2021
DOI: 10.11591/ijece.v11i2.pp1293-1302
|View full text |Cite
|
Sign up to set email alerts
|

Image encryption based on elliptic curve cryptosystem

Abstract: Image encryption based on elliptic curve cryptosystem and reducing its complexity is still being actively researched. Generating matrix for encryption algorithm secret key together with Hilbert matrix will be involved in this study. For a first case we will need not to compute the inverse matrix for the decryption processing cause the matrix that be generated in encryption step was self invertible matrix. While for the second case, computing the inverse matrix will be required. Peak signal to noise ratio (PSNR… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 20 publications
(14 citation statements)
references
References 12 publications
0
11
0
Order By: Relevance
“…Image encryption has been implementing for fractional-order of dimension three in 2020, where the proposed algorithm was effective according to the security analysis [23]. Finally, elliptic curves were a tool to construct an asymmetric image encryption scheme in 2021 in two different works [24], [25], they were fast and secure in term of generating points on an elliptic curve. In the same year (2021), an approach of image encryption based the time delay of chaotic system has been proposed [26], where they proposed a type of time delay chaotic system to achieve the purpose of the image encryption.…”
Section: Image Encryptionmentioning
confidence: 99%
“…Image encryption has been implementing for fractional-order of dimension three in 2020, where the proposed algorithm was effective according to the security analysis [23]. Finally, elliptic curves were a tool to construct an asymmetric image encryption scheme in 2021 in two different works [24], [25], they were fast and secure in term of generating points on an elliptic curve. In the same year (2021), an approach of image encryption based the time delay of chaotic system has been proposed [26], where they proposed a type of time delay chaotic system to achieve the purpose of the image encryption.…”
Section: Image Encryptionmentioning
confidence: 99%
“…ECC is the asymmetric encryption proposed by Neal Koblitz and Victor S. Miller in 1985. The algorithm of ECC is derived from the elliptic curve [19.] 𝑦 2 = 𝑥 3 + 𝑎𝑥 + 𝑏 where a and b are a positive integer of coefficients from 0 to p. Thus, the value of a and b can be considered by the following constraint 4𝑎 3 + 27𝑏 2 𝑚𝑜𝑑 𝑝 ≠ 0 where𝑝 > 3 [22]- [26].…”
Section: Elliptic Curve Cryptographymentioning
confidence: 99%
“…Related work: Like chaotic maps, elliptic curves (ECs) are highly sensitive to the initial parameters, and a number of EC-based algorithms have been developed for cryptographic applications [9,[35][36][37][38][39][40][41][42][43][44][45][46][47][48]. Zhang and Wang [40] used the group law for the generation of a public key and encrypted digital images by combining a chaotic system and elliptic curve cryptography (ECC).…”
Section: Introductionmentioning
confidence: 99%