Skip to main content

Robust and Lightweight Image Encryption Approach Using Public Key Cryptosystem

  • Conference paper
  • First Online:
Cybernetics and Algorithms in Intelligent Systems (CSOC2018 2018)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 765))

Included in the following conference series:

Abstract

With significant progress in cryptographic protocols, it has been seen that not all efficient protocols were investigated for encrypting image. At present, we find that existing approaches for image encryption still lacks robustness with respect to forward as well as backward secrecy. Harnessing the potential feature of public key cryptosystem, the proposed system utilizes elliptical curve cryptography for cost effective computation of secret keys required for performing encryption. The security strength is further leveraged by using nucleotide sequencing rules in order to perform scrambling operation of the encrypted image and thereby offering dual layer of security. The study outcome shows that proposed system offers better retention of signal quality as well as lower level of correlation in order to prove better imperceptible features in contrast to existing approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Aumasson, J.-P.: Serious Cryptography: A Practical Introduction to Modern Encryption. No Starch Press, San Francisco (2017)

    Google Scholar 

  2. Abd El-Samie, F.E., Ahmed, H.E.H., Elashry, I.F., Shahieen, M.H.: Image Encryption: A Communication Perspective. CRC Press, Boca Raton (2013)

    Book  Google Scholar 

  3. Mancy, L., Vigila S, M.C.: A survey on protection of medical images. In: 2015 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), Kumaracoil, pp. 503–506 (2015)

    Google Scholar 

  4. Shunmugan, S., Rani, P.A.J.: Encryption-then-compression techniques: a survey. In: 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), Kumaracoil, pp. 675–679 (2016)

    Google Scholar 

  5. Sankpal, P.R., Vijaya, P.A.: Image encryption using chaotic maps: a survey. In: 2014 Fifth International Conference on Signal and Image Processing, Jeju Island, pp. 102–107 (2014)

    Google Scholar 

  6. Leenes, R., van Brakel, R., Gutwirth, S., De Hert, P.: Data Protection and Privacy: (In)visibilities and Infrastructures. Springer, New York (2017)

    Book  Google Scholar 

  7. Li, W.: Correlation based cryptanalysis on a chaotic encryption of JPEG image. In: 2014 7th International Congress on Image and Signal Processing, Dalian, pp. 628–632 (2014)

    Google Scholar 

  8. Shie, S.-C., Lin, S.D., Jiang, J.-H.: Visually imperceptible image hiding scheme based on vector quantization. Elsevier-Inf. Process. Manag. 46(5), 495–501 (2010)

    Article  Google Scholar 

  9. Hasan, H., Kareem, S.A., Jaleel, J.: Information Hiding Text in Image: Encryption. Lap Lambert Academic Publishing GmbH KG, Saarbrücken (2012)

    Google Scholar 

  10. Awad, W.S.: Improving Information Security Practices through Computational Intelligence. IGI Global, Hershey (2015)

    Google Scholar 

  11. A-Rammahi, A.: Encryption image using small order linear systems and repeated modular numbers. In: Proceedings of the World Congress on Engineering, vol. II (2014)

    Google Scholar 

  12. Loukhaoukha, K., Chouinard, J.-Y., Berdai, A.: Research article a secure image encryption algorithm based on Rubik’s cube principle. Hindawi Publ. Corp. J. Electr. Comput. Eng. 2012, 13 (2012)

    MATH  Google Scholar 

  13. Al-Maadeed, S., Al-Ali, A., Abdalla, T.: Research article a new chaos-based image-encryption and compression algorithm. Hindawi Publ. Corp. J. Electr. Comput. Eng. 2012, 11 (2012)

    MATH  Google Scholar 

  14. Zhang, J., Zhang, Y.: Research article an image encryption algorithm based on balanced pixel and chaotic map. Hindawi Publ. Corp. Math. Prob. Eng. 2014, 7 (2014)

    Google Scholar 

  15. Askar, S.S., Karawia, A.A., Alshamrani, A.: Research article image encryption algorithm based on chaotic economic model. Hindawi Publ. Corp. Math. Probl. Eng. 2015, 10 (2015)

    Google Scholar 

  16. Yang, G., Jin, H., Bai, N.: Research article image encryption using the chaotic josephus matrix. Hindawi Publ. Corp. Math. Probl. Eng. 2014, 13 (2014)

    Google Scholar 

  17. A-Perez, F., C-Hernández, C., M-Escobar, M.A., L-Gutiérrez, R.M., A-Delgado, A.: Research article A fingerprint image encryption scheme based on hyperchaotic Rössler Map. Hindawi Publ. Corp. Math. Probl. Eng. 2016, 15 (2016)

    Google Scholar 

  18. Niu, Y., Zhang, X., Han, F.: Research article image encryption algorithm based on hyperchaotic maps and nucleotide sequences database. Hindawi Comput. Intell. Neurosci. 2017, 9 (2017)

    Google Scholar 

  19. Lu, W., Varna, A.L., Wu, M.: Confidentiality-preserving image search: a comparative study between homomorphic encryption and distance-preserving randomization. IEEE Access 2, 125–141 (2014)

    Article  Google Scholar 

  20. Zhang, X., Han, F., Niu, Y.: Research article chaotic image encryption algorithm based on bit permutation and dynamic DNA encoding. Hindawi Comput. Intell. Neurosci. 2017, 11 (2017)

    Google Scholar 

  21. Mikhail, M., Abouelseoud, Y., ElKobrosy, G.: Research article two-phase image encryption scheme based on FFCT and fractals. Hindawi Secur. Commun. Netw. 2017, 13 (2017)

    Google Scholar 

  22. Chen, W.: Optical multiple-image encryption using three-dimensional space. IEEE Photonics J. 8(2), 1–8 (2016)

    MathSciNet  Google Scholar 

  23. Li, X., et al.: Multiple-image encryption based on compressive ghost imaging and coordinate sampling. IEEE Photonics J. 8(4), 1–11 (2016)

    Google Scholar 

  24. Wang, X., Zhou, G., Dai, C., Chen, J.: Optical image encryption with divergent illumination and asymmetric keys. IEEE Photonics J. 9(2), 1–8 (2017)

    Google Scholar 

  25. Wu, X., Zhu, B., Hu, Y., Ran, Y.: A novel color image encryption scheme using rectangular transform-enhanced chaotic tent maps. IEEE Access 5, 6429–6436 (2017)

    Google Scholar 

  26. El-Latif, A.A.A., Abd-El-Atty, B., Talha, M.: Robust encryption of quantum medical images. IEEE Access, PP(99), 1

    Google Scholar 

  27. Hamza, R., Muhammad, K., Nachiappan, A., González, G.R.: Hash based encryption for keyframes of diagnostic hysteroscopy. IEEE Access, PP(99), 1

    Google Scholar 

  28. Fan, H., Li, M.: Research article cryptanalysis and improvement of chaos-based image encryption scheme with circular inter-intra-pixels bit-level permutation. Hindawi Math. Probl. Eng. 2017, 11 (2017)

    Google Scholar 

  29. Zhao, J.-F., Wang, S.-Y., Zhang, L.-T., Wang, X.-Y.: Research article image encryption algorithm based on a novel improper fractional-order attractor and a wavelet function map. Hindawi J. Electr. Comput. Eng. 2017, 10 (2017)

    Google Scholar 

  30. Li, T., Yang, M., Wu, J., Jing, X.: Research article A novel image encryption algorithm based on a fractional-order hyperchaotic system and DNA computing. Hindawi Complex. 2017, 13 (2017)

    MATH  Google Scholar 

  31. Singh, L.D., Singh, K.M.: Image encryption using elliptic curve cryptography. In: Elsevier-Eleventh International Multi-Conference on Information Processing, vol. 54, pp. 472–481 (2015)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shima Ramesh Maniyath .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Maniyath, S.R., Thanikaiselvan, V. (2019). Robust and Lightweight Image Encryption Approach Using Public Key Cryptosystem. In: Silhavy, R. (eds) Cybernetics and Algorithms in Intelligent Systems . CSOC2018 2018. Advances in Intelligent Systems and Computing, vol 765. Springer, Cham. https://doi.org/10.1007/978-3-319-91192-2_7

Download citation

Publish with us

Policies and ethics