A Novel Approach to Enhance Image Security using Hyperchaos with Elliptic Curve Cryptography

A Novel Approach to Enhance Image Security using Hyperchaos with Elliptic Curve Cryptography

Ganavi M, Prabhudeva S
Copyright: © 2021 |Pages: 17
DOI: 10.4018/IJRSDA.288520
Article PDF Download
Open access articles are freely available for download

Abstract

Information security dominate the world. All the time we connect to the internet for social media, banking, and online shopping through various applications. Our priceless data may be hacked by attackers. There is a necessity for a better encryption method to enhance information security. The distinctive features of Elliptic Curve Cryptography (ECC) in particular the key atomity, speedy ciphering and preserving bandwidth captivating its use in multimedia encipher. An encryption method is proposed by incorporating ECC, Secure Hash Algorithm – 256 (SHA-256), Arnold transform, and hyperchaos. Randomly generated salt values are concatenated with each pixel of an image. SHA-256 hash is imposed which produces a hash value of 32-bit, later used to generate the key in ECC. Stronger ciphering is done by applying Arnold’s transformation and hyperchaos thereby achieved more randomness in image. Simulation outcomes and analysis show that the proposed approach provides more confidentiality for color images.
Article Preview
Top

Introduction

Secured digital image communication is possible by one of the means like Image encryption. Securing the characteristics of image data is predominant in medical, military, and commercial domains. Safeguarding interactive media intelligence against prohibited access became a critical issue in our routine. Minutiae of images are also surveyed & deployed by third-party which leads to immeasurable damage for the image proprietor. To overcome such difficulties, digital image techniques are mandatory to be applied to images to encrypt before transmitting them. Information security is required to reduce the risk level that is tolerable to the business. Security challenges for sensitive data exchange through online networks are confidentiality, authenticity, integrity, non-repudiation, and availability. The conventional encryption standards are not able to fulfill the demands of image scrambling. The chaotic nature of hypersensitive to inceptive state and system framework, no recurrence, and generating unpredictable codes. The resultant chaotic sequence is accurate (Huang et al., 2018) and it is of great significance in encryption algorithms.

Hash functions are tremendously beneficial in cryptography. These functions emerge as a prominent role in the applications of data security. They can accomplish preservation, perfection, and regularity of data, authenticate a message and guarantee the authenticity by a digital signature (Seyedzade, 2010; Wang, 2018). It should obtain different security properties like collision resistance, pre-image resistance, and pseudo-randomness. The most commonly used hash algorithm, SHA-256 results in a unique 32-byte hash value for input data. This value may be used as a key to encrypt data. The generated key value is different for different input data. Image scrambling can be carried out by applying Arnold transformation (Min et al., 2013). The significant feature of this transformation is that it uses periodicity. The number of iterations to recover back original input is calculated based on the image size. Arnold transformation is enforced pixels as well as continued to image chunks which enhances the robustness and security level (Sathish, 2019). A cryptographic hash is required in securing the passwords or secret images when stored in memory to protect them from birthday and dictionary attacks. So always it is recommended to apply hash on a combination of salt and passwords or important pictures (Gauravaram, 2012).

ECC (Koblitz, 1987; Miller, 1985) uses smaller key sizes compared to Rivest, Shamir & Adleman (RSA) thereby providing more security (Bakr et al., 2018). It is the next level to asymmetric cryptosystem on the numerical design of structures over finite fields (Gutub et al., 2007; Laiphrakpam and Khumanthem, 2018; Koblitz, 1987; Ziad et al., 2018).

ECC has been a recent analysis topic within the space of information security (Kamalakannan and Tamilselvan, 2015; Vigila and Muneswaran, 2009; Roy et al., 2014). The proposed method uses ECC for generating the key required to encrypt/decrypt process for secure transfer of input image. A salt is randomly generated to the size of an image. An obtained random number is concatenated with each pixel value of an input image. Applying SHA-256 hashing on this image will generate a 32-byte hash value. The key to the elliptic curve point is communal in the middle of the sender and receiver. The number of times Arnold’s transformation (Min et al., 2013) was carried is based on the value of the elliptic curve point. This point value is also applied to achieve the initial framework of the hyperchaos system. The resultant hyperchaos output is XOR with Arnold’s transformed image (Sathish, 2019; Kaur and Talwar, 2017) to generate the cipher image. This proposed method prevents the necessity of communication of the look-up table information.

Complete Article List

Search this Journal:
Reset
Volume 9: 1 Issue (2025): Forthcoming, Available for Pre-Order
Volume 8: 1 Issue (2024): Forthcoming, Available for Pre-Order
Volume 7: 4 Issues (2021): 1 Released, 3 Forthcoming
Volume 6: 3 Issues (2019)
Volume 5: 4 Issues (2018)
Volume 4: 4 Issues (2017)
Volume 3: 4 Issues (2016)
Volume 2: 2 Issues (2015)
Volume 1: 2 Issues (2014)
View Complete Journal Contents Listing