2019
DOI: 10.1109/access.2019.2906052
|View full text |Cite
|
Sign up to set email alerts
|

An Image Encryption Method Based on Elliptic Curve Elgamal Encryption and Chaotic Systems

Abstract: Due to the potential security problem about key management and distribution for the symmetric image encryption schemes, a novel asymmetric image encryption method is proposed in this paper, which is based on the elliptic curve ElGamal (EC-ElGamal) cryptography and chaotic theory. Specifically, the SHA-512 hash is first adopted to generate the initial values of a chaotic system, and a crossover permutation in terms of chaotic index sequence is used to scramble the plain-image. Furthermore, the generated scrambl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
69
0
2

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 136 publications
(73 citation statements)
references
References 78 publications
2
69
0
2
Order By: Relevance
“…[83] Mathematica / Core i7 @2.2 GHz 2.8 MB/s Ref. [40] MATLAB / Core 3.9GHz 0.05 MB/s Ref. [41] -/ -0.05 MB/s Ref.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…[83] Mathematica / Core i7 @2.2 GHz 2.8 MB/s Ref. [40] MATLAB / Core 3.9GHz 0.05 MB/s Ref. [41] -/ -0.05 MB/s Ref.…”
Section: Discussionmentioning
confidence: 99%
“…Several attempts to use ECC for image encryption have been presented in literature. Most recently, the scheme in [40] embeds the pixels of the scrambled image into an elliptic curve to apply ECC, then uses chaos game with DNA for diffusion. SHA-512 of the image was used to generate the initialization of chaotic maps to resist chosen plaintext attacks.…”
Section: ) Elliptic Curve-based Image Encrytionmentioning
confidence: 99%
“…H will be used as the key of the second stage of encryption which is divided into ''8-bit'' blocks as in Eqn. (21) and the initial values of the proposed triple chaotic STH are obtained by Eqns. (22) and (23).…”
Section: Image Encryptionmentioning
confidence: 99%
“…This scheme depends on pixel grouping to achieve faster encryption but unfortunately it still consumes many EC point multiplications. In [21], a chaotic system and EC-ElGamal based image encryption scheme is proposed. Firstly, the initial values of the chaotic map are generated using SHA-512, then crossover and EC-ElGamal encryption is used.…”
Section: Introductionmentioning
confidence: 99%
“…In [14], the EC based Elgamal cryptography and chaotic theory based novel asymmetric image encryption method was proposed by Yuling Luo, et al for key management security and symmetric image encryption scheme distribution. In this work, by adopting the SHA-512 hash the initial values of chaotic systems are generated.…”
Section: Related Workmentioning
confidence: 99%