Image Encryption Using Elliptic Curve Cryptograhy and Matrix

被引:15
作者
Nagaraj, Srinivasan [1 ]
Raju, G. S. V. P. [2 ]
Rao, K. Koteswara [1 ]
机构
[1] GMRIT, Dept CSE, Rajam, AP, India
[2] Andhra Univ, Dept CS&ST, Vizag 03, India
来源
INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONVERGENCE (ICCC 2015) | 2015年 / 48卷
关键词
ECC; magic Matrix; encryption; decryption;
D O I
10.1016/j.procs.2015.04.182
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The enlarged size of the internet and vast communication across it and also medical needs digital images require of security plays vital role. So different techniques are used to protect confidential image data from unauthorized access. In this paper, we propose a New encryption technique Using elliptic curve cryptography with a magic matrix operations for securing images that transmits over a public unsecured channel. There are two most important groups of image encryption algorithms: some are non chaos-based selective methods and chaos-based selective methods. The majority of these algorithms is planned for a specific image format, compressed or uncompressed. (C) 2015 The Authors. Published by Elsevier B.V.
引用
收藏
页码:276 / 281
页数:6
相关论文
共 10 条
[1]  
Amounas F., 2013, COMPUTER ENG APPL J, V2
[2]  
Amounas F., 2012, INT J INFORM NETWORK, V1, P54, DOI DOI 10.11591/IJINS.V1I2.430
[3]  
Amounas F., 2012, INT J ENG INVENTIONS, V1, P49
[4]  
Amounas F., 2012, Int. J. Inform. Netw. Sec, V1, P216
[5]  
Amounas Fatima, 2011, INT MATH FORUM, V6, P2409
[6]  
Guiliang Zhu, 2010, 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS 2010), P769, DOI 10.1109/ICICISYS.2010.5658790
[7]   The state of elliptic curve cryptography [J].
Koblitz, N ;
Menezes, A ;
Vanstone, S .
DESIGNS CODES AND CRYPTOGRAPHY, 2000, 19 (2-3) :173-193
[8]  
Megha K, 2011, INT J ENTERPRISE COM, V1, P2230
[9]  
Muneeswaran K., 2012, INT J NETWORK SECURI, V14, P240
[10]  
Sadki H., 2014, INT J INFORM NETWORK, V3, P83