Fuzzy extractor and chaos enhanced elliptic curve cryptography for image encryption and authentication

被引:7
作者
Bhat, Jasra [1 ]
Saqib, Manasha [1 ]
Moon, Ayaz Hassan [1 ]
机构
[1] IUST, Sch Engn & Technol, Awantipora 192122, J&k, India
关键词
Image encryption; Fuzzy extractor; Cosine-transform based chaos system; Elliptic curve cryptography; SECURE;
D O I
10.1007/s13198-021-01330-5
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This paper proposes a novel method for secure image encryption and authentication based upon fuzzy extractor driven Elliptic Curve key exchange scheme. Use of fuzzy extractor facilitates both parties to authenticate each other without disclosing their original biometric information. The image encryption is achieved using a shared key in two steps. In the first step, we use a novel Cosine Transform based Chaos System to generate a pseudo- random chaos sequence over a dynamic range. In the second step, this chaos sequence along with Elliptic curve-based encryption is used in code block cipher mode to get the cipher image. To authenticate the encrypted image, an easily computable and verifiable digital signature scheme based on fuzzy extractor and Elliptic curve cryptography has been proposed. The proposed encryption is computationally efficient as it does not need an exclusive encoding of plain image pixels to Elliptic curve points. Results and analysis show that our scheme is resilient to different kinds of security attacks particularly differential attacks. The proposed scheme results in a random cipher image with high entropy and very low inter-pixel correlation at a low computational cost and encryption time.
引用
收藏
页码:697 / 712
页数:16
相关论文
共 37 条
[31]  
Soleymani Ali, 2013, International Journal of Digital Content Technology and its Applications, V7, P85
[32]  
Soleymani A, 2013, 2013 IEEE MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS (MICC), P373, DOI 10.1109/MICC.2013.6805857
[33]   Use of elliptic curve cryptography for multimedia encryption [J].
Tawalbeh, Lo'ai ;
Mowafi, Moad ;
Aljoby, Walid .
IET INFORMATION SECURITY, 2013, 7 (02) :67-74
[34]   An image encryption scheme based on elliptic curve pseudo random and Advanced Encryption System [J].
Toughi, Shahryar ;
Fathi, Mohammad H. ;
Sekhavat, Yoones A. .
SIGNAL PROCESSING, 2017, 141 :217-227
[35]   Reversible AMBTC-Based Data Hiding With Security Improvement by Chaotic Encryption [J].
Wang, Hsiang-Ying ;
Lin, Hsin-Ju ;
Gao, Xiang-Yun ;
Cheng, Wen-Huang ;
Chen, Yung-Yao .
IEEE ACCESS, 2019, 7 :38337-38347
[36]  
Younes Mohammad Ah Bani, 2008, IAENG International Journal of Computer Science, V35, P15
[37]   Digital Image Encryption Algorithm Based on Elliptic Curve Public Cryptosystem [J].
Zhang, Xiaoqiang ;
Wang, Xuesong .
IEEE ACCESS, 2018, 6 :70025-70034