H3-hybrid multilayered hyper chaotic hyper elliptic curve based image encryption system

被引:20
作者
Sasikaladevi, N. [1 ]
Geetha, K. [1 ]
Sriharshini, K. [1 ]
Aruna, M. Durga [1 ]
机构
[1] SASTRA Univ, Dept CSE SoC, Thanjavur, India
关键词
Hyper elliptic curve cryptography; DNA encoding; Hyper chaotic logistic map; Image encryption; FRACTIONAL FOURIER-TRANSFORM; DNA; SCHEME; PERMUTATION; WAVELET; SECURE; MAP;
D O I
10.1016/j.optlastec.2020.106173
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Excessive need for digitized images in all domains have necessitated the need for protecting the images against adversaries for secured transmission in the network. Sensitive images processed in medical, crime investigations are presumed to be highly due its sensitive nature. As per the state of art encryption methodologies are not exclusively designed for color images and simply extended from the one established for gray images. A multilayered hybrid model has been proposed and named as Hybrid multilayered Hyper-chaotic Hyper-elliptic curve based image encryption (HHH) scheme to handle color images used in medical and forensic domains. In the first layer, hyper chaotic based DNA encoding is implemented to generate chaotic sequences. Substitution permutation increases confusion diffusion level to increase the security strength of ciypto system. In the second layer, Genus-2 Hyper Elliptic Curve Cryptography over GF(p) that emphasis spatial domain for encryption has been employed for its mathematical strength. The proposed HHH system is hybrid in nature as it combines symmetric and asymmetric ciyptosystem. All sort of signal processing mechanisms that include susceptible colored images can be benefited with this approach as the experimental results endorse ideal measure for PSNR, entropy, NPCR, UACI and MSE values tested with standard bench mark images.
引用
收藏
页数:10
相关论文
共 45 条
[1]   A hybrid chaotic system and cyclic elliptic curve for image encryption [J].
Abd El-Latif, Ahmed A. ;
Niu, Xiamu .
AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2013, 67 (02) :136-143
[2]  
Alassaf N., 2003, ARABIA
[3]   An algorithm for the construction of substitution box for block ciphers based on projective general linear group [J].
Altaleb, Anas ;
Saeed, Muhammad Sarwar ;
Hussain, Iqtadar ;
Aslam, Muhammad .
AIP ADVANCES, 2017, 7 (03)
[4]  
[Anonymous], IADIS INT C APPL COM
[5]  
[Anonymous], INT J SECURITY IJS
[6]  
[Anonymous], 2017, APPL COMPUTING INFOR
[7]  
[Anonymous], INT C REC ADV EL COM
[8]  
[Anonymous], 2017, MULTIMEDIA TOOLS APP
[9]  
[Anonymous], P 2014 INT C ADV ENG
[10]   Discrete fractional wavelet transform and its application to multiple encryption [J].
Bhatnagar, Gaurav ;
Wu, Q. M. Jonathan ;
Raman, Balasubramanian .
INFORMATION SCIENCES, 2013, 223 :297-316