Robust and Lightweight Image Encryption Approach Using Public Key Cryptosystem

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 765)

Abstract

With significant progress in cryptographic protocols, it has been seen that not all efficient protocols were investigated for encrypting image. At present, we find that existing approaches for image encryption still lacks robustness with respect to forward as well as backward secrecy. Harnessing the potential feature of public key cryptosystem, the proposed system utilizes elliptical curve cryptography for cost effective computation of secret keys required for performing encryption. The security strength is further leveraged by using nucleotide sequencing rules in order to perform scrambling operation of the encrypted image and thereby offering dual layer of security. The study outcome shows that proposed system offers better retention of signal quality as well as lower level of correlation in order to prove better imperceptible features in contrast to existing approaches.

Keywords

Image encryption Public key encryption Elliptical curve cryptography Image security 

References

  1. 1.
    Aumasson, J.-P.: Serious Cryptography: A Practical Introduction to Modern Encryption. No Starch Press, San Francisco (2017)Google Scholar
  2. 2.
    Abd El-Samie, F.E., Ahmed, H.E.H., Elashry, I.F., Shahieen, M.H.: Image Encryption: A Communication Perspective. CRC Press, Boca Raton (2013)CrossRefGoogle Scholar
  3. 3.
    Mancy, L., Vigila S, M.C.: A survey on protection of medical images. In: 2015 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), Kumaracoil, pp. 503–506 (2015)Google Scholar
  4. 4.
    Shunmugan, S., Rani, P.A.J.: Encryption-then-compression techniques: a survey. In: 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), Kumaracoil, pp. 675–679 (2016)Google Scholar
  5. 5.
    Sankpal, P.R., Vijaya, P.A.: Image encryption using chaotic maps: a survey. In: 2014 Fifth International Conference on Signal and Image Processing, Jeju Island, pp. 102–107 (2014)Google Scholar
  6. 6.
    Leenes, R., van Brakel, R., Gutwirth, S., De Hert, P.: Data Protection and Privacy: (In)visibilities and Infrastructures. Springer, New York (2017)CrossRefGoogle Scholar
  7. 7.
    Li, W.: Correlation based cryptanalysis on a chaotic encryption of JPEG image. In: 2014 7th International Congress on Image and Signal Processing, Dalian, pp. 628–632 (2014)Google Scholar
  8. 8.
    Shie, S.-C., Lin, S.D., Jiang, J.-H.: Visually imperceptible image hiding scheme based on vector quantization. Elsevier-Inf. Process. Manag. 46(5), 495–501 (2010)CrossRefGoogle Scholar
  9. 9.
    Hasan, H., Kareem, S.A., Jaleel, J.: Information Hiding Text in Image: Encryption. Lap Lambert Academic Publishing GmbH KG, Saarbrücken (2012)Google Scholar
  10. 10.
    Awad, W.S.: Improving Information Security Practices through Computational Intelligence. IGI Global, Hershey (2015)Google Scholar
  11. 11.
    A-Rammahi, A.: Encryption image using small order linear systems and repeated modular numbers. In: Proceedings of the World Congress on Engineering, vol. II (2014)Google Scholar
  12. 12.
    Loukhaoukha, K., Chouinard, J.-Y., Berdai, A.: Research article a secure image encryption algorithm based on Rubik’s cube principle. Hindawi Publ. Corp. J. Electr. Comput. Eng. 2012, 13 (2012)MATHGoogle Scholar
  13. 13.
    Al-Maadeed, S., Al-Ali, A., Abdalla, T.: Research article a new chaos-based image-encryption and compression algorithm. Hindawi Publ. Corp. J. Electr. Comput. Eng. 2012, 11 (2012)MATHGoogle Scholar
  14. 14.
    Zhang, J., Zhang, Y.: Research article an image encryption algorithm based on balanced pixel and chaotic map. Hindawi Publ. Corp. Math. Prob. Eng. 2014, 7 (2014)Google Scholar
  15. 15.
    Askar, S.S., Karawia, A.A., Alshamrani, A.: Research article image encryption algorithm based on chaotic economic model. Hindawi Publ. Corp. Math. Probl. Eng. 2015, 10 (2015)Google Scholar
  16. 16.
    Yang, G., Jin, H., Bai, N.: Research article image encryption using the chaotic josephus matrix. Hindawi Publ. Corp. Math. Probl. Eng. 2014, 13 (2014)Google Scholar
  17. 17.
    A-Perez, F., C-Hernández, C., M-Escobar, M.A., L-Gutiérrez, R.M., A-Delgado, A.: Research article A fingerprint image encryption scheme based on hyperchaotic Rössler Map. Hindawi Publ. Corp. Math. Probl. Eng. 2016, 15 (2016)Google Scholar
  18. 18.
    Niu, Y., Zhang, X., Han, F.: Research article image encryption algorithm based on hyperchaotic maps and nucleotide sequences database. Hindawi Comput. Intell. Neurosci. 2017, 9 (2017)Google Scholar
  19. 19.
    Lu, W., Varna, A.L., Wu, M.: Confidentiality-preserving image search: a comparative study between homomorphic encryption and distance-preserving randomization. IEEE Access 2, 125–141 (2014)CrossRefGoogle Scholar
  20. 20.
    Zhang, X., Han, F., Niu, Y.: Research article chaotic image encryption algorithm based on bit permutation and dynamic DNA encoding. Hindawi Comput. Intell. Neurosci. 2017, 11 (2017)Google Scholar
  21. 21.
    Mikhail, M., Abouelseoud, Y., ElKobrosy, G.: Research article two-phase image encryption scheme based on FFCT and fractals. Hindawi Secur. Commun. Netw. 2017, 13 (2017)Google Scholar
  22. 22.
    Chen, W.: Optical multiple-image encryption using three-dimensional space. IEEE Photonics J. 8(2), 1–8 (2016)MathSciNetGoogle Scholar
  23. 23.
    Li, X., et al.: Multiple-image encryption based on compressive ghost imaging and coordinate sampling. IEEE Photonics J. 8(4), 1–11 (2016)Google Scholar
  24. 24.
    Wang, X., Zhou, G., Dai, C., Chen, J.: Optical image encryption with divergent illumination and asymmetric keys. IEEE Photonics J. 9(2), 1–8 (2017)Google Scholar
  25. 25.
    Wu, X., Zhu, B., Hu, Y., Ran, Y.: A novel color image encryption scheme using rectangular transform-enhanced chaotic tent maps. IEEE Access 5, 6429–6436 (2017)Google Scholar
  26. 26.
    El-Latif, A.A.A., Abd-El-Atty, B., Talha, M.: Robust encryption of quantum medical images. IEEE Access, PP(99), 1Google Scholar
  27. 27.
    Hamza, R., Muhammad, K., Nachiappan, A., González, G.R.: Hash based encryption for keyframes of diagnostic hysteroscopy. IEEE Access, PP(99), 1Google Scholar
  28. 28.
    Fan, H., Li, M.: Research article cryptanalysis and improvement of chaos-based image encryption scheme with circular inter-intra-pixels bit-level permutation. Hindawi Math. Probl. Eng. 2017, 11 (2017)Google Scholar
  29. 29.
    Zhao, J.-F., Wang, S.-Y., Zhang, L.-T., Wang, X.-Y.: Research article image encryption algorithm based on a novel improper fractional-order attractor and a wavelet function map. Hindawi J. Electr. Comput. Eng. 2017, 10 (2017)Google Scholar
  30. 30.
    Li, T., Yang, M., Wu, J., Jing, X.: Research article A novel image encryption algorithm based on a fractional-order hyperchaotic system and DNA computing. Hindawi Complex. 2017, 13 (2017)MATHGoogle Scholar
  31. 31.
    Singh, L.D., Singh, K.M.: Image encryption using elliptic curve cryptography. In: Elsevier-Eleventh International Multi-Conference on Information Processing, vol. 54, pp. 472–481 (2015)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2019

Authors and Affiliations

  1. 1.MVJ College of EngineeringBengaluruIndia
  2. 2.VITVelloreIndia

Personalised recommendations