Proposed Method for Multimedia Data Security Using Cyclic Elliptic Curve, Chaotic System, and Authentication Using Neural Network

As multimedia applications are used increasingly, security becomes an important issue of security of images. The combination of chaotic theory and cryptography forms an important field of information security. In the past decade, chaos based image encryption is given much attention in the research of information security and a lot of image encryption algorithms based on chaotic maps have been proposed. But, most of them delay the system performance, security, and suffer from the small key space problem. This paper introduces an efficient symmetric encryption scheme based on a cyclic elliptic curve and chaotic system that can overcome these disadvantages. The cipher encrypts 256-bit of plain image to 256-bit of cipher image within eight 32-bit registers. The scheme generates pseudorandom bit sequences for round keys based on a piecewise nonlinear chaotic map. Then, the generated sequences are mixed with the key sequences derived from the cyclic elliptic curve points. The proposed algorithm has good encryption effect, large key space, high sensitivity to small change in secret keys and fast compared to other competitive algorithms.

[1]  G. Mullen,et al.  Primitive polynomials over finite fields , 1992 .

[2]  M. Aswatha Kumar,et al.  Random Binary and Non-Binary Sequences Derived from Random Sequence of Points on Cyclic Elliptic Curve Over Finite Field GF(2 m ) and Their Properties , 2010, Inf. Secur. J. A Glob. Perspect..

[3]  M. Aswatha Kumar,et al.  Symmetric Key Image Encryption Scheme with Key Sequences Derived from Random Sequence of Cyclic Elliptic Curve Points. , 2011 .

[4]  Danilo P. Mandic,et al.  Recurrent Neural Networks for Prediction , 2001 .

[5]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[6]  P. P. Deepthi,et al.  New stream ciphers based on elliptic curve point multiplication , 2009, Comput. Commun..

[7]  Maciej Blaszak,et al.  From Bi-Hamiltonian Geometry to Separation of Variables: Stationary Harry-Dym and the KdV Dressing Chain , 2002, nlin/0202001.

[8]  James C. Bezdek,et al.  On the relationship between neural networks, pattern recognition and intelligence , 1992, Int. J. Approx. Reason..

[9]  M. A. Jafarizadeh,et al.  Hierarchy of Chaotic Maps with an Invariant Measure and their Compositions , 2002 .

[10]  Li Li,et al.  A new image encryption scheme based on cyclic elliptic curve and chaotic system , 2012, Multimedia Tools and Applications.

[11]  Chien-Chang Chen,et al.  Robust image authentication method surviving JPEG lossy compression , 1997, Electronic Imaging.

[12]  Richard S. Sutton,et al.  Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.

[13]  M.I. Aziz,et al.  Introduction to Cryptography , 2002, 2005 International Conference on Microelectronics.

[14]  Amir Akhavan,et al.  A symmetric image encryption scheme based on combination of nonlinear chaotic maps , 2011, J. Frankl. Inst..

[15]  Jessica J. Fridrich,et al.  Invertible authentication , 2001, Security and Watermarking of Multimedia Contents.