An Ethical Way of Image Encryption Using ECC

In the development of 3G devices, all element of multimedia (text image audio and video) are used. To use this information, a channel of high bandwidth and more secured system is required. In this era, network security has become an issue of importance, on which lot of research is going on. We have proposed image encryption method using elliptic curve cryptography (ECC). RSA is too slow compared to ECC because ECC required smaller key size. In this method, every pixel of the original image is transformed into the elliptic curve point (Xm,Ym), these elliptic curve point convert into cipher image pixel. The resulting system gives comparatively small block size, high speed and high security.

[1]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[2]  Anil K. Jain,et al.  Random field models in image analysis , 1989 .

[3]  Paul M. Chau,et al.  Image encryption for secure Internet multimedia applications , 2000, 2000 Digest of Technical Papers. International Conference on Consumer Electronics. Nineteenth in the Series (Cat. No.00CH37102).

[4]  Chaur-Chin Chen RSA scheme with MRF and ECC for data encryption , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).

[5]  Saito Taiichi,et al.  The co-Diffie-Hellman Problem over Elliptic Curves , 2004 .

[6]  L. Seripeariu,et al.  A new image encryption algorithm based on inversable functions defined on Galois fields , 2005, International Symposium on Signals, Circuits and Systems, 2005. ISSCS 2005..

[7]  Levent Ertaul,et al.  ECC Based Threshold Cryptography for Secure Data Forwarding and Secure Key Exchange in MANET (I) , 2005, NETWORKING.

[8]  Kefa Rabah,et al.  Elliptic Curve Cryptography over Binary Finite Field GF(2m) , 2006 .

[9]  Rahmat Budiarto,et al.  Unreliable Network Re-Authentication Protocol Based on Hybrid Key Using CSP Approach , 2007 .

[10]  Nicolae Constantinescu Authentication ranks with identities based on elliptic curves , 2007 .

[11]  Wang Li-xiang New Image Encryption Algorithm Based on Chaos , 2008 .

[12]  Amir Hossein Jahangir,et al.  Analysis of Public-Key Cryptography for Wireless Sensor Networks Security , 2008 .

[13]  Xiaoqiang Zhang,et al.  Mixed Image Element Encryption System , 2008, 2008 The 9th International Conference for Young Computer Scientists.