel chaotic image encryption algorithm using block scrambling and dynamic index based diffusion. Opt Lasers Eng 91:41–52. https://doi.org/10.1016/J.OPTLASENG.2016.10.012
Zhao J, Wang S, Zhang L, Wang X (2017) Image encryption algorithm based on a novel improper fractional-order attractor and a wavelet function map. J Electr Comput Eng 2017:1–10. https://doi.org/10.1155/2017/8672716
Acknowledgments
The author wishes to acknowledge SASTRA Deemed University, Thanjavur, India for extending infrastructural support to carry out this work and also wish to thank Dhivya Ravichandran, Sridevi Arumugam and Sivaraman Rethinam, Information Security Research Group / SEEE/ SASTRA Deemed University for their Time, Technical and Linguistic support.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Padmapriya, V.M., Thenmozhi, K., Praveenkumar, P. et al. ECC joins first time with SC-FDMA for Mission “security”. Multimed Tools Appl 79, 17945–17967 (2020). https://doi.org/10.1007/s11042-020-08610-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-08610-5