Integration of Elliptical Cryptography with RSA and Steganography using Biometric Authentication

Cryptography is a science of encrypting data to make it non readable and secure. But with time traditional cryptography is not that reliable because of multiple types of attacks on it. So, to make it effective it can be integrated with latest techniques available. Here in this paper a new mechanism has been proposed which integrates RSA and steganography with elliptical cryptographic technique along with biometric authentication as an addition security measure. This method provides good security with small key size too.

[1]  Qi Li,et al.  Cryptographic key generation from voice , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[2]  S. Katzenbeisser,et al.  A survey of steganographic techniques , .

[3]  K. Gnana Sheela,et al.  Analysis of elliptic curve scalar multiplication in secure communications , 2015, 2015 Global Conference on Communication Technologies (GCCT).

[4]  Osama S. Faragallah,et al.  An Efficient Chaos-Based Feedback Stream Cipher (ECBFSC) for Image Encryption and Decryption , 2007, Informatica.

[5]  Victor S. Miller,et al.  Use of Elliptic Curves in Cryptography , 1985, CRYPTO.

[6]  Stephan Katzenbeisser,et al.  Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .

[7]  Canyan Zhu,et al.  Image encryption algorithm based on chaotic mapping , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[8]  Lifang Wu,et al.  A novel key generation cryptosystem based on face features , 2010, IEEE 10th INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS.

[9]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[10]  Ismail Amr Ismail,et al.  A Digital Image Encryption Algorithm Based A Composition of Two Chaotic Logistic Maps , 2010, Int. J. Netw. Secur..

[11]  Manoj Prabhakar Elliptic Curve Cryptography in Securing Networks by Mobile Authentication , 2013 .

[12]  William Stallings,et al.  Cryptography and network security , 1998 .

[13]  Vivek Kapoor,et al.  Elliptic curve cryptography , 2008, UBIQ.

[14]  Mamta Juneja,et al.  Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption , 2009, 2009 International Conference on Advances in Recent Technologies in Communication and Computing.

[15]  Manali Dubal,et al.  Achieving Authentication and Integrity using Elliptic Curve Cryptography Architecture , 2013 .

[17]  Zulkarnain Md Ali,et al.  A Novel Public Key Image Encryption Based on Elliptic Curves over Prime Group Field , 2013 .

[18]  Ian F. Blake,et al.  Elliptic curves in cryptography , 1999 .

[19]  Cristian-Iulian Rincu,et al.  Combining point operations for efficient elliptic curve cryptography scalar multiplication , 2014, 2014 10th International Conference on Communications (COMM).