Abstract
With significant progress in cryptographic protocols, it has been seen that not all efficient protocols were investigated for encrypting image. At present, we find that existing approaches for image encryption still lacks robustness with respect to forward as well as backward secrecy. Harnessing the potential feature of public key cryptosystem, the proposed system utilizes elliptical curve cryptography for cost effective computation of secret keys required for performing encryption. The security strength is further leveraged by using nucleotide sequencing rules in order to perform scrambling operation of the encrypted image and thereby offering dual layer of security. The study outcome shows that proposed system offers better retention of signal quality as well as lower level of correlation in order to prove better imperceptible features in contrast to existing approaches.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Aumasson, J.-P.: Serious Cryptography: A Practical Introduction to Modern Encryption. No Starch Press, San Francisco (2017)
Abd El-Samie, F.E., Ahmed, H.E.H., Elashry, I.F., Shahieen, M.H.: Image Encryption: A Communication Perspective. CRC Press, Boca Raton (2013)
Mancy, L., Vigila S, M.C.: A survey on protection of medical images. In: 2015 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), Kumaracoil, pp. 503–506 (2015)
Shunmugan, S., Rani, P.A.J.: Encryption-then-compression techniques: a survey. In: 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), Kumaracoil, pp. 675–679 (2016)
Sankpal, P.R., Vijaya, P.A.: Image encryption using chaotic maps: a survey. In: 2014 Fifth International Conference on Signal and Image Processing, Jeju Island, pp. 102–107 (2014)
Leenes, R., van Brakel, R., Gutwirth, S., De Hert, P.: Data Protection and Privacy: (In)visibilities and Infrastructures. Springer, New York (2017)
Li, W.: Correlation based cryptanalysis on a chaotic encryption of JPEG image. In: 2014 7th International Congress on Image and Signal Processing, Dalian, pp. 628–632 (2014)
Shie, S.-C., Lin, S.D., Jiang, J.-H.: Visually imperceptible image hiding scheme based on vector quantization. Elsevier-Inf. Process. Manag. 46(5), 495–501 (2010)
Hasan, H., Kareem, S.A., Jaleel, J.: Information Hiding Text in Image: Encryption. Lap Lambert Academic Publishing GmbH KG, Saarbrücken (2012)
Awad, W.S.: Improving Information Security Practices through Computational Intelligence. IGI Global, Hershey (2015)
A-Rammahi, A.: Encryption image using small order linear systems and repeated modular numbers. In: Proceedings of the World Congress on Engineering, vol. II (2014)
Loukhaoukha, K., Chouinard, J.-Y., Berdai, A.: Research article a secure image encryption algorithm based on Rubik’s cube principle. Hindawi Publ. Corp. J. Electr. Comput. Eng. 2012, 13 (2012)
Al-Maadeed, S., Al-Ali, A., Abdalla, T.: Research article a new chaos-based image-encryption and compression algorithm. Hindawi Publ. Corp. J. Electr. Comput. Eng. 2012, 11 (2012)
Zhang, J., Zhang, Y.: Research article an image encryption algorithm based on balanced pixel and chaotic map. Hindawi Publ. Corp. Math. Prob. Eng. 2014, 7 (2014)
Askar, S.S., Karawia, A.A., Alshamrani, A.: Research article image encryption algorithm based on chaotic economic model. Hindawi Publ. Corp. Math. Probl. Eng. 2015, 10 (2015)
Yang, G., Jin, H., Bai, N.: Research article image encryption using the chaotic josephus matrix. Hindawi Publ. Corp. Math. Probl. Eng. 2014, 13 (2014)
A-Perez, F., C-Hernández, C., M-Escobar, M.A., L-Gutiérrez, R.M., A-Delgado, A.: Research article A fingerprint image encryption scheme based on hyperchaotic Rössler Map. Hindawi Publ. Corp. Math. Probl. Eng. 2016, 15 (2016)
Niu, Y., Zhang, X., Han, F.: Research article image encryption algorithm based on hyperchaotic maps and nucleotide sequences database. Hindawi Comput. Intell. Neurosci. 2017, 9 (2017)
Lu, W., Varna, A.L., Wu, M.: Confidentiality-preserving image search: a comparative study between homomorphic encryption and distance-preserving randomization. IEEE Access 2, 125–141 (2014)
Zhang, X., Han, F., Niu, Y.: Research article chaotic image encryption algorithm based on bit permutation and dynamic DNA encoding. Hindawi Comput. Intell. Neurosci. 2017, 11 (2017)
Mikhail, M., Abouelseoud, Y., ElKobrosy, G.: Research article two-phase image encryption scheme based on FFCT and fractals. Hindawi Secur. Commun. Netw. 2017, 13 (2017)
Chen, W.: Optical multiple-image encryption using three-dimensional space. IEEE Photonics J. 8(2), 1–8 (2016)
Li, X., et al.: Multiple-image encryption based on compressive ghost imaging and coordinate sampling. IEEE Photonics J. 8(4), 1–11 (2016)
Wang, X., Zhou, G., Dai, C., Chen, J.: Optical image encryption with divergent illumination and asymmetric keys. IEEE Photonics J. 9(2), 1–8 (2017)
Wu, X., Zhu, B., Hu, Y., Ran, Y.: A novel color image encryption scheme using rectangular transform-enhanced chaotic tent maps. IEEE Access 5, 6429–6436 (2017)
El-Latif, A.A.A., Abd-El-Atty, B., Talha, M.: Robust encryption of quantum medical images. IEEE Access, PP(99), 1
Hamza, R., Muhammad, K., Nachiappan, A., González, G.R.: Hash based encryption for keyframes of diagnostic hysteroscopy. IEEE Access, PP(99), 1
Fan, H., Li, M.: Research article cryptanalysis and improvement of chaos-based image encryption scheme with circular inter-intra-pixels bit-level permutation. Hindawi Math. Probl. Eng. 2017, 11 (2017)
Zhao, J.-F., Wang, S.-Y., Zhang, L.-T., Wang, X.-Y.: Research article image encryption algorithm based on a novel improper fractional-order attractor and a wavelet function map. Hindawi J. Electr. Comput. Eng. 2017, 10 (2017)
Li, T., Yang, M., Wu, J., Jing, X.: Research article A novel image encryption algorithm based on a fractional-order hyperchaotic system and DNA computing. Hindawi Complex. 2017, 13 (2017)
Singh, L.D., Singh, K.M.: Image encryption using elliptic curve cryptography. In: Elsevier-Eleventh International Multi-Conference on Information Processing, vol. 54, pp. 472–481 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Maniyath, S.R., Thanikaiselvan, V. (2019). Robust and Lightweight Image Encryption Approach Using Public Key Cryptosystem. In: Silhavy, R. (eds) Cybernetics and Algorithms in Intelligent Systems . CSOC2018 2018. Advances in Intelligent Systems and Computing, vol 765. Springer, Cham. https://doi.org/10.1007/978-3-319-91192-2_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-91192-2_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-91191-5
Online ISBN: 978-3-319-91192-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)