Abstract
In this paper an approach for secured transmission of images and its implementation is being proposed. The proposed method proves to be better compared to various presently existing cryptographic algorithms. The basic application of this algorithm is to provide secured transmission of digital images for various multimedia usages. These encrypted messages can further be used for compact storage of information of patient details which are very much confidently for patient centric approach. The results of the implementation show that the computation time is faster comparatively and it is highly secured and also efficient method for image transmission. The input for demonstration is taken as Lena image on which the Elliptic Curve Cryptography method is applied. The major advantage of this approach is reduced key size.
Highlights
This document can be used as a template for Microsoft Word versions 6.0 or A considerable measure of majority of the data is discerned when we see an picture
At pictures would private and we need those picture should a chance to be exchanged protected securely, cryptography hails under assume. Those cryptographic procedure which we bring actualized in this paper may be the elliptic bend cryptography (ECC)
Different consider around ecc need reasoned that those difficultly on take care of a elliptic bend discrete logarithmic issue is exponentially tough for admiration to the magic span utilized
Summary
This document can be used as a template for Microsoft Word versions 6.0 or A considerable measure of majority of the data is discerned when we see an picture. At pictures would private and we need those picture should a chance to be exchanged protected securely, cryptography hails under assume Those cryptographic procedure which we bring actualized in this paper may be the elliptic bend cryptography (ECC). Elliptic bend cryptography (ECC), an approach In view of those arithmetical structure for elliptic curves through limited fields, is a government funded enter cryptography that need pulled in incredible consideration clinched alongside late A long time. It offers security comparative with customary systems, for example, such that rivest, Shamir, & Adleman (RSA), in any case for fundamentally more diminutive magic lengths [1]. Those side of the point expansion what’s more side of the point multiplying operations need aid consolidated adequately
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Engineering & Technology
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.