RSA scheme with MRF and ECC for data encryption

被引:1
|
作者
Chen, CC [1 ]
机构
[1] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu 300, Taiwan
关键词
elliptic curve cryptography; Markov random field; RSA;
D O I
10.1109/ICME.2004.1394358
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The security of multimedia over network transmission has recently attracted a lot of researchers. This paper combines schemes of cryptography with steganography for hiding secret messages. Given secret messages, for example, an English sentence, our scheme first converts the messages to an M x N binary image which is then covered by a binary random texture synthesized from a 2D Ising Markov random field using the seed, a shared secret key, between the sender and the receiver, generated by the strategy of elliptic curve cryptography (ECC). The concealed messages are then encrypted based on the RSA scheme for transmission. An experiment shows that using an unauthorized key gets messages totally different from the original ones even the error key is very close to the authorized one.
引用
收藏
页码:947 / 950
页数:4
相关论文
共 50 条
  • [1] Data encryption using MRF with an RSA key
    Chen, CC
    [J]. ADVANCES IN MUTLIMEDIA INFORMATION PROCESSING - PCM 2001, PROCEEDINGS, 2001, 2195 : 399 - 402
  • [2] ECC over RSA for Asymmetric Encryption: A review
    Gupta, Kamlesh
    Silakari, Sanjay
    [J]. International Journal of Computer Science Issues, 2011, 8 (3 3-2): : 370 - 375
  • [3] Probabilistic Encryption - A Comparative Analysis against RSA and ECC
    Creado, Orhio Mark
    Wu, Xianping
    Wang, Yiling
    Le, Phu Dung
    [J]. ICCIT: 2009 FOURTH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2009, : 1123 - 1129
  • [4] On the security of an RSA based encryption scheme
    Müller, S
    [J]. INFORMATION SECURITY AND PRIVACY, 1999, 1587 : 135 - 148
  • [5] An efficient RSA public key encryption scheme
    Aboud, Sattar J.
    AL-Fayoumi, Mohammad A.
    Al-Fayoumi, Mustafa
    Jabbar, Haidar S.
    [J]. PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 127 - +
  • [6] Performance of WiMAX Security Algorithm (The Comparative study of RSA Encryption Algorithm with ECC Encryption Algorithm)
    Habib, Masood
    Mehmood, Tahir
    Ullah, Fasee
    Ibrahim, Muhammad
    [J]. PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER TECHNOLOGY AND DEVELOPMENT, VOL 2, 2009, : 108 - 112
  • [7] The Suitability of RSA for Bulk Data Encryption
    Bajpai, Pranshu
    Carter, Cody
    Tarasova, Daria
    Ackley, David
    Masterson, Ian
    Schmidt, Jamie
    Enbody, Richard
    [J]. 2020 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2020,
  • [8] Secure Convertible Authenticated Encryption Scheme Based on RSA
    Wu, Tzong-Sun
    Lin, Han-Yu
    [J]. INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2009, 33 (04): : 481 - 486
  • [9] An Attack Scheme of RSA Encryption System with Protocol Failure
    Wang, Zhibo
    Ma, Wei
    Gong, Bei
    [J]. 2020 3RD INTERNATIONAL CONFERENCE ON SMART BLOCKCHAIN (SMARTBLOCK), 2020, : 87 - 91
  • [10] Cloud-RSA: An Enhanced Homomorphic Encryption Scheme
    El Makkaoui, Khalid
    Ezzati, Abdellah
    Beni-Hssane, Abderrahim
    [J]. EUROPE AND MENA COOPERATION ADVANCES IN INFORMATION AND COMMUNICATION TECHNOLOGIES, 2017, 520 : 471 - 480