• P-ISSN 0974-6846 E-ISSN 0974-5645

Indian Journal of Science and Technology


Indian Journal of Science and Technology

Year: 2015, Volume: 8, Issue: 26, Pages: 1-5

Original Article

Image Security using ECC Approach


Objectives: The role of digital images are vast in todays trends and it is exposed to illicit access, modifications that must needs confidentiality during the stages of data archival and communication1, systems, wireless devices. In order to facilitate secret communication, image encryption have bring into being a significant place in both public and private services like as military supervision, health systems, financial services like online trading and video conferencing and so on. Some methods are proposed on the image encryption which they include the Paper2 have developed a method for A Chaotic Key Based Algorithm (CKBA) to change the pixel values of the plain-image. In 3 have developed a protocol for random combinational image encryption approach with bit, pixel and block permutations Paper4 proposed a technique to encrypt an image for secure transmission using the digital signature of the image. Methods: The proposed work is developed that provides secured authentication to integrate the image encryption with Elliptic Curve Cryptography to provide security. In this work, transformation operation of the matrix operations are performed on the original image matrix and the transformed image is further encrypted with the help of a key sequence which is generated from the elliptic Curve. The encrypted image will be authenticated using Elliptic Curve Diffie Helman (ECDH) key exchange algorithm5 and finally decrypted by using the key generated from the chosen elliptic curve and then we perform the reverse transformations on the matrix obtained . So after decryption process to acquire the original image. Findings: In this work we can get better security to image ecryption by application of ECC with matrix operations performed on image data. Because ECC has the well attention of researchers and robust mathematical development and top security among the former existing algorithms. As a result Elliptic Curve Cryptography for image data is developed to meet the current security needs. Application: To transmit securely image data over the wireless channels and systems and so on. Currently this work was currently developed in an ad-hoc fashion and it can be further improved with ECC binary field and various measures of security that includes different attacks.
Keywords: ECDH and Elliptic–Curves, Image-Decry, Imge-Encryption, Transformation-Operations


Subscribe now for latest articles and news.