Digital images are widely used in various domains, including social media, military, and healthcare. However, the security of digital images is threatened by cyber-attacks and privacy concerns. Cryptography plays a crucial role in ensuring the privacy and integrity of data, including digital images. Encryption methods are employed to protect digital images from unauthorized access. Among these methods, elliptic curve cryptography (ECC) is particularly effective, offering robust security with shorter key lengths. This research paper analysis ECC-based encryption methods for digital image encryption, considering parameters that impact their performance.
Introduction
I. INTRODUCTION
Billions of digital images are shared on messaging apps and social media every second. However, these images face security threats like alteration, illegal acquisition, and data disclosure. To minimize damages caused by malicious parties, encryption, steganography, and watermarking methods are used. Image encryption converts original images into unrecognizable encrypted versions, ensuring security and privacy.
This technique finds applications in medical imaging, communication, multimedia, and various other domains where data protection is crucial. The main objectives of encryption are confidentiality, integrity, and non-repudiation. These criteria play a crucial role in selecting an encryption method.
Encryption methods can be categorized into symmetric, asymmetric. Symmetric encryption employs a single private key, which is used by both the sender and receiver for encryption and decryption. Examples of symmetric encryption methods include AES, DES, and Hill cipher. While symmetric encryption is simple and fast, sharing the key securely among a large number of users can be challenging and inefficient. Asymmetric encryption, also known as public-key encryption, involves the use of two keys: a public key and a private key. Mathematical methods are used for key exchange. The Diffie-Hellman key exchange is an example of a solution to the key exchange problem. Public key encryption methods, such as RSA and ECC, utilize public and private keys for encryption and decryption. Digital image encryption differs significantly from text encryption, as there are additional parameters and considerations specific to image encryption these parameters are Entropy, PSNR, UACI etc.
II. DEFINITION
A. Image
A digital image is a collection of pixels arranged in a grid, with each pixel representing a small unit of colour or intensity. The image can be represented by a matrix, where rows and columns correspond to pixel values, capturing the colour or intensity information. There are three main types of digital images: binary, grayscale, and colour (RGB)
B. Elliptic Curve Cryptography (ECC)
Elliptic Curve Cryptography (ECC) is a public key encryption method introduced by Koblitz and Miller in 1985. ECC has gained popularity due to its strong security and ability to achieve the same level of security with shorter key sizes compared to other encryption methods like RSA. ECC operations are performed on finite fields, which offer more precise and efficient results. To understand ECC, let’s consider an elliptic curve denoted as E(a, b) on a finite field Fp. Here, ’a’ and ’b’ are integers that are smaller than a sufficiently large prime number ’p’. The equation defining the elliptic curve is given as follows: y2 = x3 + ax + b(modp)
???????
Conclusion
In the paper titled” Analysis of Parameters Influencing the Performance of Digital Image Encryption using ECC” the authors focus on the utilization of ECC (Elliptic Curve Cryptography) in image encryption. ECC has gained significant popularity due to its advantageous features, including short key sizes and low power consumption. As a result, it has found widespread use in various fields, particularly in image encryption. When evaluating the quality of digital image encryption, numerous parameters are considered. These parameters include entropy, NPCR (Number of Pixels Change Rate), and NPCR, ENTROPY etc. It is important for these parameters to exhibit optimal values in the encrypted image. In the paper, two techniques are explored for image encryption using ECC Schemes1 and schemes2. Scheme 2 offers better time complexity and both schemes successfully preserve the integrity of the decrypted images. Scheme 1\'s higher information entropy and weaker statistical relationship with the original images make it the preferable choice for achieving higher security in encryption.
References
[1] M. Kaur and V. Kumar, ”A comprehensive review on image encryption techniques,” Archives of Computational Methods in Engineering 27.1, 15-43, 2020.
[2] F. Y. Shih, ”Digital watermarking and steganography: fundamentals and techniques,” CRC press, 2017
[3] G.Ye, M. Liu, and M. Wu. ”Double image encryption algorithm based on compressive sensing and elliptic curve,” Alexandria Engineering Journal 61.9, 6785-6795, 2022.
[4] Z. E. Dawahdeh, S. N. Yaakob, and R. R. bin Othman. ”A new image encryption technique combining elliptic curve cryptosystem with hill cipher,” Journal of King Saud University-Computer and Information Sciences 30.3, 349-355, 2018.
[5] M.Benssalah, Y. Rhaskali, and K. Drouiche. ”An efficient image encryption scheme for TMIS based on elliptic curve integrated encryption and linear cryptography,” Multimedia Tools and Applications 80.2, 2081- 2107, 2021.
[6] Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron spectroscopy studies on magneto-optical media and plastic substrate interface,” IEEE Transl. J. Magn. Japan, vol. 2, pp. 740–741, August 1987 [Digests 9th Annual Conf. Magnetics Japan, p. 301, 1982]. [7]Habek, M., Genc, Y., Aytas, N., Akkoc, A., Afacan, E., Yazgan, E. (2022, June 9). Digital Image Encryption Using Elliptic Curve Cryptography: A Review. 2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)
[7] Singh, L. D., & Singh, K. M. (2015). Image Encryption using Elliptic Curve Cryptography. Procedia Computer Science, 54, 472–481. https://doi.org/10.1016/j.procs.2015.06.054
[8] Somaraj, S., & Hussain, M. A. (2015, December 29). Performance and Security Analysis for Image Encryption using Key Image. Indian Journal of Science and Technology, 8(35). https://doi.org/10.17485/ijst/2015/v8i35/73141
[9] Gupta, K., & Silakari, S. (2010, November). Performance Analysis for Image Encryption Using ECC. 2010 International Conference on Computational Intelligence and Communication Networks. https://doi.org/10.1109/cicn.2010.26
[10] Parida, P., Pradhan, C., Gao, X. Z., Roy, D. S., & Barik, R. K. (2021). Image Encryption and Authentication With Elliptic Curve Cryptography and Multidimensional Chaotic Maps. IEEE Access, 9, 76191–76204. https://doi.org/10.1109/access.2021.3072075