Abstract

In this paper an approach for secured transmission of images and its implementation is being proposed. The proposed method proves to be better compared to various presently existing cryptographic algorithms. The basic application of this algorithm is to provide secured transmission of digital images for various multimedia usages. These encrypted messages can further be used for compact storage of information of patient details which are very much confidently for patient centric approach. The results of the implementation show that the computation time is faster comparatively and it is highly secured and also efficient method for image transmission. The input for demonstration is taken as Lena image on which the Elliptic Curve Cryptography method is applied. The major advantage of this approach is reduced key size.

Highlights

  • This document can be used as a template for Microsoft Word versions 6.0 or A considerable measure of majority of the data is discerned when we see an picture

  • At pictures would private and we need those picture should a chance to be exchanged protected securely, cryptography hails under assume. Those cryptographic procedure which we bring actualized in this paper may be the elliptic bend cryptography (ECC)

  • Different consider around ecc need reasoned that those difficultly on take care of a elliptic bend discrete logarithmic issue is exponentially tough for admiration to the magic span utilized

Read more

Summary

Introduction

This document can be used as a template for Microsoft Word versions 6.0 or A considerable measure of majority of the data is discerned when we see an picture. At pictures would private and we need those picture should a chance to be exchanged protected securely, cryptography hails under assume Those cryptographic procedure which we bring actualized in this paper may be the elliptic bend cryptography (ECC). Elliptic bend cryptography (ECC), an approach In view of those arithmetical structure for elliptic curves through limited fields, is a government funded enter cryptography that need pulled in incredible consideration clinched alongside late A long time. It offers security comparative with customary systems, for example, such that rivest, Shamir, & Adleman (RSA), in any case for fundamentally more diminutive magic lengths [1]. Those side of the point expansion what’s more side of the point multiplying operations need aid consolidated adequately

Related Work
Literature Review
Pixel Combination into a Single Integer
Receiving the Collection of Pixels from the Large Integer
Point Multiplication
Implementation of ECC
Simulation Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.