2020
DOI: 10.1109/access.2019.2958336
|View full text |Cite
|
Sign up to set email alerts
|

Secure Image Transmission Using Chaotic-Enhanced Elliptic Curve Cryptography

Abstract: In this paper, a novel scheme for secure and real time image transmission is introduced. The scheme uses a block-based elliptic curve (BBEC) public key encryption as a first stage of encryption so it solves the key distribution and management problem of symmetric key encryption in an efficient method. Then the security of first stage BBEC encryption is enhanced through a second stage of encryption which XOR the BBEC first stage output with a pseudo random sequence generated by a new designed multi chaotic pseu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
28
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 53 publications
(29 citation statements)
references
References 54 publications
1
28
0
Order By: Relevance
“…There are research works that show that the elliptic curves such as those described in this paper are robust and adequate for the development of safe systems [3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20][21][22]. Figure 1 presents the complete algorithm for the search of the elliptic curves to be used in this research.…”
Section: Elliptic Curves In the Field Of Cryptographymentioning
confidence: 99%
See 1 more Smart Citation
“…There are research works that show that the elliptic curves such as those described in this paper are robust and adequate for the development of safe systems [3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20][21][22]. Figure 1 presents the complete algorithm for the search of the elliptic curves to be used in this research.…”
Section: Elliptic Curves In the Field Of Cryptographymentioning
confidence: 99%
“…Finally, using a genetic algorithm based on DNA sequences, diffusion is applied to the previously obtained output. In [11], the authors propose an encryption scheme in two scenarios; both use an Elliptic Curves-Diffie-Hellman protocol and another key generated from the SHA-256 of the input image. Furthermore, in the encoding process, a triple chaotic STH map is used, and a digital signature is added to verify its origin before being decrypted.…”
Section: Introductionmentioning
confidence: 99%
“…(10). It follows that the probability of finding the generating element is 1 4 , so the failure probability is 3 4 . Using the binomial distribution, the total fail probability considering 32 threads is presented in Eq.…”
Section: Theoretical Tools Applied In Scec For Image Encryption Amentioning
confidence: 99%
“…In this paper, a joint compression and encryption algorithm is developed with the use of compressive sensing, chaotic map, FrWT and random pixel exchange [19]. A hybrid chaotic sine-tent-hénon (STH) [20] map is used to create the random measurement matrix. Then the CS technique is applied to ensure the initial encryption and compression.…”
Section: Introductionmentioning
confidence: 99%