Skip to main content

Color Image Encryption: A New Public Key Cryptosystem Based on Polynomial Equation

  • 1407 Accesses

Part of the Lecture Notes in Computational Vision and Biomechanics book series (LNCVB,volume 30)

Abstract

Image security is the need of today’s era. The security task is being convoluted as there are a variety of data to secure as different levels of data security is needed based on the data type. Encryption is the maximum expedient approach to guarantee the safety of images over public networks. We have proposed a new public key cryptosystem based on polynomial equation. This approach has been desired because of their resistance to the cryptanalysis attacks. Parameters such as correlation coefficient, entropy, histogram analysis are used for the efficiency of our proposed method. The theoretic and simulation result provides a high quantity of protection. Thus, it is suitable for practical use in secure communication.

Keywords

  • Polynomial
  • Encryption
  • Decryption

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-030-00665-5_8
  • Chapter length: 10 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   44.99
Price excludes VAT (USA)
  • ISBN: 978-3-030-00665-5
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Hardcover Book
USD   59.99
Price excludes VAT (USA)
Fig. 1
Fig. 2
Fig. 3
Fig. 4

References

  1. Gonzalez W (2008) Digital image processing, 2nd edn. Prentice Hall, Englewood Cliffs

    Google Scholar 

  2. Stallings W (2014) Cryptography and network security, principle and practice, 6th edn

    Google Scholar 

  3. Tambe Chaitali A, Gadilkar Rupali S, Pawar Vimal T (2017) A survey on new image encryption algorithm based on Diffie-Hellman and singular value decomposition. Int J Innov Res Comput Commun Eng

    Google Scholar 

  4. Seyedzade SM, Atani RE, Mirzakuchaki S (2010) A novel image encryption algorithm based on hash function. In: 6th Iranian conference on machine vision and image processing, 27–28 Oct 2010, pp 1–6

    Google Scholar 

  5. Hashim HR, Neamaa IA (2014) Image encryption and decryption in a modification of ElGamal cryptosystem in MATLAB. Int J Sci: Basic Appl Res 14(2):141–147

    Google Scholar 

  6. Khachatrian G, Kyureghyan M (2014) A new public key encryption system based on permutation polynomials. In: IEEE international conference on cloud engineering

    Google Scholar 

  7. Sokouti M, Zakerolhosseini A, Sokouti B (2016) Medical Image encryption: an application for improved padding based GGH encryption algorithm. Open Med Inf J

    Google Scholar 

  8. Dwivedi N, Gupta RK, Agarwal S (2017) Image encryption using curved scrambling and diffusion. Int J Eng Technol

    Google Scholar 

  9. Wagh NB, Kolhekar M (2017) A novel approach utilizing permutation polynomials over integer rings as a cryptological application for effective encryption of digital images., IJCSE 5(1). E-ISSN 2347–2693

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. K. Kavitha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Verify currency and authenticity via CrossMark

Cite this paper

Kavitha, P.K., Vidhya Saraswathi, P. (2019). Color Image Encryption: A New Public Key Cryptosystem Based on Polynomial Equation. In: Pandian, D., Fernando, X., Baig, Z., Shi, F. (eds) Proceedings of the International Conference on ISMAC in Computational Vision and Bio-Engineering 2018 (ISMAC-CVB). ISMAC 2018. Lecture Notes in Computational Vision and Biomechanics, vol 30. Springer, Cham. https://doi.org/10.1007/978-3-030-00665-5_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00665-5_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00664-8

  • Online ISBN: 978-3-030-00665-5

  • eBook Packages: EngineeringEngineering (R0)