A novel image encryption method for e-governance application using elliptic curve pseudo random number and chaotic random number sequence

S Adhikari, S Karforma - Multimedia Tools and Applications, 2022 - Springer
Multimedia Tools and Applications, 2022Springer
Image encryption is gaining popularity due to the rapid use of internet technology. Security
attacks on the image can occur when images are shared through the internet. E-governance
generates important documents with images like identity cards, admit cards, and medical
reports. An attacker can steal the image data. An attacker can modify or alter the documents
using their own images to create duplicate documents. So, image encryption is a must to
prevent the security and privacy of images. In this paper, a novel image encryption method …
Abstract
Image encryption is gaining popularity due to the rapid use of internet technology. Security attacks on the image can occur when images are shared through the internet. E-governance generates important documents with images like identity cards, admit cards, and medical reports. An attacker can steal the image data. An attacker can modify or alter the documents using their own images to create duplicate documents. So, image encryption is a must to prevent the security and privacy of images. In this paper, a novel image encryption method using elliptic curve pseudo-random number is proposed for image data transfer in E-governance. The encryption method creates the cipher image with secp256r1 elliptic curve points and a map table. The map table consists of bit positions as index numbers. In the decryption phase, the receiver decodes the cipher image complementing index numbers in the map table. The map table is also encrypted and decrypted with a chaotic sequence. Our method gives better results than other image encryption methods, according to bits per pixels, entropy, correlation of adjacent pixels, histogram analysis, peak signal to noise ratio, unified average changing intensity, encryption, and decryption time. The experimental results prove the proposed method’s effectiveness and security.
Springer
以上显示的是最相近的搜索结果。 查看全部搜索结果