A new image encryption technique combining Elliptic Curve Cryptosystem with Hill Cipher

被引:65
作者
Dawahdeh, Ziad E. [1 ]
Yaakob, Shahrul N. [1 ]
bin Othman, Rozmie Razif [1 ]
机构
[1] UniMAP Univ, Sch Comp & Commun Engn, Perlis, Malaysia
关键词
Elliptic Curve Cryptography; Hill cipher; Self-invertible; Entropy; Peak Signal to Noise Ratio; Unified Average Changing Intensity; CRYPTOGRAPHY;
D O I
10.1016/j.jksuci.2017.06.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Image encryption is rapidly increased recently by the increasing use of the internet and communication media. Sharing important images over unsecured channels is liable for attacking and stealing. Encryption techniques are the suitable methods to protect images from attacks. Hill cipher algorithm is one of the symmetric techniques, it has a simple structure and fast computations, but weak security because sender and receiver need to use and share the same private key within a non-secure channels. A new image encryption technique that combines Elliptic Curve Cryptosystem with Hill Cipher (ECCHC) has been proposed in this paper to convert Hill cipher from symmetric technique to asymmetric one and increase its security and efficiency and resist the hackers. Self-invertible key matrix is used to generate encryption and decryption secret key. So, no need to find the inverse key matrix in the decryption process. A secret key matrix with dimensions 4 x 4 will be used as an example in this study. Entropy, Peak Signal to Noise Ratio (PSNR), and Unified Average Changing Intensity (UACI) will be used to assess the grayscale image encryption efficiency and compare the encrypted image with the original image to evaluate the performance of the proposed encryption technique. (C) 2017 Production and hosting by Elsevier B.V. on behalf of King Saud University.
引用
收藏
页码:349 / 355
页数:7
相关论文
共 25 条
[1]  
Acharya B., 2009, INT J RECENT TRENDS, V1
[2]  
Agrawal K., 2014, INT J COMPUT APP, V106
[3]  
Alese B K., 2012, International Journal of Engineering and Technology, V2, P1552
[4]  
[Anonymous], IADIS INT C APPL COM
[5]  
Bokhari Mohammad Ubaidullah., 2016, International journal of computer applications, V147
[6]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[7]  
Gutub Adnan Abdul-Aziz, 2011, International Journal of New Computer Architectures and their Applications, V1, P474
[8]  
Gutub A.A.A., 2003, P 13 ACM GREAT LAK S, P237
[9]  
Gutub AA-A., 2010, INT J SECUR, V4, P46
[10]  
Gutub Adnan, 2003, IEEE 10 ANN TECHN EX