Abstract

In this paper, a novel scheme for secure and real time image transmission is introduced. The scheme uses a block-based elliptic curve (BBEC) public key encryption as a first stage of encryption so it solves the key distribution and management problem of symmetric key encryption in an efficient method. Then the security of first stage BBEC encryption is enhanced through a second stage of encryption which XOR the BBEC first stage output with a pseudo random sequence generated by a new designed multi chaotic pseudo random generator STH. It merges Sine, Ten and Henon maps (STH) and so it has five secret control parameters which increase the key space and hence the scheme security against brute force attacks. Both the key of the first stage BBEC image encryption and the control parameters of the second stage STH depend on two parts: EC Diffie-Hellman shared secret key and the input plain image itself which provides a good randomness and achieves a strong resistance against chosen plaintext attacks. After the two stages of encryption, the encrypted image is digitally signed in an efficient method to achieve integrity, authentication and non-repudiation. The results prove that the proposed scheme is more secure and faster than some other recent EC based schemes. It has low correlation, huge key space; key-dependent pixel value replacement and can resist statistical, differential and noise attacks.

Highlights

  • Due to the wide usage of images as in the Internet, its content protection has become an urgent issue

  • The results prove that the scheme has high security and it is robust against attacks but it still consume more time than other image encryption schemes

  • This paper proposes an improved image encryption and digital signature scheme which has the following advantages: the encryption consists of two stages (a) the first stage key depends on elliptic curve (EC) Diffie-Hellman key and on the input plain image itself and so it has more randomization and more resistance against statistical and differential attacks. (b) The security of the scheme is more enhanced by adding a second stage of encryption with a new designed triple chaotic pseudo random generator that merges three different chaotic: Sine, Ten and Henon maps (STH)

Read more

Summary

INTRODUCTION

Due to the wide usage of images as in the Internet, its content protection has become an urgent issue. (b) The security of the scheme is more enhanced by adding a second stage of encryption with a new designed triple chaotic pseudo random generator that merges three different chaotic: Sine, Ten and Henon maps (STH). The security of the EC-based schemes depends on the hardness of the EC Discrete Logarithm Problem (EC-DLP) which is defined as following: Given a point Q on the EC of elliptic curve Ep(a, b), such that Q = k. PROPOSED SCHEME The proposed scheme consists of two stages both of them use an ECDH shared secret key and another input plain image dependant key This combination of keys increases the randomness and the security against different type of attack

Ec SETUP AND KEY GENERATION
Compute the EC point:
Check if
SIMULATION RESULTS
SECURITY ANALYSIS
HISTOGRAM
CORRELATION COEFFICIENT
CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.