2022
DOI: 10.11591/ijeecs.v25.i1.pp247-255
|View full text |Cite
|
Sign up to set email alerts
|

Elliptical curve cryptography image encryption scheme with aid of optimization technique using gravitational search algorithm

Abstract: <p>Image <span>encryption enables users to safely transmit digital photographs via a wireless medium while maintaining enhanced anonymity and validity. Numerous studies are being conducted to strengthen picture encryption systems. Elliptical curve cryptography (ECC) is an effective tool for safely transferring images and recovering them at the receiver end in asymmetric cryptosystems. This method's key generation generates a public and private key pair that is used to encrypt and decrypt a picture.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 24 publications
0
3
0
Order By: Relevance
“…It is worth mentioning, that swarm intelligence algorithms such as particle swarm optimization [18], firefly algorithm [19], and bird mating optimizer [20]. can be used for cryptoanalysis of Vigenère cipher and recently, there are a number of swarm intelligence algorithms have been applied for that purpose such as [21]- [24].Finally, it is noticed that neural networks [25], [26] which is a typical model for machine learning and application is used also for cryptoanalysis of Vigenère cipher [27].…”
Section: Cryptanalysis Of Vigenère Ciphermentioning
confidence: 99%
“…It is worth mentioning, that swarm intelligence algorithms such as particle swarm optimization [18], firefly algorithm [19], and bird mating optimizer [20]. can be used for cryptoanalysis of Vigenère cipher and recently, there are a number of swarm intelligence algorithms have been applied for that purpose such as [21]- [24].Finally, it is noticed that neural networks [25], [26] which is a typical model for machine learning and application is used also for cryptoanalysis of Vigenère cipher [27].…”
Section: Cryptanalysis Of Vigenère Ciphermentioning
confidence: 99%
“…ECC can use elliptic curves to implement cryptography algorithms based on discrete logarithm problems and ElGamal algorithms in an efficient way [6], [7]. Elliptic curve random generator has been defined by National Institute of Standard and Technology (NIST) as a method of grouping random digits based on curves [8]. Unlike other cryptosystems that encrypt and decrypt messages directly, be it text or image, elliptic curve cryptosystem (ECC) is capable of encrypting and decrypting only points on the elliptic curves [7].…”
Section: Introductionmentioning
confidence: 99%
“…But, the RSS is not aware of updates in link quality in experiments [25]. Link quality estimation metric, as well as the required number of packets, is used for evaluating link quality through calculating the ratio of the transmitted as well as retransmitted packets to the amount of effectively obtained packets in a window of communication occurrence [26]. Elliptical curve cryptography (ECC) is an successful for securelytransferdata and improving the receiver end in asymmetric cryptosystems [27].…”
mentioning
confidence: 99%