Abstract
The rapid evolution of digital technology has heightened concerns about the security of multimedia communication across vulnerable platforms. In response to this challenge, our research introduces a comprehensive encryption and authentication framework tailored for both grayscale and color images. Central to our approach is the incorporation of the Elliptic Curve Diffie–Hellman (ECDH) key exchange method, complemented by the Fibonacci matrix and enhanced modified logistic maps. Furthermore, we present an asymmetric variant of the Affine-Hill cipher, designed specifically for block-based image encryption to ensure superior cipher image quality. A pivotal aspect of our methodology is the generation of a self-invertible key matrix and a shift Fibonacci matrix derived from the ECDH session key. This matrix, combined with two distinct one Dimensional (1D) modified logistic maps, efficiently scramble the original image pixel positions. To enhance the scheme's security, a novel authentication mechanism is incorporated, integrating a digital signature with the cipher image. Our Python 3-based implementation showcases the resilience of the proposed framework against a spectrum of attacks, as evidenced by rigorous evaluations of parameters such as correlation, entropy, variance, execution time, and key space. Through comparative analysis with recent encryption methodologies, we highlight that our approach is effective, robust and secure.
Similar content being viewed by others
Data availability
Authors declare that all the data being used in the design and production cum layout of the manuscript is declared in the manuscript.
References
Washington LC (2008) Elliptic curves: number theory and cryptography, Second edition. Chapman and Hall/CRC, New York
Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644–654
Hill L (1929) Cryptography in an algebraic alphabet. Am Math Mon 36(6):306–312
Ismail I, Amin M (2006) Diab: how to repair the Hill cipher. J Zhejiang Univ Sci A 7(12):2022–2030
Miller V (1986) Use of elliptic curves in cryptography. In: Advances in Cryptology-CRYPTO’85 Proceedings, pp 417–426
Koblitz N (1987) Elliptic curve cryptography. Math Comput 48:203–209
Shanon C (1949) Communication theory of security. Bell Syst Tech J 28:656–715
Jiao K, Dong Y, Huang X, He J (2020) Image encryption scheme based on a generalised Arnold map and RSA algorithm. Secur Commun Netw. https://doi.org/10.1155/2020/9721675
Baptista MS (1998) Cryptography with chaos. Phys Lett A 240:50–54
Luo Y, Zhou R, Liu J, Qui S, Cao Y (2020) An efficient and self-adapting colour image encryption algorithm based on chaos and interactions among multiple layers. Multimed Tools Appl 77(20):26191–26217
Boruzni S, Ehsani M (2015) Modified logistic maps for cryptographic application. Appl Math 6:773–782
Rostami M, Shahba A, Saryazdi S, Pour H (2017) A novel parallel image encrption with chaotic windows based on logistic map. Comput Electr Eng 62:384–400
Essaid M, Akharraz A, Saaidi A, Mouhib A (2019) Image encryption scheme based on a new secure variant of Hill cipher and 1D chaotic maps. J Inform Secur Appl 47:173–187
Hasheminejad A, Rostani MJ (2019) A novel bit level multiphase algorithm for image encryption based on PWLCM chaotic map. Opt Int J Light Electron Opt 184:205–213
Lone P, Singh D, Mir U (2021) A novel image encryption using random matrix affine cipher and the chaotic maps. J Mod Opt 68(10):507–521
Pourasad Y, Ranjbarzadeh R, Mardani A (2021) A new algorithm for digital image encryption based on chaos theory. Entropy-MDPI 23(3):341
Pak C, Huang L (2017) A new color image encryption using combination of the 1D chaotic map. Signal Process 138:129–137
Rashid A, Hussein K (2023) Image encryption algorithm based on the density and 6D logistic map. Int J Elect Comput Eng 13(2):1903–1913
Mansouri A, Wang X (2020) A novel one-dimensional sin powered chaotic map and its application in a new image encryption scheme. Inform Sci 520:46–62
Hua Z, Zhu Z, Chen M, Yuanman L (2021) Color image encryption using orthogonal latin squares and a new 2D chaotic system. Nonlinear Dyn 104:4505–4522
Zhou J, Zhou N, Gong L (2020) Fast color image encryption scheme based on 3D orthogonal latin squares and matching matrix. Opt Laser Technol 131(6):106437
Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations. Opt Lasers Eng 88:197–213
Kumar M, Iqbal A, Kumar P (2016) A new RGB image encryption algorithm based on DNA encoding and elliptic curve Diffie-Hellman cryptography. Signal Process 125:187–202
Singh L, Singh K (2015) Image encryption using elliptic curve cryptography. Proc Comput Sci 54:472–481
Singh L, Singh K (2018) A robust image encryption scheme based on chaotic system and elliptic curve over finite field. Multimed Tools Appl 77(11):8629–8652
Zhang X, Wang X (2018) Digital image encryption algorithm based on elliptic curve public cryptosystems. IEEE Access 6:70025–70034
Liang H, Zhang G, Hou W, Huang P, Liu B, Li S (2021) A novel asymmetric hyperchaotic image encryption scheme based on ellitpic curve cryptograpy. Appl Sci MDPI 11(12):5691
Wu J, Liao X, Yang B (2017) Color image encryption based on chaotic systems and elliptic curve ElGamal scheme. Signal Process 141:109–124
Keshavamurthy C, Revanna C (2019) Hybrid method of document image encryption using ECC and multiple chaotic maps. Int J Recent Technol Eng 8(4):1615–1629
Farwa S, Bibi N, Muhammad N (2020) An efficient image encryption scheme using Fresnelet transfrom and elliptic curve based scrambling. Multimed Tools Appl 37–38:28225–28232
Sneha PS, Sankar S, Kumar A (2019) A chaotic colour image encryption scheme combining Walsh–Hadmard transform and Arnold-tent map. J Ambient Intel Hum Comput. https://doi.org/10.1007/s12652-019-01385-0
Jiao K, Guodong Y, Dong Y, Huang X, He J (2020) Image encryption scheme based on a generalized Arnold map and RSA algorithm. Secur Commun Netw. https://doi.org/10.1155/2020/9721675
Broumandnia A (2020) Image encryption algorithm based on the finite fields in chaotic map. Journal of Information Secur Appl 54
Zhu X, Liu H, Liang Y, Wu J (2020) Image encryption based on Kronecker product over finite fields and DNA operation. Int J Light Elect Opt 224:102553
Parida P, Pradhan C, Gao X, Roy D (2021) Image encryption and authentication with elliptic curve cryptography and multidimensional chaotic maps. IEEE Access 9:164725
Dawahdeh Z, Yakoob S, Othman R (2017) A new image encryption technique combining elliptic curve cryptosystem with Hill cipher. J King Saud Univ Comput Inform Sci 30(3):349–355
Vamsi V, Reddy P (2022) Hybrid image encryption using elliptic curve cryptography, hadmard transform and hill cipher. Webology 19
Zhu S, Zhu C (2018) Image encryption algorithm with an avalanche effect based on a six dimensional discrete chaotic system. Multimed Tools Appl 77(21):29119–29142
Li N, Sun J, Wang Y (2019) A novel memcapacitor model and its application for image encryption based on PWLCM chaotic map. Optik 184:205–213
Lone P, Singh D, Stoffova V, Mishra D, Mir U, Kumar N (2022) Cryptanalysis and improved image encryption scheme using elliptic curve and Affine-Hill cipher. Mathematics 10:3878
Dua M, Kumar A, Garg A (2022) Multiple image encryption approach using non linear chaotic map and cosine transformation. Int J Inf Technol 14:1627–1641. https://doi.org/10.1007/s41870-022-00885-1
Ahuja B, Doriya R (2023) A secure algorithm using high-dimensional sine map for color image encryption. Int J Inf Technol 15:1535–1543. https://doi.org/10.1007/s41870-023-01190-1
Sharma M, Ranjan RK, Bharti V (2023) An improved image encryption algorithm using a new byte-shuffled Henon map. Int J Inf Technol 15:267–277. https://doi.org/10.1007/s41870-022-01092-8
Das S, Sanyal MK (2023) Dynamic key generator based colour medical image protection algorithm using 3D unified chaotic system and dynamic DNA coding. Int J Inf Technol 15:1015–1033. https://doi.org/10.1007/s41870-022-01119-0
Ahuja B, Doriya R (2021) A novel hybrid compressive encryption cryptosystem based on block quarter compression via DCT and fractional Fourier transform with chaos. Int J Inf Technol 13:1837–1846. https://doi.org/10.1007/s41870-021-00759-
Merkle J, Lochter M (2010) Elliptic curve cryptography (ECC) brainpool standard curves and curve generation. In: RFC 5639. https://doi.org/10.17487/RFC5639
The USC-SIPI Image Database, University of Southern California, Signal and Image Processing Institute. Available at: http://sipi.usc.edu/database/, Accessed (2013)
Acknowledgements
First author acknowledges the DST-INSPIRE for supporting this research.
Funding
The authors received no specific funding for this study.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflicts of interest to report regarding the present study.
Ethics approval
No human subject or animals are involved in the research.
Consent to participate
All authors have mutually consented to participate.
Consent to publish
All the authors have consented the journal to publish this paper.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Gupta, S., Nitish, Harish, M. et al. A hybrid authenticated image encryption scheme using elliptic curves for enhanced security. Int. j. inf. tecnol. (2024). https://doi.org/10.1007/s41870-024-01737-w
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s41870-024-01737-w