Skip to main content

2019 | OriginalPaper | Buchkapitel

Robust and Lightweight Image Encryption Approach Using Public Key Cryptosystem

verfasst von : Shima Ramesh Maniyath, V. Thanikaiselvan

Erschienen in: Cybernetics and Algorithms in Intelligent Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With significant progress in cryptographic protocols, it has been seen that not all efficient protocols were investigated for encrypting image. At present, we find that existing approaches for image encryption still lacks robustness with respect to forward as well as backward secrecy. Harnessing the potential feature of public key cryptosystem, the proposed system utilizes elliptical curve cryptography for cost effective computation of secret keys required for performing encryption. The security strength is further leveraged by using nucleotide sequencing rules in order to perform scrambling operation of the encrypted image and thereby offering dual layer of security. The study outcome shows that proposed system offers better retention of signal quality as well as lower level of correlation in order to prove better imperceptible features in contrast to existing approaches.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Aumasson, J.-P.: Serious Cryptography: A Practical Introduction to Modern Encryption. No Starch Press, San Francisco (2017) Aumasson, J.-P.: Serious Cryptography: A Practical Introduction to Modern Encryption. No Starch Press, San Francisco (2017)
2.
Zurück zum Zitat Abd El-Samie, F.E., Ahmed, H.E.H., Elashry, I.F., Shahieen, M.H.: Image Encryption: A Communication Perspective. CRC Press, Boca Raton (2013)CrossRef Abd El-Samie, F.E., Ahmed, H.E.H., Elashry, I.F., Shahieen, M.H.: Image Encryption: A Communication Perspective. CRC Press, Boca Raton (2013)CrossRef
3.
Zurück zum Zitat Mancy, L., Vigila S, M.C.: A survey on protection of medical images. In: 2015 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), Kumaracoil, pp. 503–506 (2015) Mancy, L., Vigila S, M.C.: A survey on protection of medical images. In: 2015 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), Kumaracoil, pp. 503–506 (2015)
4.
Zurück zum Zitat Shunmugan, S., Rani, P.A.J.: Encryption-then-compression techniques: a survey. In: 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), Kumaracoil, pp. 675–679 (2016) Shunmugan, S., Rani, P.A.J.: Encryption-then-compression techniques: a survey. In: 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), Kumaracoil, pp. 675–679 (2016)
5.
Zurück zum Zitat Sankpal, P.R., Vijaya, P.A.: Image encryption using chaotic maps: a survey. In: 2014 Fifth International Conference on Signal and Image Processing, Jeju Island, pp. 102–107 (2014) Sankpal, P.R., Vijaya, P.A.: Image encryption using chaotic maps: a survey. In: 2014 Fifth International Conference on Signal and Image Processing, Jeju Island, pp. 102–107 (2014)
6.
Zurück zum Zitat Leenes, R., van Brakel, R., Gutwirth, S., De Hert, P.: Data Protection and Privacy: (In)visibilities and Infrastructures. Springer, New York (2017)CrossRef Leenes, R., van Brakel, R., Gutwirth, S., De Hert, P.: Data Protection and Privacy: (In)visibilities and Infrastructures. Springer, New York (2017)CrossRef
7.
Zurück zum Zitat Li, W.: Correlation based cryptanalysis on a chaotic encryption of JPEG image. In: 2014 7th International Congress on Image and Signal Processing, Dalian, pp. 628–632 (2014) Li, W.: Correlation based cryptanalysis on a chaotic encryption of JPEG image. In: 2014 7th International Congress on Image and Signal Processing, Dalian, pp. 628–632 (2014)
8.
Zurück zum Zitat Shie, S.-C., Lin, S.D., Jiang, J.-H.: Visually imperceptible image hiding scheme based on vector quantization. Elsevier-Inf. Process. Manag. 46(5), 495–501 (2010)CrossRef Shie, S.-C., Lin, S.D., Jiang, J.-H.: Visually imperceptible image hiding scheme based on vector quantization. Elsevier-Inf. Process. Manag. 46(5), 495–501 (2010)CrossRef
9.
Zurück zum Zitat Hasan, H., Kareem, S.A., Jaleel, J.: Information Hiding Text in Image: Encryption. Lap Lambert Academic Publishing GmbH KG, Saarbrücken (2012) Hasan, H., Kareem, S.A., Jaleel, J.: Information Hiding Text in Image: Encryption. Lap Lambert Academic Publishing GmbH KG, Saarbrücken (2012)
10.
Zurück zum Zitat Awad, W.S.: Improving Information Security Practices through Computational Intelligence. IGI Global, Hershey (2015) Awad, W.S.: Improving Information Security Practices through Computational Intelligence. IGI Global, Hershey (2015)
11.
Zurück zum Zitat A-Rammahi, A.: Encryption image using small order linear systems and repeated modular numbers. In: Proceedings of the World Congress on Engineering, vol. II (2014) A-Rammahi, A.: Encryption image using small order linear systems and repeated modular numbers. In: Proceedings of the World Congress on Engineering, vol. II (2014)
12.
Zurück zum Zitat Loukhaoukha, K., Chouinard, J.-Y., Berdai, A.: Research article a secure image encryption algorithm based on Rubik’s cube principle. Hindawi Publ. Corp. J. Electr. Comput. Eng. 2012, 13 (2012)MATH Loukhaoukha, K., Chouinard, J.-Y., Berdai, A.: Research article a secure image encryption algorithm based on Rubik’s cube principle. Hindawi Publ. Corp. J. Electr. Comput. Eng. 2012, 13 (2012)MATH
13.
Zurück zum Zitat Al-Maadeed, S., Al-Ali, A., Abdalla, T.: Research article a new chaos-based image-encryption and compression algorithm. Hindawi Publ. Corp. J. Electr. Comput. Eng. 2012, 11 (2012)MATH Al-Maadeed, S., Al-Ali, A., Abdalla, T.: Research article a new chaos-based image-encryption and compression algorithm. Hindawi Publ. Corp. J. Electr. Comput. Eng. 2012, 11 (2012)MATH
14.
Zurück zum Zitat Zhang, J., Zhang, Y.: Research article an image encryption algorithm based on balanced pixel and chaotic map. Hindawi Publ. Corp. Math. Prob. Eng. 2014, 7 (2014) Zhang, J., Zhang, Y.: Research article an image encryption algorithm based on balanced pixel and chaotic map. Hindawi Publ. Corp. Math. Prob. Eng. 2014, 7 (2014)
15.
Zurück zum Zitat Askar, S.S., Karawia, A.A., Alshamrani, A.: Research article image encryption algorithm based on chaotic economic model. Hindawi Publ. Corp. Math. Probl. Eng. 2015, 10 (2015) Askar, S.S., Karawia, A.A., Alshamrani, A.: Research article image encryption algorithm based on chaotic economic model. Hindawi Publ. Corp. Math. Probl. Eng. 2015, 10 (2015)
16.
Zurück zum Zitat Yang, G., Jin, H., Bai, N.: Research article image encryption using the chaotic josephus matrix. Hindawi Publ. Corp. Math. Probl. Eng. 2014, 13 (2014) Yang, G., Jin, H., Bai, N.: Research article image encryption using the chaotic josephus matrix. Hindawi Publ. Corp. Math. Probl. Eng. 2014, 13 (2014)
17.
Zurück zum Zitat A-Perez, F., C-Hernández, C., M-Escobar, M.A., L-Gutiérrez, R.M., A-Delgado, A.: Research article A fingerprint image encryption scheme based on hyperchaotic Rössler Map. Hindawi Publ. Corp. Math. Probl. Eng. 2016, 15 (2016) A-Perez, F., C-Hernández, C., M-Escobar, M.A., L-Gutiérrez, R.M., A-Delgado, A.: Research article A fingerprint image encryption scheme based on hyperchaotic Rössler Map. Hindawi Publ. Corp. Math. Probl. Eng. 2016, 15 (2016)
18.
Zurück zum Zitat Niu, Y., Zhang, X., Han, F.: Research article image encryption algorithm based on hyperchaotic maps and nucleotide sequences database. Hindawi Comput. Intell. Neurosci. 2017, 9 (2017) Niu, Y., Zhang, X., Han, F.: Research article image encryption algorithm based on hyperchaotic maps and nucleotide sequences database. Hindawi Comput. Intell. Neurosci. 2017, 9 (2017)
19.
Zurück zum Zitat Lu, W., Varna, A.L., Wu, M.: Confidentiality-preserving image search: a comparative study between homomorphic encryption and distance-preserving randomization. IEEE Access 2, 125–141 (2014)CrossRef Lu, W., Varna, A.L., Wu, M.: Confidentiality-preserving image search: a comparative study between homomorphic encryption and distance-preserving randomization. IEEE Access 2, 125–141 (2014)CrossRef
20.
Zurück zum Zitat Zhang, X., Han, F., Niu, Y.: Research article chaotic image encryption algorithm based on bit permutation and dynamic DNA encoding. Hindawi Comput. Intell. Neurosci. 2017, 11 (2017) Zhang, X., Han, F., Niu, Y.: Research article chaotic image encryption algorithm based on bit permutation and dynamic DNA encoding. Hindawi Comput. Intell. Neurosci. 2017, 11 (2017)
21.
Zurück zum Zitat Mikhail, M., Abouelseoud, Y., ElKobrosy, G.: Research article two-phase image encryption scheme based on FFCT and fractals. Hindawi Secur. Commun. Netw. 2017, 13 (2017) Mikhail, M., Abouelseoud, Y., ElKobrosy, G.: Research article two-phase image encryption scheme based on FFCT and fractals. Hindawi Secur. Commun. Netw. 2017, 13 (2017)
22.
Zurück zum Zitat Chen, W.: Optical multiple-image encryption using three-dimensional space. IEEE Photonics J. 8(2), 1–8 (2016)MathSciNet Chen, W.: Optical multiple-image encryption using three-dimensional space. IEEE Photonics J. 8(2), 1–8 (2016)MathSciNet
23.
Zurück zum Zitat Li, X., et al.: Multiple-image encryption based on compressive ghost imaging and coordinate sampling. IEEE Photonics J. 8(4), 1–11 (2016) Li, X., et al.: Multiple-image encryption based on compressive ghost imaging and coordinate sampling. IEEE Photonics J. 8(4), 1–11 (2016)
24.
Zurück zum Zitat Wang, X., Zhou, G., Dai, C., Chen, J.: Optical image encryption with divergent illumination and asymmetric keys. IEEE Photonics J. 9(2), 1–8 (2017) Wang, X., Zhou, G., Dai, C., Chen, J.: Optical image encryption with divergent illumination and asymmetric keys. IEEE Photonics J. 9(2), 1–8 (2017)
25.
Zurück zum Zitat Wu, X., Zhu, B., Hu, Y., Ran, Y.: A novel color image encryption scheme using rectangular transform-enhanced chaotic tent maps. IEEE Access 5, 6429–6436 (2017) Wu, X., Zhu, B., Hu, Y., Ran, Y.: A novel color image encryption scheme using rectangular transform-enhanced chaotic tent maps. IEEE Access 5, 6429–6436 (2017)
26.
Zurück zum Zitat El-Latif, A.A.A., Abd-El-Atty, B., Talha, M.: Robust encryption of quantum medical images. IEEE Access, PP(99), 1 El-Latif, A.A.A., Abd-El-Atty, B., Talha, M.: Robust encryption of quantum medical images. IEEE Access, PP(99), 1
27.
Zurück zum Zitat Hamza, R., Muhammad, K., Nachiappan, A., González, G.R.: Hash based encryption for keyframes of diagnostic hysteroscopy. IEEE Access, PP(99), 1 Hamza, R., Muhammad, K., Nachiappan, A., González, G.R.: Hash based encryption for keyframes of diagnostic hysteroscopy. IEEE Access, PP(99), 1
28.
Zurück zum Zitat Fan, H., Li, M.: Research article cryptanalysis and improvement of chaos-based image encryption scheme with circular inter-intra-pixels bit-level permutation. Hindawi Math. Probl. Eng. 2017, 11 (2017) Fan, H., Li, M.: Research article cryptanalysis and improvement of chaos-based image encryption scheme with circular inter-intra-pixels bit-level permutation. Hindawi Math. Probl. Eng. 2017, 11 (2017)
29.
Zurück zum Zitat Zhao, J.-F., Wang, S.-Y., Zhang, L.-T., Wang, X.-Y.: Research article image encryption algorithm based on a novel improper fractional-order attractor and a wavelet function map. Hindawi J. Electr. Comput. Eng. 2017, 10 (2017) Zhao, J.-F., Wang, S.-Y., Zhang, L.-T., Wang, X.-Y.: Research article image encryption algorithm based on a novel improper fractional-order attractor and a wavelet function map. Hindawi J. Electr. Comput. Eng. 2017, 10 (2017)
30.
Zurück zum Zitat Li, T., Yang, M., Wu, J., Jing, X.: Research article A novel image encryption algorithm based on a fractional-order hyperchaotic system and DNA computing. Hindawi Complex. 2017, 13 (2017)MATH Li, T., Yang, M., Wu, J., Jing, X.: Research article A novel image encryption algorithm based on a fractional-order hyperchaotic system and DNA computing. Hindawi Complex. 2017, 13 (2017)MATH
31.
Zurück zum Zitat Singh, L.D., Singh, K.M.: Image encryption using elliptic curve cryptography. In: Elsevier-Eleventh International Multi-Conference on Information Processing, vol. 54, pp. 472–481 (2015)CrossRef Singh, L.D., Singh, K.M.: Image encryption using elliptic curve cryptography. In: Elsevier-Eleventh International Multi-Conference on Information Processing, vol. 54, pp. 472–481 (2015)CrossRef
Metadaten
Titel
Robust and Lightweight Image Encryption Approach Using Public Key Cryptosystem
verfasst von
Shima Ramesh Maniyath
V. Thanikaiselvan
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-319-91192-2_7