Fuzzy extractor and chaos enhanced elliptic curve cryptography for image encryption and authentication

被引:6
|
作者
Bhat, Jasra [1 ]
Saqib, Manasha [1 ]
Moon, Ayaz Hassan [1 ]
机构
[1] IUST, Sch Engn & Technol, Awantipora 192122, J&k, India
关键词
Image encryption; Fuzzy extractor; Cosine-transform based chaos system; Elliptic curve cryptography; SECURE;
D O I
10.1007/s13198-021-01330-5
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This paper proposes a novel method for secure image encryption and authentication based upon fuzzy extractor driven Elliptic Curve key exchange scheme. Use of fuzzy extractor facilitates both parties to authenticate each other without disclosing their original biometric information. The image encryption is achieved using a shared key in two steps. In the first step, we use a novel Cosine Transform based Chaos System to generate a pseudo- random chaos sequence over a dynamic range. In the second step, this chaos sequence along with Elliptic curve-based encryption is used in code block cipher mode to get the cipher image. To authenticate the encrypted image, an easily computable and verifiable digital signature scheme based on fuzzy extractor and Elliptic curve cryptography has been proposed. The proposed encryption is computationally efficient as it does not need an exclusive encoding of plain image pixels to Elliptic curve points. Results and analysis show that our scheme is resilient to different kinds of security attacks particularly differential attacks. The proposed scheme results in a random cipher image with high entropy and very low inter-pixel correlation at a low computational cost and encryption time.
引用
收藏
页码:697 / 712
页数:16
相关论文
共 50 条
  • [41] An elliptic curve cryptography based enhanced anonymous authentication protocol for wearable health monitoring systems
    Sowjanya, K.
    Dasgupta, Mou
    Ray, Sangram
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 19 (01) : 129 - 146
  • [42] An Advanced Encryption Standard Powered Mutual Authentication Protocol Based on Elliptic Curve Cryptography for RFID, Proven on WISP
    Ibrahim, Alaauldin
    Dalkilic, Gokhan
    JOURNAL OF SENSORS, 2017, 2017
  • [43] Lightweight Authentication and Key Management on 802.11 with Elliptic Curve Cryptography
    Namal, Suneth
    Georgantas, Konstantinos
    Gurtov, Andrei
    2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, : 1830 - 1835
  • [44] A Lightweight RFID Authentication Protocol based on Elliptic Curve Cryptography
    Liu, Ya-Li
    Qin, Xiao-Lin
    Wang, Chao
    Li, Bo-Han
    JOURNAL OF COMPUTERS, 2013, 8 (11) : 2880 - 2887
  • [45] A Roaming Authentication Protocol based on Elliptic Curve Cryptography in IOV
    Shen Cen
    Mu Haibing
    PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 400 - 404
  • [46] A secure user authentication protocol using elliptic curve cryptography
    Kumari, Adesh
    Abbasi, M. Yahya
    Kumar, Vinod
    Khan, Akber Ali
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (04): : 521 - 530
  • [47] Elliptic Curve Cryptography on E-passport Authentication Protocol
    Saoudi, Safa
    Yousfi, Souheib
    Robbana, Riadh
    2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2017, : 1253 - 1260
  • [48] Authentication Through Elliptic Curve Cryptography (ECC) Technique in WMN
    Rathee, Geetanjali
    Saini, Hemraj
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2018, 12 (01) : 42 - 52
  • [49] Application of Elliptic Curve Cryptography in Node Authentication of Internet of Things
    Shen Guicheng
    Yu Zhen
    2013 NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2013), 2013, : 452 - 455
  • [50] Fuzzy extractor and elliptic curve based efficient user authentication protocol for wireless sensor networks and internet of things
    Maurya A.K.
    Sastry V.N.
    Information (Switzerland), 2017, 8 (04)