An Integrated Image Encryption Scheme Based on Elliptic Curve
Due to the extensive demand for digital images across all fields, the security of multimedia data over insecure networks is a challenging task. The majority of the existing modern encryption schemes are merely developed that ensure the confidentiality of the image data. This manuscript presents a ne...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2023-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9991126/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832582312867397632 |
---|---|
author | Ijaz Khalid Tariq Shah Sayed M. Eldin Dawood Shah Muhammad Asif Imran Saddique |
author_facet | Ijaz Khalid Tariq Shah Sayed M. Eldin Dawood Shah Muhammad Asif Imran Saddique |
author_sort | Ijaz Khalid |
collection | DOAJ |
description | Due to the extensive demand for digital images across all fields, the security of multimedia data over insecure networks is a challenging task. The majority of the existing modern encryption schemes are merely developed that ensure the confidentiality of the image data. This manuscript presents a new image encryption scheme that ensures confidentiality, user authentications, and secure key sharing among the communicating parties. Initially, the users share a secret parameter using Diffie-Hellman over the elliptic curve and pass it through SHA-256. Afterwards, the proposed scheme uses the first 128-bits for the confidentiality of the data, while the remaining 128-bits are for authentication. In the encryption algorithm, the confusion module is achieved by affine power affine transformation. At the same time, the diffusion module is attained through highly nonlinear sequences, which are generated through the elliptic curve. Experimental testing and the latest available security tools are used to verify the effectiveness of the proposed algorithm. The simulation findings and the comparison of the proposed scheme with the existing image encryption techniques reveal that the suggested scheme offers a sufficient degree of security. Furthermore, the outcome of the simulation results divulges several advantages of the proposed scheme, including a large key space, resistance to differential attacks, high efficiency, and strong statistical performance. |
format | Article |
id | doaj-art-7a71298fee3c406985515855c6dd39c4 |
institution | Kabale University |
issn | 2169-3536 |
language | English |
publishDate | 2023-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj-art-7a71298fee3c406985515855c6dd39c42025-01-30T00:01:18ZengIEEEIEEE Access2169-35362023-01-01115483550110.1109/ACCESS.2022.32300969991126An Integrated Image Encryption Scheme Based on Elliptic CurveIjaz Khalid0https://orcid.org/0000-0001-6084-9151Tariq Shah1https://orcid.org/0000-0002-6587-1638Sayed M. Eldin2Dawood Shah3https://orcid.org/0000-0001-9589-5991Muhammad Asif4https://orcid.org/0000-0001-5684-4737Imran Saddique5Department of Mathematics, Quaid-i-Azam University, Islamabad, PakistanDepartment of Mathematics, Quaid-i-Azam University, Islamabad, PakistanCenter of Research, Faculty of Engineering, Future University in Egypt, New Cairo, EgyptDepartment of Mathematics, Quaid-i-Azam University, Islamabad, PakistanDepartment of Mathematics, University of Management and Technology, Sialkot, PakistanDepartment of Mathematics, University of Management and Technology, Lahore, PakistanDue to the extensive demand for digital images across all fields, the security of multimedia data over insecure networks is a challenging task. The majority of the existing modern encryption schemes are merely developed that ensure the confidentiality of the image data. This manuscript presents a new image encryption scheme that ensures confidentiality, user authentications, and secure key sharing among the communicating parties. Initially, the users share a secret parameter using Diffie-Hellman over the elliptic curve and pass it through SHA-256. Afterwards, the proposed scheme uses the first 128-bits for the confidentiality of the data, while the remaining 128-bits are for authentication. In the encryption algorithm, the confusion module is achieved by affine power affine transformation. At the same time, the diffusion module is attained through highly nonlinear sequences, which are generated through the elliptic curve. Experimental testing and the latest available security tools are used to verify the effectiveness of the proposed algorithm. The simulation findings and the comparison of the proposed scheme with the existing image encryption techniques reveal that the suggested scheme offers a sufficient degree of security. Furthermore, the outcome of the simulation results divulges several advantages of the proposed scheme, including a large key space, resistance to differential attacks, high efficiency, and strong statistical performance.https://ieeexplore.ieee.org/document/9991126/Image encryptionS-boxelliptic curve cryptographyaffine power transformation |
spellingShingle | Ijaz Khalid Tariq Shah Sayed M. Eldin Dawood Shah Muhammad Asif Imran Saddique An Integrated Image Encryption Scheme Based on Elliptic Curve IEEE Access Image encryption S-box elliptic curve cryptography affine power transformation |
title | An Integrated Image Encryption Scheme Based on Elliptic Curve |
title_full | An Integrated Image Encryption Scheme Based on Elliptic Curve |
title_fullStr | An Integrated Image Encryption Scheme Based on Elliptic Curve |
title_full_unstemmed | An Integrated Image Encryption Scheme Based on Elliptic Curve |
title_short | An Integrated Image Encryption Scheme Based on Elliptic Curve |
title_sort | integrated image encryption scheme based on elliptic curve |
topic | Image encryption S-box elliptic curve cryptography affine power transformation |
url | https://ieeexplore.ieee.org/document/9991126/ |
work_keys_str_mv | AT ijazkhalid anintegratedimageencryptionschemebasedonellipticcurve AT tariqshah anintegratedimageencryptionschemebasedonellipticcurve AT sayedmeldin anintegratedimageencryptionschemebasedonellipticcurve AT dawoodshah anintegratedimageencryptionschemebasedonellipticcurve AT muhammadasif anintegratedimageencryptionschemebasedonellipticcurve AT imransaddique anintegratedimageencryptionschemebasedonellipticcurve AT ijazkhalid integratedimageencryptionschemebasedonellipticcurve AT tariqshah integratedimageencryptionschemebasedonellipticcurve AT sayedmeldin integratedimageencryptionschemebasedonellipticcurve AT dawoodshah integratedimageencryptionschemebasedonellipticcurve AT muhammadasif integratedimageencryptionschemebasedonellipticcurve AT imransaddique integratedimageencryptionschemebasedonellipticcurve |