Fuzzy extractor and chaos enhanced elliptic curve cryptography for image encryption and authentication

被引:6
|
作者
Bhat, Jasra [1 ]
Saqib, Manasha [1 ]
Moon, Ayaz Hassan [1 ]
机构
[1] IUST, Sch Engn & Technol, Awantipora 192122, J&k, India
关键词
Image encryption; Fuzzy extractor; Cosine-transform based chaos system; Elliptic curve cryptography; SECURE;
D O I
10.1007/s13198-021-01330-5
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This paper proposes a novel method for secure image encryption and authentication based upon fuzzy extractor driven Elliptic Curve key exchange scheme. Use of fuzzy extractor facilitates both parties to authenticate each other without disclosing their original biometric information. The image encryption is achieved using a shared key in two steps. In the first step, we use a novel Cosine Transform based Chaos System to generate a pseudo- random chaos sequence over a dynamic range. In the second step, this chaos sequence along with Elliptic curve-based encryption is used in code block cipher mode to get the cipher image. To authenticate the encrypted image, an easily computable and verifiable digital signature scheme based on fuzzy extractor and Elliptic curve cryptography has been proposed. The proposed encryption is computationally efficient as it does not need an exclusive encoding of plain image pixels to Elliptic curve points. Results and analysis show that our scheme is resilient to different kinds of security attacks particularly differential attacks. The proposed scheme results in a random cipher image with high entropy and very low inter-pixel correlation at a low computational cost and encryption time.
引用
收藏
页码:697 / 712
页数:16
相关论文
共 50 条
  • [21] An Enhanced Elliptic Curve Cryptography for Biometric
    Althobaiti, Ohood S.
    Aboalsamh, Hatim A.
    2012 7TH INTERNATIONAL CONFERENCE ON COMPUTING AND CONVERGENCE TECHNOLOGY (ICCCT2012), 2012, : 1048 - 1055
  • [22] Implementation of Text Encryption using Elliptic Curve Cryptography
    Singh, Laiphrakpam Dolendro
    Singh, Khumanthem Manglem
    ELEVENTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2015/INDIA ELEVENTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2015/NDIA ELEVENTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2015, 2015, 54 : 73 - 82
  • [23] A chaotic based image encryption scheme using elliptic curve cryptography and genetic algorithm
    Kumar, Sanjay
    Sharma, Deepmala
    ARTIFICIAL INTELLIGENCE REVIEW, 2024, 57 (04)
  • [24] Cryptanalysis of multimedia encryption using elliptic curve cryptography
    Singh, Khoirom Motilal
    Singh, Laiphrakpam Dolendro
    Tuithung, Themrichon
    OPTIK, 2018, 168 : 370 - 375
  • [25] Elliptic curve cryptography based wireless authentication protocol
    Yongliang, Liu
    Gao, Wen
    Yao, Hongxun
    Yu, Xinghua
    International Journal of Network Security, 2007, 5 (03) : 327 - 337
  • [26] Deniable authentication protocol based on elliptic curve cryptography
    Hwang, MS
    Sung, PC
    Tzeng, SF
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING, 2003, : 65 - 67
  • [27] A chaotic based image encryption scheme using elliptic curve cryptography and genetic algorithm
    Sanjay Kumar
    Deepmala Sharma
    Artificial Intelligence Review, 57
  • [28] Voter Authentication Using Modified Elliptic Curve Cryptography
    Sujatha, K.
    Rao, A. Arjuna
    Yejarla, Prathyusha
    Sruthi, K. J.
    SMART COMPUTING AND INFORMATICS, 2018, 77 : 497 - 504
  • [29] A novel color image encryption scheme using elliptic curve cryptography and hyperchaotic system
    Fang, Jie
    Zhao, Kaihui
    Liang, Wanyong
    PHYSICA SCRIPTA, 2023, 98 (11)
  • [30] Authentication and Encryption Using Modified Elliptic Curve Cryptography with Particle Swarm Optimization and Cuckoo Search Algorithm
    Kota S.
    Padmanabhuni V.N.R.
    Budda K.
    Sruthi K.
    Kota, Sujatha (sujathakota29@gmail.com), 2018, Springer (99) : 343 - 351