Skip to main content
Log in

ECC joins first time with SC-FDMA for Mission “security”

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The recent advancements in the internet technology have created the urgency in developing critical data security framework around the globe. One of the most shared multimedia objects is the image which is safeguarded through a task called image encryption. An integrated approach to image encryption is the need of the hour which can combine algorithm and communication model. In this context, this work presents the first- of- its- kind approach addressing Elliptic Curve Cryptography (ECC) to encrypt and decrypt the images to enhance their security during transmission via Single Carrier Frequency Division Multiple Access (SC-FDMA) communication systems. The uniqueness of this work is to combine the encryption scheme and subsequent wireless transmission. Modified Huffman coding has been employed to achieve compression. The viability of the proposed approach was tested and the performance metrics namely Entropy, PSNR, Histogram, correlation coefficient, differential attack, NIST test, and occulation attack analyses were evaluated. The simulation results prove the efficiency of the proposed integrated encryption – compression – communication schema.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10.
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Babaheidarian P, Delavar M, Mohajeri J (2012) On the security of an ECC based RFID authentication protocol. In: 2012 9th international ISC conference on information security and cryptology. IEEE, pp 111–114

  2. Bharti SS, Gupta M, Agarwal S (2018) A novel approach for verifiable (n, n) audio secret sharing scheme. Multimed Tools Appl 77:25629–25657. https://doi.org/10.1007/s11042-018-5810-2

    Article  Google Scholar 

  3. Bharti SS, Gupta M, Agarwal S (2019) A novel approach for audio steganography by processing of amplitudes and signs of secret audio separately. Multimed Tools Appl 78:23179–23201. https://doi.org/10.1007/s11042-019-7630-4

    Article  Google Scholar 

  4. Britto J, Roja MM (2017) Gaussian noise analysis in elliptic curve encrypted images. In: 2017 international conference on intelligent sustainable systems (ICISS). IEEE, pp 791–794

  5. Chai X, Zheng X, Gan Z et al (2018) An image encryption algorithm based on chaotic system and compressive sensing. Signal Process 148:124–144. https://doi.org/10.1016/J.SIGPRO.2018.02.007

    Article  Google Scholar 

  6. Chai X, Fu X, Gan Z et al (2019) A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process 155:44–62. https://doi.org/10.1016/J.SIGPRO.2018.09.029

    Article  Google Scholar 

  7. El-Latif AAA, Li L, Niu X (2014) A new image encryption scheme based on cyclic elliptic curve and chaotic system. Multimed Tools Appl 70:1559–1584. https://doi.org/10.1007/s11042-012-1173-2

    Article  Google Scholar 

  8. Gupta K, Silakari S, Gupta R, Khan SA (2009) An ethical way of image encryption using ECC. In: 2009 first international conference on computational intelligence, Communication Systems and Networks. IEEE, pp 342–345

  9. Hu Z, Chan C-K (2018) A real-valued chaotic orthogonal matrix transform-based encryption for OFDM-PON. IEEE Photon Technol Lett 30:1455–1458. https://doi.org/10.1109/LPT.2018.2853155

    Article  Google Scholar 

  10. Ismail SM, Said LA, Rezk AA, et al (2017) Biomedical image encryption based on double-humped and fractional logistic maps. In: 2017 6th international conference on modern circuits and systems technologies (MOCAST). IEEE, pp 1–4

  11. Khanzadi H, Eshghi M, Borujeni SE (2014) Image encryption using random bit sequence based on chaotic maps. Arab J Sci Eng 39:1039–1047. https://doi.org/10.1007/s13369-013-0713-z

    Article  MATH  Google Scholar 

  12. Koblitz N, Menezes A, Vanstone S (2000) The state of elliptic curve cryptography. Des Codes Crypt 19:173–193. https://doi.org/10.1023/A:1008354106356

    Article  MathSciNet  MATH  Google Scholar 

  13. Lee J-W, Chen Y-L, Tseng C-Y, et al (2010) A 521-bit dual-field elliptic curve cryptographic processor with power analysis resistance. In: 2010 proceedings of ESSCIRC. IEEE, pp 206–209

  14. Li L, Abd El-Latif AA, Niu X (2012) Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret images. Signal Process 92:1069–1078. https://doi.org/10.1016/J.SIGPRO.2011.10.020

    Article  Google Scholar 

  15. Litasari, Rahadjo B (2017) Design and implementation stegocrypto based on elgamal elliptic curve. In: 2017 2nd international conferences on information technology, Information Systems and Electrical Engineering (ICITISEE). IEEE, pp 95–99

  16. Lohachab A, Karambir (2019) ECC based inter-device authentication and authorization scheme using MQTT for IoT networks. J Inf Secur Appl 46:1–12. https://doi.org/10.1016/J.JISA.2019.02.005

    Article  Google Scholar 

  17. Mowafi M, Tawalbeh L, Aljoby W (2013) Use of elliptic curve cryptography for multimedia encryption. IET Inf Secur 7:67–74. https://doi.org/10.1049/iet-ifs.2012.0147

    Article  Google Scholar 

  18. Norouzi B, Seyedzadeh SM, Mirzakuchaki S, Mosavi MR (2015) A novel image encryption based on row-column, masking and main diffusion processes with hyper chaos. Multimed Tools Appl 74:781–811. https://doi.org/10.1007/s11042-013-1699-y

    Article  MATH  Google Scholar 

  19. Pandey A, Saini BS, Singh B, Sood N (2019) Complexity sorting and coupled chaotic map based on 2D ECG data compression-then-encryption and its OFDM transmission with impair sample correction. Multimed Tools Appl 78:11223–11261. https://doi.org/10.1007/s11042-018-6681-2

    Article  Google Scholar 

  20. Rajagopalan S, Rethinam S, Arumugham S, Upadhyay HN, Rayappan JBB, Amirtharajan R (2018) Networked hardware assisted key image and chaotic attractors for secure RGB image communication. Multimed Tools Appl 77:23449–23482. https://doi.org/10.1007/s11042-017-5566-0

    Article  Google Scholar 

  21. Ravichandran D, Praveenkumar P, Rayappan JBB, Amirtharajan R (2017) DNA Chaos blend to secure medical privacy. IEEE Trans Nanobioscience 16:850–858. https://doi.org/10.1109/TNB.2017.2780881

    Article  Google Scholar 

  22. Singh LD, Singh KM (2015) Implementation of text encryption using elliptic curve cryptography. Procedia Comput Sci 54:73–82. https://doi.org/10.1016/J.PROCS.2015.06.009

    Article  Google Scholar 

  23. Singh LD, Singh KM (2015) Image encryption using elliptic curve cryptography. Procedia Comput Sci 54:472–481. https://doi.org/10.1016/J.PROCS.2015.06.054

    Article  Google Scholar 

  24. Sokouti M, Sokouti B (2018) A PRISMA-compliant systematic review and analysis on color image encryption using DNA properties. Comput Sci Rev 29:14–20. https://doi.org/10.1016/J.COSREV.2018.05.002

    Article  Google Scholar 

  25. Sujihelen L, Jayakumar C (2018) Inclusive elliptical curve cryptography (IECC) for wireless sensor network efficient operations. Wirel Pers Commun 99:893–914. https://doi.org/10.1007/s11277-017-5157-4

    Article  Google Scholar 

  26. Vanstone SA (1997) Elliptic curve cryptosystem — the answer to strong, fast public-key cryptography for securing constrained environments. Inf Secur Tech Rep 2:78–87. https://doi.org/10.1016/S1363-4127(97)81331-3

    Article  Google Scholar 

  27. Wu Y, Member S, Noonan JP, Member L (2011) NPCR and UACI randomness tests for image encryption. Cyber Journals Multidiscip Journals Sci Technol J Sel Areas Telecommun:31–38

  28. Xu L, Gou X, Li Z, Li J (2017) A novel chaotic image encryption algorithm using block scrambling and dynamic index based diffusion. Opt Lasers Eng 91:41–52. https://doi.org/10.1016/J.OPTLASENG.2016.10.012

    Article  Google Scholar 

  29. Zhao J, Wang S, Zhang L, Wang X (2017) Image encryption algorithm based on a novel improper fractional-order attractor and a wavelet function map. J Electr Comput Eng 2017:1–10. https://doi.org/10.1155/2017/8672716

    Article  Google Scholar 

Download references

Acknowledgments

The author wishes to acknowledge SASTRA Deemed University, Thanjavur, India for extending infrastructural support to carry out this work and also wish to thank Dhivya Ravichandran, Sridevi Arumugam and Sivaraman Rethinam, Information Security Research Group / SEEE/ SASTRA Deemed University for their Time, Technical and Linguistic support.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rengarajan Amirtharajan.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Padmapriya, V.M., Thenmozhi, K., Praveenkumar, P. et al. ECC joins first time with SC-FDMA for Mission “security”. Multimed Tools Appl 79, 17945–17967 (2020). https://doi.org/10.1007/s11042-020-08610-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-08610-5

Keywords

Navigation