Fuzzy extractor and chaos enhanced elliptic curve cryptography for image encryption and authentication

被引:6
|
作者
Bhat, Jasra [1 ]
Saqib, Manasha [1 ]
Moon, Ayaz Hassan [1 ]
机构
[1] IUST, Sch Engn & Technol, Awantipora 192122, J&k, India
关键词
Image encryption; Fuzzy extractor; Cosine-transform based chaos system; Elliptic curve cryptography; SECURE;
D O I
10.1007/s13198-021-01330-5
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This paper proposes a novel method for secure image encryption and authentication based upon fuzzy extractor driven Elliptic Curve key exchange scheme. Use of fuzzy extractor facilitates both parties to authenticate each other without disclosing their original biometric information. The image encryption is achieved using a shared key in two steps. In the first step, we use a novel Cosine Transform based Chaos System to generate a pseudo- random chaos sequence over a dynamic range. In the second step, this chaos sequence along with Elliptic curve-based encryption is used in code block cipher mode to get the cipher image. To authenticate the encrypted image, an easily computable and verifiable digital signature scheme based on fuzzy extractor and Elliptic curve cryptography has been proposed. The proposed encryption is computationally efficient as it does not need an exclusive encoding of plain image pixels to Elliptic curve points. Results and analysis show that our scheme is resilient to different kinds of security attacks particularly differential attacks. The proposed scheme results in a random cipher image with high entropy and very low inter-pixel correlation at a low computational cost and encryption time.
引用
收藏
页码:697 / 712
页数:16
相关论文
共 50 条
  • [31] Visual Cryptography Secret Share Creation Techniques with Multiple Image Encryption and Decryption Using Elliptic Curve Cryptography
    Karolin, M.
    Meyyappan, T.
    IETE JOURNAL OF RESEARCH, 2024, 70 (02) : 1638 - 1645
  • [32] Biometric Encryption using Enhanced Finger Print Image and Elliptic Curve
    Sagayee, G. Mary Amirtha
    Arumugam, S.
    Mala, G. S. Anandha
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2013, 13 (07): : 106 - 112
  • [33] Biometric encryption using enhanced finger print image and elliptic curve
    Sagayee, G. Mary Amirtha
    Arumugam, S.
    Mala, G. S. Anandha
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2013, 5 (02) : 110 - 123
  • [34] Secure Image Transmission Using Chaotic-Enhanced Elliptic Curve Cryptography
    Abdelfatah, Roayat Ismail
    IEEE ACCESS, 2020, 8 : 3875 - 3890
  • [35] Multiple-image encryption based on Toeplitz matrix ghost imaging and elliptic curve cryptography
    Zhixiang, Bian
    Leihong, Zhang
    Hualong, Ye
    Kaimin, Wang
    Dawei, Zhang
    LASER PHYSICS LETTERS, 2021, 18 (05)
  • [36] Asymmetric multiple image elliptic curve cryptography
    Li, Wei
    Chang, Xiangyu
    Yan, Aimin
    Zhang, Hongbo
    OPTICS AND LASERS IN ENGINEERING, 2021, 136
  • [37] A hybrid scheme using hyper-chaotic system and elliptic curve cryptography for image encryption
    Chaouch I.
    Naanaa A.
    ElAsmi S.
    Multimedia Tools and Applications, 2025, 84 (9) : 6545 - 6569
  • [38] Elliptic Curve Cryptography. A new-way for encryption
    Ali, Rahim
    2008 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, 2008, : 179 - 183
  • [39] An elliptic curve cryptography based enhanced anonymous authentication protocol for wearable health monitoring systems
    K. Sowjanya
    Mou Dasgupta
    Sangram Ray
    International Journal of Information Security, 2020, 19 : 129 - 146
  • [40] An Efficient Method for text Encryption using Elliptic Curve Cryptography
    Das, Prasenjit
    Giri, Chandan
    PROCEEDINGS OF THE 2018 IEEE 8TH INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC 2018), 2018, : 96 - 101