...
首页> 外文期刊>Indian Journal of Science and Technology >Image Security using ECC Approach
【24h】

Image Security using ECC Approach

机译:

获取原文
           

摘要

Objectives: The role of digital images are vast in todays trends and it is exposed to illicit access, modifications that must needs confidentiality during the stages of data archival and communication1, systems, wireless devices. In order to facilitate secret communication, image encryption have bring into being a significant place in both public and private services like as military supervision, health systems, financial services like online trading and video conferencing and so on. Some methods are proposed on the image encryption which they include the Paper2 have developed a method for A Chaotic Key Based Algorithm (CKBA) to change the pixel values of the plain-image. In 3 have developed a protocol for random combinational image encryption approach with bit, pixel and block permutations Paper4 proposed a technique to encrypt an image for secure transmission using the digital signature of the image. Methods: The proposed work is developed that provides secured authentication to integrate the image encryption with Elliptic Curve Cryptography to provide security. In this work, transformation operation of the matrix operations are performed on the original image matrix and the transformed image is further encrypted with the help of a key sequence which is generated from the elliptic Curve. The encrypted image will be authenticated using Elliptic Curve Diffie Helman (ECDH) key exchange algorithm5 and finally decrypted by using the key generated from the chosen elliptic curve and then we perform the reverse transformations on the matrix obtained . So after decryption process to acquire the original image. Findings: In this work we can get better security to image ecryption by application of ECC with matrix operations performed on image data. Because ECC has the well attention of researchers and robust mathematical development and top security among the former existing algorithms. As a result Elliptic Curve Cryptography for image data is developed to meet the current security needs. Application: To transmit securely image data over the wireless channels and systems and so on. Currently this work was currently developed in an ad-hoc fashion and it can be further improved with ECC binary field and various measures of security that includes different attacks.

著录项

获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号