2023
DOI: 10.1109/access.2022.3230096
|View full text |Cite
|
Sign up to set email alerts
|

An Integrated Image Encryption Scheme Based on Elliptic Curve

Abstract: Due to the extensive demand for digital images across all fields, the security of multimedia data over insecure networks is a challenging task. The majority of the existing modern encryption schemes are merely developed that ensure the confidentiality of the image data. This manuscript presents a new image encryption scheme that ensures confidentiality, user authentications, and secure key sharing among the communicating parties. Initially, the users share a secret parameter using Diffie-Hellman over the ellip… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
19
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 19 publications
(20 citation statements)
references
References 48 publications
(62 reference statements)
1
19
0
Order By: Relevance
“…Information entropy is a quantitative index of uncertainty in data information, which is often used to evaluate the randomness of images [38]. The formula for calculating information entropy is as follows:…”
Section: Information Entropy Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Information entropy is a quantitative index of uncertainty in data information, which is often used to evaluate the randomness of images [38]. The formula for calculating information entropy is as follows:…”
Section: Information Entropy Analysismentioning
confidence: 99%
“…Plaintext images will inevitably suffer from malicious cutting in the channel transmission process, resulting in data loss [38]. To verify the robustness of the algorithm for data cropping, data of 1/2, 1/4, 1/8, and 1/16 of the Lena encrypted image were cropped respectively, and the decryption diagram was obtained, as shown in Fig.…”
Section: Cropping Attack Analysismentioning
confidence: 99%
“…Recently, there has been increasing interest in implementing gray-and color-image encryption using optical technology to achieve high-speed operation [2][3] [4]. The Optical Encryption (OE) process treats the image directly as a twodimensional (2D) object and therefore, it does not use image digitization as done in the Digital Encryption (DE) counterpart [5] [6]. Further, OE methods have some characteristic features due to the used optical devices [7] [8].…”
Section: Introductionmentioning
confidence: 99%
“…Many image encryption techniques have been suggested and developed by researchers, such as Arnold transformation-based [1][2][3], quantum system-based [4][5][6], compression sensing-based [7][8][9], cellular automata-based [10][11][12], DNA computing-based [13][14][15], elliptic curves-based [16][17][18], and chaotic system-based [19][20][21][22][23] approaches. The approach of digital image encryption based on chaotic systems is considered to be more effective than other approaches due to their ability to improve unpredictability, which makes encryption more resistant to attacks.…”
Section: Introductionmentioning
confidence: 99%