An efficient image encryption scheme using Fresnelet transform and elliptic curve based scrambling

被引:0
作者
Shabieh Farwa
Nargis Bibi
Nazeer Muhammad
机构
[1] COMSATS University Islamabad,Department of Mathematics
[2] Wah Campus,Department of Computer Science
[3] Fatima Jinnah Women University,Department of IT & CS
[4] Pak-Austria Fachhochschule Institute of Applied Sciences and Technology,undefined
来源
Multimedia Tools and Applications | 2020年 / 79卷
关键词
Fresnelet transform; Galois field; Elliptic curve; Group law;
D O I
暂无
中图分类号
学科分类号
摘要
This work introduces a novel and more efficient image encryption scheme, that deploys Fresnelet diffraction in the wave-propagation domain in conjunction with image scrambling effect, based on a specific elliptic curve group, that substantially reduces the computational cost for the desired outcome. Significantly elevated security of the encrypted image is guaranteed by highly complex algebraic structure of the elliptic curve over the Galois field F24\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$\mathbb {F}_{2}^{4}$\end{document}, in association with Fresnelet transform-based data-decomposition. At first stage, the proposed scheme, propagates confidential information, with selected wavelength at ceratin specific distance, using the Fresnelet transform. During this process confidential data decomposes into four complex sub-bands. We further separate these sub-bands into real and imaginary sub-band data. Then, at the second stage, elliptic curve group law is deployed to add confusion by scrambling the net sub-band data. The security and quality of the presented technique is examined through highly significant tools and we prove that when compared with other prevailing schemes, the proposed scheme offers coherent outcomes.
引用
收藏
页码:28225 / 28238
页数:13
相关论文
共 124 条
[1]  
Ahmad J(2012)Efficiency analysis and security evaluation of image encryption schemes IJVIPNS 12 18-31
[2]  
Ahmed F(2015)Chaos-based diffusion for highly autocorrelated data in encryption algorithms Nonlinear Dyn 82 1839-1850
[3]  
Ahmad J(2016)A secure image encryption scheme based on chaotic maps and affine transformation Multimed Tools Appl 75 13951-13976
[4]  
Hwang S(2015)An experimental comparison of chaotic and non-chaotic image encryption schemes Wirel Pers Commun 84 901-918
[5]  
Ahmad J(2018)A novel image encryption scheme based on orthogonal matrix, skew tent map, and XOR operation Neural Comput & Applic 30 3847-3857
[6]  
Hwang S(2019)Impact of digital fingerprint image quality on the fingerprint recognition accuracy Multimed Tools Appl 78 3649-3688
[7]  
Ahmad J(1998)Cryptography with chaos Phys Lett A 240 50-54
[8]  
Hwang S(2018)A novel encryption scheme for high-contrast image data in the Fresnelet domain PLoS ONE 13 e0194343-225
[9]  
Ali A(2018)A novel technique for the generation and application of substitution boxes (s-box) for the image encryption The Nucleus 55 219-148
[10]  
Ahmad J(2018)An image encryption algorithm based on chaotic system and compressive sensing Signal Process 148 124-54