2021
DOI: 10.3390/app11125691
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Asymmetric Hyperchaotic Image Encryption Scheme Based on Elliptic Curve Cryptography

Abstract: Most of the image encryption schemes based on chaos have so far employed symmetric key cryptography, which leads to a situation where the key cannot be transmitted in public channels, thus limiting their extended application. Based on the elliptic curve cryptography (ECC), we proposed a public key image encryption method where the hash value derived from the plain image was encrypted by ECC. Furthermore, during image permutation, a novel algorithm based on different-sized block was proposed. The plain image wa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
18
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 35 publications
(18 citation statements)
references
References 34 publications
0
18
0
Order By: Relevance
“…The definition of D(i, j) is as follows: if C(i, j) = C'(i, j), then D(i, j) = 1, otherwise, double-precision real number parameter has 10 15 possible values. N 0 is an integer between [1,1000], and there are 10 3 values. Therefore, there are 10 15 × 10 15 × 10 15 × 10 15 × 10 3 ≈ 2 209 key combinations.…”
Section: Sensitivity Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…The definition of D(i, j) is as follows: if C(i, j) = C'(i, j), then D(i, j) = 1, otherwise, double-precision real number parameter has 10 15 possible values. N 0 is an integer between [1,1000], and there are 10 3 values. Therefore, there are 10 15 × 10 15 × 10 15 × 10 15 × 10 3 ≈ 2 209 key combinations.…”
Section: Sensitivity Analysismentioning
confidence: 99%
“…The protection of data security and privacy has become an urgent problem to be solved. Unfortunately, traditional encryption schemes such as AES, DES and RSA are mainly designed for text data so they are not suitable for image security applications [1,2], especially for real-time encryption of big data. Because of the huge amount of image data, high information redundancy and strong correlation urges researchers to seek efficient image encryption algorithms.…”
Section: Introductionmentioning
confidence: 99%
“…Image encryption technology is one of the important technologies for image protection. Image encryption technology can convert a regular plaintext image into an unrecognizable noise image [6][7][8][9].…”
Section: Introductionmentioning
confidence: 99%
“…Successful to achieve many security measures. An encryption method [7] where the input image is divided into five planes and each is encrypted using ECC. The hyperchaotic sequence is used in the permutation stage.…”
Section: Introductionmentioning
confidence: 99%