Multimedia Tools and Applications

, Volume 77, Issue 7, pp 8629–8652 | Cite as

A robust image encryption scheme based on chaotic system and elliptic curve over finite field

  • Dolendro Singh Laiphrakpam
  • Manglem Singh Khumanthem


The paper proposes a robust image encryption scheme based on chaotic system and elliptic curve over a finite field. The sender and receiver agree on an elliptic curve point based on Diffie-Hellman public key sharing technique. The logistic map is used to generate a chaotic sequence with initial conditions derived from the shared elliptic curve point. The chaotic sequence is converted to integers and the point multiplication is performed with the shared elliptic curve point. The resulting elliptic curve points are converted to byte values to generate a random sequence. The image to be encrypted is scrambled using Arnold’s transform where the number of scrambling rounds is derived from the shared elliptic curve point. The scrambled image pixels value is XOR with the random sequence to generate the cipher image. Statistical, performance, security and robustness analyses show that the proposed scheme is a robust encryption scheme with the ability to resist from different types of attacks.


Chaotic system Elliptic curve cryptography Arnold’s transform Image encryption Diffie-Hellman public key exchange 


  1. 1.
    Ahmed AAL, Xiamu N (2013) A hybrid chaotic system and cyclic elliptic curve for image encryption. Int J Electron Commun 67:136–143CrossRefGoogle Scholar
  2. 2.
    Akram B, Ahmed AAE, Safya B (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process 128:155–170CrossRefGoogle Scholar
  3. 3.
    Andrew R, Juan S, James N, Miles S, Elaine B, Stefan L, Mark L, Mark V, David B, Alan H, James D, San V (2010) A statistical test suite for random and pseudorandom number generators for cryptographic applications. National institute of standards and technology special publication 800-22 revision 1aGoogle Scholar
  4. 4.
    Alfred JM, Scott AV (1993) Elliptic curve cryptosystems and their implementation. J Cryptol 6:209–224MathSciNetzbMATHGoogle Scholar
  5. 5.
    Ann HK, Neal K, Alfred M (2011) Elliptic curve cryptography: the serpentine course of a paradigm shift. J Number Theory 131:781–814MathSciNetCrossRefzbMATHGoogle Scholar
  6. 6.
    Brown M, Darrel H, Lopez J, Alfred M (2001) Software implementation of the NIST elliptic curves over prime fields, topics in cryptology - CT-RSA, vol 2020. Springer, Berlin Heidelberg, pp 250–265zbMATHGoogle Scholar
  7. 7.
    Darrel H, Alfred M, Scott V (2004) Guide to elliptic curve cryptography. Springer, New YorkzbMATHGoogle Scholar
  8. 8.
    Deepthi PP, Nithin VS, Sathidevi PS (2009) Implementation and analysis of stream ciphers based on the elliptic curves. Comput Electr Eng 35:300–314CrossRefzbMATHGoogle Scholar
  9. 9.
    ECC Brainpool Standard Curves and Curve Generation v. 1.0 (2005)
  10. 10.
    Hong L, Yanbing L (2014) Cryptanalysis an image encryption scheme based on hybrid chaotic system and cyclic elliptic curve. Opt Laser Technol 56:15–19CrossRefGoogle Scholar
  11. 11.
    Hua Z, Zhou Y, Pun CM, Philip CCL (2015) 2D sine logistic modulation map for image encryption. Inf Sci 297:80–94CrossRefGoogle Scholar
  12. 12.
    Lawrence CW (2008) Elliptic curves number theory and cryptography, 2nd edn. CRC Press Taylor & Francis Group, Florida, New York and United KingdomzbMATHGoogle Scholar
  13. 13.
    Li L, Ahmed AAL, Xiamu N (2012) Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret images. Signal Process 92:1069–1078CrossRefGoogle Scholar
  14. 14.
    Manish K, Akhlad I, Pranjal K (2016) A new RGB image encryption algorithm based on DNA encoding and elliptic curve Diffie–Hellman cryptography. Signal Process 125:187–202CrossRefGoogle Scholar
  15. 15.
    Mariusz D, Michal P, Roman R (2015) A new quaternion-based encryption method for DICOM images. IEEE Trans Image Process 24(11):4614–4622MathSciNetCrossRefGoogle Scholar
  16. 16.
    Neal K (1987) Elliptic curve cryptosystems. Math Comput 48:203–209MathSciNetCrossRefzbMATHGoogle Scholar
  17. 17.
    Pollard J M (1978) Monte Carlo methods for index computation (mod p). Math Comp 32:918–924MathSciNetzbMATHGoogle Scholar
  18. 18.
    Puneet K, Shashi B (2016) Development of modified AES algorithm for data security. Optik 127:2341–2345CrossRefGoogle Scholar
  19. 19.
    Robert MM (1976) Simple mathematical models with very complicated dynamics. Nature 261(5560):459–467CrossRefzbMATHGoogle Scholar
  20. 20.
    Salim MW, Nasharuddin Z (2015) Decomposition by binary codes-based speedy image encryption algorithm for multiple applications. IET Image Process 9(5):413–423CrossRefGoogle Scholar
  21. 21.
  22. 22.
    Schoof R (1995) Counting points on elliptic curves over finite fields. J Theorie des Nombres de Bordeaux 7:219–254MathSciNetCrossRefzbMATHGoogle Scholar
  23. 23.
    Shanks D (1969) Class number, a theory of factorization and genera. Proc Symp Pure Math 20:415–440CrossRefGoogle Scholar
  24. 24.
    Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27(3):379–423MathSciNetCrossRefzbMATHGoogle Scholar
  25. 25.
    Taher E (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31(4):469–472MathSciNetCrossRefzbMATHGoogle Scholar
  26. 26.
    Ugus O, Westhoff D, Laue R, Shoufan A, Huss SA (2009) Optimized implementation of elliptic curve based additive homomorphic encryption for wireless sensor networks. arXiv:0903.3900 [cs.CR]
  27. 27.
    Victor M (1986) Use of elliptic curves in cryptography. Adv Cryptol-CRYPTO’85 218:417–426MathSciNetGoogle Scholar
  28. 28.
    Vladimir A, Avez A (1968) Ergodic problems in classical mechanics, Benjamin, New YorkGoogle Scholar
  29. 29.
    Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92(4):1101–1108MathSciNetCrossRefGoogle Scholar
  30. 30.
    Whitfield D, Martin EH (1976) New directions in cryptography. IEEE Trans Inf Theory 22:644–654MathSciNetCrossRefzbMATHGoogle Scholar
  31. 31.
    Xingyuan W, Hui-li Z (2015) A color image encryption with heterogeneous bit-permutation and correlated chaos. Opt Commun 342:51–60CrossRefGoogle Scholar
  32. 32.
    Zeinab F, Hassan N, Ahmed M (2016) An efficient and secure cipher scheme for images confidentiality preservation. Signal Process Image Commun 42:90–108CrossRefGoogle Scholar
  33. 33.
    Zhou W, Alan CB, Hamid RS, Eero PS (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13:600–612CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2017

Authors and Affiliations

  • Dolendro Singh Laiphrakpam
    • 1
  • Manglem Singh Khumanthem
    • 1
  1. 1.National Institute of TechnologyManipurIndia

Personalised recommendations