Skip to main content
Log in

A hybrid authenticated image encryption scheme using elliptic curves for enhanced security

  • Original Research
  • Published:
International Journal of Information Technology Aims and scope Submit manuscript

Abstract

The rapid evolution of digital technology has heightened concerns about the security of multimedia communication across vulnerable platforms. In response to this challenge, our research introduces a comprehensive encryption and authentication framework tailored for both grayscale and color images. Central to our approach is the incorporation of the Elliptic Curve Diffie–Hellman (ECDH) key exchange method, complemented by the Fibonacci matrix and enhanced modified logistic maps. Furthermore, we present an asymmetric variant of the Affine-Hill cipher, designed specifically for block-based image encryption to ensure superior cipher image quality. A pivotal aspect of our methodology is the generation of a self-invertible key matrix and a shift Fibonacci matrix derived from the ECDH session key. This matrix, combined with two distinct one Dimensional (1D) modified logistic maps, efficiently scramble the original image pixel positions. To enhance the scheme's security, a novel authentication mechanism is incorporated, integrating a digital signature with the cipher image. Our Python 3-based implementation showcases the resilience of the proposed framework against a spectrum of attacks, as evidenced by rigorous evaluations of parameters such as correlation, entropy, variance, execution time, and key space. Through comparative analysis with recent encryption methodologies, we highlight that our approach is effective, robust and secure.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Data availability

Authors declare that all the data being used in the design and production cum layout of the manuscript is declared in the manuscript.

References

  1. Washington LC (2008) Elliptic curves: number theory and cryptography, Second edition. Chapman and Hall/CRC, New York

  2. Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644–654

    Article  MathSciNet  Google Scholar 

  3. Hill L (1929) Cryptography in an algebraic alphabet. Am Math Mon 36(6):306–312

    Article  MathSciNet  Google Scholar 

  4. Ismail I, Amin M (2006) Diab: how to repair the Hill cipher. J Zhejiang Univ Sci A 7(12):2022–2030

    Article  Google Scholar 

  5. Miller V (1986) Use of elliptic curves in cryptography. In: Advances in Cryptology-CRYPTO’85 Proceedings, pp 417–426

  6. Koblitz N (1987) Elliptic curve cryptography. Math Comput 48:203–209

    Article  Google Scholar 

  7. Shanon C (1949) Communication theory of security. Bell Syst Tech J 28:656–715

    Article  Google Scholar 

  8. Jiao K, Dong Y, Huang X, He J (2020) Image encryption scheme based on a generalised Arnold map and RSA algorithm. Secur Commun Netw. https://doi.org/10.1155/2020/9721675

    Article  Google Scholar 

  9. Baptista MS (1998) Cryptography with chaos. Phys Lett A 240:50–54

    Article  ADS  MathSciNet  CAS  Google Scholar 

  10. Luo Y, Zhou R, Liu J, Qui S, Cao Y (2020) An efficient and self-adapting colour image encryption algorithm based on chaos and interactions among multiple layers. Multimed Tools Appl 77(20):26191–26217

    Article  Google Scholar 

  11. Boruzni S, Ehsani M (2015) Modified logistic maps for cryptographic application. Appl Math 6:773–782

    Article  Google Scholar 

  12. Rostami M, Shahba A, Saryazdi S, Pour H (2017) A novel parallel image encrption with chaotic windows based on logistic map. Comput Electr Eng 62:384–400

    Article  Google Scholar 

  13. Essaid M, Akharraz A, Saaidi A, Mouhib A (2019) Image encryption scheme based on a new secure variant of Hill cipher and 1D chaotic maps. J Inform Secur Appl 47:173–187

    Google Scholar 

  14. Hasheminejad A, Rostani MJ (2019) A novel bit level multiphase algorithm for image encryption based on PWLCM chaotic map. Opt Int J Light Electron Opt 184:205–213

    Article  Google Scholar 

  15. Lone P, Singh D, Mir U (2021) A novel image encryption using random matrix affine cipher and the chaotic maps. J Mod Opt 68(10):507–521

    Article  ADS  MathSciNet  Google Scholar 

  16. Pourasad Y, Ranjbarzadeh R, Mardani A (2021) A new algorithm for digital image encryption based on chaos theory. Entropy-MDPI 23(3):341

    Article  ADS  MathSciNet  Google Scholar 

  17. Pak C, Huang L (2017) A new color image encryption using combination of the 1D chaotic map. Signal Process 138:129–137

    Article  Google Scholar 

  18. Rashid A, Hussein K (2023) Image encryption algorithm based on the density and 6D logistic map. Int J Elect Comput Eng 13(2):1903–1913

    Google Scholar 

  19. Mansouri A, Wang X (2020) A novel one-dimensional sin powered chaotic map and its application in a new image encryption scheme. Inform Sci 520:46–62

    Article  MathSciNet  Google Scholar 

  20. Hua Z, Zhu Z, Chen M, Yuanman L (2021) Color image encryption using orthogonal latin squares and a new 2D chaotic system. Nonlinear Dyn 104:4505–4522

    Article  Google Scholar 

  21. Zhou J, Zhou N, Gong L (2020) Fast color image encryption scheme based on 3D orthogonal latin squares and matching matrix. Opt Laser Technol 131(6):106437

    Article  Google Scholar 

  22. Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations. Opt Lasers Eng 88:197–213

    Article  Google Scholar 

  23. Kumar M, Iqbal A, Kumar P (2016) A new RGB image encryption algorithm based on DNA encoding and elliptic curve Diffie-Hellman cryptography. Signal Process 125:187–202

    Article  Google Scholar 

  24. Singh L, Singh K (2015) Image encryption using elliptic curve cryptography. Proc Comput Sci 54:472–481

    Article  Google Scholar 

  25. Singh L, Singh K (2018) A robust image encryption scheme based on chaotic system and elliptic curve over finite field. Multimed Tools Appl 77(11):8629–8652

    Google Scholar 

  26. Zhang X, Wang X (2018) Digital image encryption algorithm based on elliptic curve public cryptosystems. IEEE Access 6:70025–70034

    Article  Google Scholar 

  27. Liang H, Zhang G, Hou W, Huang P, Liu B, Li S (2021) A novel asymmetric hyperchaotic image encryption scheme based on ellitpic curve cryptograpy. Appl Sci MDPI 11(12):5691

    Article  CAS  Google Scholar 

  28. Wu J, Liao X, Yang B (2017) Color image encryption based on chaotic systems and elliptic curve ElGamal scheme. Signal Process 141:109–124

    Article  Google Scholar 

  29. Keshavamurthy C, Revanna C (2019) Hybrid method of document image encryption using ECC and multiple chaotic maps. Int J Recent Technol Eng 8(4):1615–1629

    Google Scholar 

  30. Farwa S, Bibi N, Muhammad N (2020) An efficient image encryption scheme using Fresnelet transfrom and elliptic curve based scrambling. Multimed Tools Appl 37–38:28225–28232

    Article  Google Scholar 

  31. Sneha PS, Sankar S, Kumar A (2019) A chaotic colour image encryption scheme combining Walsh–Hadmard transform and Arnold-tent map. J Ambient Intel Hum Comput. https://doi.org/10.1007/s12652-019-01385-0

    Article  Google Scholar 

  32. Jiao K, Guodong Y, Dong Y, Huang X, He J (2020) Image encryption scheme based on a generalized Arnold map and RSA algorithm. Secur Commun Netw. https://doi.org/10.1155/2020/9721675

    Article  Google Scholar 

  33. Broumandnia A (2020) Image encryption algorithm based on the finite fields in chaotic map. Journal of Information Secur Appl 54

  34. Zhu X, Liu H, Liang Y, Wu J (2020) Image encryption based on Kronecker product over finite fields and DNA operation. Int J Light Elect Opt 224:102553

    Google Scholar 

  35. Parida P, Pradhan C, Gao X, Roy D (2021) Image encryption and authentication with elliptic curve cryptography and multidimensional chaotic maps. IEEE Access 9:164725

    Article  Google Scholar 

  36. Dawahdeh Z, Yakoob S, Othman R (2017) A new image encryption technique combining elliptic curve cryptosystem with Hill cipher. J King Saud Univ Comput Inform Sci 30(3):349–355

    Google Scholar 

  37. Vamsi V, Reddy P (2022) Hybrid image encryption using elliptic curve cryptography, hadmard transform and hill cipher. Webology 19

  38. Zhu S, Zhu C (2018) Image encryption algorithm with an avalanche effect based on a six dimensional discrete chaotic system. Multimed Tools Appl 77(21):29119–29142

    Article  Google Scholar 

  39. Li N, Sun J, Wang Y (2019) A novel memcapacitor model and its application for image encryption based on PWLCM chaotic map. Optik 184:205–213

    Article  Google Scholar 

  40. Lone P, Singh D, Stoffova V, Mishra D, Mir U, Kumar N (2022) Cryptanalysis and improved image encryption scheme using elliptic curve and Affine-Hill cipher. Mathematics 10:3878

    Article  Google Scholar 

  41. Dua M, Kumar A, Garg A (2022) Multiple image encryption approach using non linear chaotic map and cosine transformation. Int J Inf Technol 14:1627–1641. https://doi.org/10.1007/s41870-022-00885-1

    Article  Google Scholar 

  42. Ahuja B, Doriya R (2023) A secure algorithm using high-dimensional sine map for color image encryption. Int J Inf Technol 15:1535–1543. https://doi.org/10.1007/s41870-023-01190-1

    Article  Google Scholar 

  43. Sharma M, Ranjan RK, Bharti V (2023) An improved image encryption algorithm using a new byte-shuffled Henon map. Int J Inf Technol 15:267–277. https://doi.org/10.1007/s41870-022-01092-8

    Article  Google Scholar 

  44. Das S, Sanyal MK (2023) Dynamic key generator based colour medical image protection algorithm using 3D unified chaotic system and dynamic DNA coding. Int J Inf Technol 15:1015–1033. https://doi.org/10.1007/s41870-022-01119-0

    Article  Google Scholar 

  45. Ahuja B, Doriya R (2021) A novel hybrid compressive encryption cryptosystem based on block quarter compression via DCT and fractional Fourier transform with chaos. Int J Inf Technol 13:1837–1846. https://doi.org/10.1007/s41870-021-00759-

    Article  Google Scholar 

  46. Merkle J, Lochter M (2010) Elliptic curve cryptography (ECC) brainpool standard curves and curve generation. In: RFC 5639. https://doi.org/10.17487/RFC5639

  47. The USC-SIPI Image Database, University of Southern California, Signal and Image Processing Institute. Available at: http://sipi.usc.edu/database/, Accessed (2013)

Download references

Acknowledgements

First author acknowledges the DST-INSPIRE for supporting this research.

Funding

The authors received no specific funding for this study.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shalini Gupta.

Ethics declarations

Conflict of interest

The authors declare that they have no conflicts of interest to report regarding the present study.

Ethics approval

No human subject or animals are involved in the research.

Consent to participate

All authors have mutually consented to participate.

Consent to publish

All the authors have consented the journal to publish this paper.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gupta, S., Nitish, Harish, M. et al. A hybrid authenticated image encryption scheme using elliptic curves for enhanced security. Int. j. inf. tecnol. (2024). https://doi.org/10.1007/s41870-024-01737-w

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s41870-024-01737-w

Keywords

Navigation