Fuzzy extractor and chaos enhanced elliptic curve cryptography for image encryption and authentication

被引:7
作者
Bhat, Jasra [1 ]
Saqib, Manasha [1 ]
Moon, Ayaz Hassan [1 ]
机构
[1] IUST, Sch Engn & Technol, Awantipora 192122, J&k, India
关键词
Image encryption; Fuzzy extractor; Cosine-transform based chaos system; Elliptic curve cryptography; SECURE;
D O I
10.1007/s13198-021-01330-5
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This paper proposes a novel method for secure image encryption and authentication based upon fuzzy extractor driven Elliptic Curve key exchange scheme. Use of fuzzy extractor facilitates both parties to authenticate each other without disclosing their original biometric information. The image encryption is achieved using a shared key in two steps. In the first step, we use a novel Cosine Transform based Chaos System to generate a pseudo- random chaos sequence over a dynamic range. In the second step, this chaos sequence along with Elliptic curve-based encryption is used in code block cipher mode to get the cipher image. To authenticate the encrypted image, an easily computable and verifiable digital signature scheme based on fuzzy extractor and Elliptic curve cryptography has been proposed. The proposed encryption is computationally efficient as it does not need an exclusive encoding of plain image pixels to Elliptic curve points. Results and analysis show that our scheme is resilient to different kinds of security attacks particularly differential attacks. The proposed scheme results in a random cipher image with high entropy and very low inter-pixel correlation at a low computational cost and encryption time.
引用
收藏
页码:697 / 712
页数:16
相关论文
共 37 条
[1]   Secure Image Transmission Using Chaotic-Enhanced Elliptic Curve Cryptography [J].
Abdelfatah, Roayat Ismail .
IEEE ACCESS, 2020, 8 :3875-3890
[2]  
Alam S, 2015, 2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER ENGINEERING AND APPLICATIONS (ICACEA), P332, DOI 10.1109/ICACEA.2015.7164725
[3]   A Novel Medical Image Signcryption Scheme Using TLTS and Henon Chaotic Map [J].
Ali, Tahir Sajjad ;
Ali, Rashid .
IEEE ACCESS, 2020, 8 :71974-71992
[4]   Hybrid SVD-Based Image Watermarking Schemes: A Review [J].
Alshoura, Wafa' Hamdan ;
Zainol, Zurinahni ;
Teh, Je Sen ;
Alawida, Moatsum ;
Alabdulatif, Abdulatif .
IEEE ACCESS, 2021, 9 :32931-32968
[5]  
[Anonymous], 2018, INF SCI LETT, DOI DOI 10.18576/ISL/070102
[6]  
Bakhtiari S, 2014, 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), P144, DOI 10.1109/ISBAST.2014.7013111
[7]   A novel chaos based optical image encryption using fractional Fourier transform and DNA sequence operation [J].
Ben Farah, M. A. ;
Guesmi, R. ;
Kachouri, A. ;
Samet, M. .
OPTICS AND LASER TECHNOLOGY, 2020, 121
[8]  
Bhat M.I., 2021, Multimed. Secur. Algorithm Dev. Anal. Appl., P45
[9]  
Christy Atika S., 2019, Jurnal Ilmu Komputer dan Informasi, V12, P41, DOI DOI 10.21609/JIKI.V12I1.646
[10]   A new image encryption technique combining Elliptic Curve Cryptosystem with Hill Cipher [J].
Dawahdeh, Ziad E. ;
Yaakob, Shahrul N. ;
bin Othman, Rozmie Razif .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2018, 30 (03) :349-355