We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

Efficient Hybrid Image Cryptosystem using ECC and Chaotic Map

by Kamlesh Gupta, Sanjay Silakari
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 29 - Number 3
Year of Publication: 2011
Authors: Kamlesh Gupta, Sanjay Silakari
10.5120/3548-4866

Kamlesh Gupta, Sanjay Silakari . Efficient Hybrid Image Cryptosystem using ECC and Chaotic Map. International Journal of Computer Applications. 29, 3 ( September 2011), 1-13. DOI=10.5120/3548-4866

@article{ 10.5120/3548-4866,
author = { Kamlesh Gupta, Sanjay Silakari },
title = { Efficient Hybrid Image Cryptosystem using ECC and Chaotic Map },
journal = { International Journal of Computer Applications },
issue_date = { September 2011 },
volume = { 29 },
number = { 3 },
month = { September },
year = { 2011 },
issn = { 0975-8887 },
pages = { 1-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume29/number3/3548-4866/ },
doi = { 10.5120/3548-4866 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:14:47.110103+05:30
%A Kamlesh Gupta
%A Sanjay Silakari
%T Efficient Hybrid Image Cryptosystem using ECC and Chaotic Map
%J International Journal of Computer Applications
%@ 0975-8887
%V 29
%N 3
%P 1-13
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Encryption is used to securely transmit data in open networks. Each type of data has its own features; therefore different techniques should be used to protect confidential image data from unauthorized access. The asymmetric cryptography doesn’t fit for transmission of Images, since it takes more time for encryption at the source and likewise for decryption at the destination. We are therefore using hybrid cryptosystem, In this paper, we designed an algorithm to generate diffusion template using 3D standard map and rotated image by using vertically and horizontally red and green plane of the input color image. We then shuffled the red, green, and blue plane by using 3D Cat map and Standard map. Finally the Image is encrypted by performing XOR operation on the shuffled image and diffusion template. The objectives of this new design includes: (1) to efficiently extract good pseudorandom sequences from a cascading of 3D cat and Standard map for color image and (2) to simultaneously perform permutation and diffusion operations for fast encryption. The symmetric key cryptography totally depends on the session key, we are using ECC algorithm for session key exchange in secure manner.

References
  1. W. Diffie and M. E. Hellman, “New directions in cryptography”, IEEE Trans. Information Theory, IT-22(6), pp. 644–654, 1976.
  2. R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems”, Comm. ACM, 21(2), pp. 120–126, 1978.
  3. T. ElGamal, “A public key cryptosystem and a signature scheme based on discrete logarithms”. IEEE Trans. Inform. Theory, 31(4), pp. 469–472, 1985.
  4. FIPS “ Digital Signature Standard. Federal Information Processing Standards Publication”, 186-2, February 2000.
  5. V. Shoup “Lower bounds for discrete logarithms and related problems”, In Advances in cryptology—EUROCRYPT ’97, volume 1233 of LNCS, pp. 256–266, 1997.
  6. Yong Wanga, Kwok-Wo Wong, Xiaofeng Liao, Guanrong Chen, “A new chaos-based fast image encryption algorithm”, Applied Soft Computing pp. 514–522, 2011 www.elsevier.com/locate/asoc.
  7. Z. Guan, F. Huang, W. Guan, “Chaos-based image encryption algorithm”, Physics Letters A 346, pp. 153–157, 2005
  8. S. Lian, J. Sun, Z. Wang, “A block cipher based on a suitable use of the chaotic standard map”, Chaos Solitons & Fractals 26, pp. 117–129, 2005
  9. K.W. Wong, B.S. Kwok, W.S. Law, “A fast image encryption scheme based on chaotic standard map”, Physics Letters A 372, pp. 2645–2652, 2008
  10. Y. Mao, G. Chen, S. Lian, “A novel fast image encryption scheme based on 3D chaotic baker maps”, International Journal of Bifurcation and Chaos 14, pp. 3613–3624, 2004.
Index Terms

Computer Science
Information Sciences

Keywords

Image encryption Chaos function Cat map Standard map Elliptic Curve Cryptography