2015
DOI: 10.1016/j.procs.2015.06.054
|View full text |Cite
|
Sign up to set email alerts
|

Image Encryption using Elliptic Curve Cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
38
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 87 publications
(38 citation statements)
references
References 5 publications
0
38
0
Order By: Relevance
“…As noted here, the signature verification requires only one EC point multiplication which makes the process faster than other schemes as in [20].…”
Section: Image Digital Signaturementioning
confidence: 99%
See 2 more Smart Citations
“…As noted here, the signature verification requires only one EC point multiplication which makes the process faster than other schemes as in [20].…”
Section: Image Digital Signaturementioning
confidence: 99%
“…In the proposed scheme, N = 4096 pairs of adjacent pixels are randomly chosen in the horizontal, vertical, and diagonal directions of both the plain image and its corresponding cipher image. A comparison of the computed correlation coefficients of RGB tested images with that of the other recent schemes as [15] and [20] is shown in Table 4, while Table 5 shows a comparison of the computed correlation coefficients of gray scale tested images with the other recent schemes as [21] and [14], [36]- [39]. From Table 4 and Table 5, it is obvious that the plain images correlation coefficients are close to 1, while that for the cipher images are close to 0 and.…”
Section: B Correlation Coefficientmentioning
confidence: 99%
See 1 more Smart Citation
“…Research [12] proposed a security method in images by applying elliptic curve cryptography to encrypt, decrypt, and digital signatures. The purpose of this research is to obtain a security method that can provide authenticity and integrity of images received.…”
Section: Related Workmentioning
confidence: 99%
“…Numerical simulations and security examinations completed, and the outcomes show the adequacy and security execution of the proposed framework. A large number of pictures are exchanged each day over the system by Laiphrakpam Dolendro Singh [17]. Some of these images are secret and they exchange the pictures safely.…”
Section: Literature Reviewmentioning
confidence: 99%