# A robust image encryption scheme based on chaotic system and elliptic curve over finite field

- 137 Downloads
- 1 Citations

## Abstract

The paper proposes a robust image encryption scheme based on chaotic system and elliptic curve over a finite field. The sender and receiver agree on an elliptic curve point based on Diffie-Hellman public key sharing technique. The logistic map is used to generate a chaotic sequence with initial conditions derived from the shared elliptic curve point. The chaotic sequence is converted to integers and the point multiplication is performed with the shared elliptic curve point. The resulting elliptic curve points are converted to byte values to generate a random sequence. The image to be encrypted is scrambled using Arnold’s transform where the number of scrambling rounds is derived from the shared elliptic curve point. The scrambled image pixels value is XOR with the random sequence to generate the cipher image. Statistical, performance, security and robustness analyses show that the proposed scheme is a robust encryption scheme with the ability to resist from different types of attacks.

## Keywords

Chaotic system Elliptic curve cryptography Arnold’s transform Image encryption Diffie-Hellman public key exchange## References

- 1.Ahmed AAL, Xiamu N (2013) A hybrid chaotic system and cyclic elliptic curve for image encryption. Int J Electron Commun 67:136–143CrossRefGoogle Scholar
- 2.Akram B, Ahmed AAE, Safya B (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process 128:155–170CrossRefGoogle Scholar
- 3.Andrew R, Juan S, James N, Miles S, Elaine B, Stefan L, Mark L, Mark V, David B, Alan H, James D, San V (2010) A statistical test suite for random and pseudorandom number generators for cryptographic applications. National institute of standards and technology special publication 800-22 revision 1aGoogle Scholar
- 4.Alfred JM, Scott AV (1993) Elliptic curve cryptosystems and their implementation. J Cryptol 6:209–224MathSciNetMATHGoogle Scholar
- 5.Ann HK, Neal K, Alfred M (2011) Elliptic curve cryptography: the serpentine course of a paradigm shift. J Number Theory 131:781–814MathSciNetCrossRefMATHGoogle Scholar
- 6.Brown M, Darrel H, Lopez J, Alfred M (2001) Software implementation of the NIST elliptic curves over prime fields, topics in cryptology - CT-RSA, vol 2020. Springer, Berlin Heidelberg, pp 250–265MATHGoogle Scholar
- 7.Darrel H, Alfred M, Scott V (2004) Guide to elliptic curve cryptography. Springer, New YorkMATHGoogle Scholar
- 8.Deepthi PP, Nithin VS, Sathidevi PS (2009) Implementation and analysis of stream ciphers based on the elliptic curves. Comput Electr Eng 35:300–314CrossRefMATHGoogle Scholar
- 9.ECC Brainpool Standard Curves and Curve Generation v. 1.0 (2005) http://www.ecc-brainpool.org/download/Domain-parameters.pdf
- 10.Hong L, Yanbing L (2014) Cryptanalysis an image encryption scheme based on hybrid chaotic system and cyclic elliptic curve. Opt Laser Technol 56:15–19CrossRefGoogle Scholar
- 11.Hua Z, Zhou Y, Pun CM, Philip CCL (2015) 2D sine logistic modulation map for image encryption. Inf Sci 297:80–94CrossRefGoogle Scholar
- 12.Lawrence CW (2008) Elliptic curves number theory and cryptography, 2nd edn. CRC Press Taylor & Francis Group, Florida, New York and United KingdomMATHGoogle Scholar
- 13.Li L, Ahmed AAL, Xiamu N (2012) Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret images. Signal Process 92:1069–1078CrossRefGoogle Scholar
- 14.Manish K, Akhlad I, Pranjal K (2016) A new RGB image encryption algorithm based on DNA encoding and elliptic curve Diffie–Hellman cryptography. Signal Process 125:187–202CrossRefGoogle Scholar
- 15.Mariusz D, Michal P, Roman R (2015) A new quaternion-based encryption method for DICOM images. IEEE Trans Image Process 24(11):4614–4622MathSciNetCrossRefGoogle Scholar
- 16.Neal K (1987) Elliptic curve cryptosystems. Math Comput 48:203–209MathSciNetCrossRefMATHGoogle Scholar
- 17.Pollard J M (1978) Monte Carlo methods for index computation (mod p). Math Comp 32:918–924MathSciNetMATHGoogle Scholar
- 18.Puneet K, Shashi B (2016) Development of modified AES algorithm for data security. Optik 127:2341–2345CrossRefGoogle Scholar
- 19.Robert MM (1976) Simple mathematical models with very complicated dynamics. Nature 261(5560):459–467CrossRefMATHGoogle Scholar
- 20.Salim MW, Nasharuddin Z (2015) Decomposition by binary codes-based speedy image encryption algorithm for multiple applications. IET Image Process 9(5):413–423CrossRefGoogle Scholar
- 21.Sample Images, http://sipi.usc.edu/database/
- 22.Schoof R (1995) Counting points on elliptic curves over finite fields. J Theorie des Nombres de Bordeaux 7:219–254MathSciNetCrossRefMATHGoogle Scholar
- 23.Shanks D (1969) Class number, a theory of factorization and genera. Proc Symp Pure Math 20:415–440CrossRefGoogle Scholar
- 24.Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27(3):379–423MathSciNetCrossRefMATHGoogle Scholar
- 25.Taher E (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31(4):469–472MathSciNetCrossRefMATHGoogle Scholar
- 26.Ugus O, Westhoff D, Laue R, Shoufan A, Huss SA (2009) Optimized implementation of elliptic curve based additive homomorphic encryption for wireless sensor networks. arXiv:0903.3900 [cs.CR]
- 27.Victor M (1986) Use of elliptic curves in cryptography. Adv Cryptol-CRYPTO’85 218:417–426MathSciNetGoogle Scholar
- 28.Vladimir A, Avez A (1968) Ergodic problems in classical mechanics, Benjamin, New YorkGoogle Scholar
- 29.Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92(4):1101–1108MathSciNetCrossRefGoogle Scholar
- 30.Whitfield D, Martin EH (1976) New directions in cryptography. IEEE Trans Inf Theory 22:644–654MathSciNetCrossRefMATHGoogle Scholar
- 31.Xingyuan W, Hui-li Z (2015) A color image encryption with heterogeneous bit-permutation and correlated chaos. Opt Commun 342:51–60CrossRefGoogle Scholar
- 32.Zeinab F, Hassan N, Ahmed M (2016) An efficient and secure cipher scheme for images confidentiality preservation. Signal Process Image Commun 42:90–108CrossRefGoogle Scholar
- 33.Zhou W, Alan CB, Hamid RS, Eero PS (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13:600–612CrossRefGoogle Scholar