Image Encryption for mobile devices

Encryption is used to transmit data in open networks with security. Each type of image has its own features, therefore different techniques can be adopted to protect the image from unauthorized access. Most of the available encryption algorithms are mainly used for large devices. There is no such image encryption algorithm with smallest key for smaller devices like cell phone, smart card etc. In this paper, we introduce an algorithm ‘Elliptic Curve Cryptography for Image Encryption’. This algorithm has been applied as an efficient technique to resolve issues involving image encryption. The original image, represented as a set of two dimensional picture elements on a coordinate system can be encrypted using ECC.

[1]  A. Giniatoulline,et al.  Essential spectrum of the operators generated by PDE systems of stratified fluids and Lp-estimates for the solutions , 2005, Int. J. Comput. Sci. Appl..

[2]  Paul M. Chau,et al.  Image encryption for secure Internet multimedia applications , 2000, 2000 Digest of Technical Papers. International Conference on Consumer Electronics. Nineteenth in the Series (Cat. No.00CH37102).

[3]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[4]  Taher ElGamal,et al.  A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .

[5]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[6]  Aman Jantan,et al.  Image Encryption Using Block-Based Transformation Algorithm , 2008 .

[7]  Behrouz A. Forouzan Cryptography & Network Security , 2007 .

[8]  Ennio Gambi,et al.  A new chaotic algorithm for video encryption , 2002, IEEE Trans. Consumer Electron..

[9]  Chaur-Chin Chen RSA scheme with MRF and ECC for data encryption , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).

[10]  William Stallings,et al.  Cryptography and network security , 1998 .

[11]  Alfred Menezes,et al.  The State of Elliptic Curve Cryptography , 2000, Des. Codes Cryptogr..

[12]  Subramania Sudharsanan Shared key encryption of JPEG color images , 2005, IEEE Transactions on Consumer Electronics.

[13]  Chaur-Chin Chen Data Encryption Using MRF with an RSA Key , 2001, IEEE Pacific Rim Conference on Multimedia.