CFP last date
20 May 2024
Reseach Article

An Approach for Security of Images over Elliptical Curve Cryptography and Digital Signature

by Toradmalle Dhanashree, Sonigara Varsha Rakesh, Singh Kiran Premnath, Kakade Omkar Shashikant, Panigrahy Krishnachandra Gourishankar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 153 - Number 11
Year of Publication: 2016
Authors: Toradmalle Dhanashree, Sonigara Varsha Rakesh, Singh Kiran Premnath, Kakade Omkar Shashikant, Panigrahy Krishnachandra Gourishankar
10.5120/ijca2016912203

Toradmalle Dhanashree, Sonigara Varsha Rakesh, Singh Kiran Premnath, Kakade Omkar Shashikant, Panigrahy Krishnachandra Gourishankar . An Approach for Security of Images over Elliptical Curve Cryptography and Digital Signature. International Journal of Computer Applications. 153, 11 ( Nov 2016), 25-27. DOI=10.5120/ijca2016912203

@article{ 10.5120/ijca2016912203,
author = { Toradmalle Dhanashree, Sonigara Varsha Rakesh, Singh Kiran Premnath, Kakade Omkar Shashikant, Panigrahy Krishnachandra Gourishankar },
title = { An Approach for Security of Images over Elliptical Curve Cryptography and Digital Signature },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2016 },
volume = { 153 },
number = { 11 },
month = { Nov },
year = { 2016 },
issn = { 0975-8887 },
pages = { 25-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume153/number11/26450-2016912203/ },
doi = { 10.5120/ijca2016912203 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:58:53.777629+05:30
%A Toradmalle Dhanashree
%A Sonigara Varsha Rakesh
%A Singh Kiran Premnath
%A Kakade Omkar Shashikant
%A Panigrahy Krishnachandra Gourishankar
%T An Approach for Security of Images over Elliptical Curve Cryptography and Digital Signature
%J International Journal of Computer Applications
%@ 0975-8887
%V 153
%N 11
%P 25-27
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Nowadays, the need of transferring data over a network has increased. Some of these data is confidential and requires to be transferred securely. The type of data can be a Text, Image or any other multimedia. It is essential to provide security to the data that one wants to share over a network. The goals of security are Confidentiality, Integrity and Authentication. Cryptography plays a major role in providing security to the data. Cryptography is the study of techniques for secure communication in the presence of third parties called adversaries. The most popular asymmetric cryptography techniques are RSA (Rivest-Shamir-Adleman) and ECC (Elliptic Curve Cryptography). RSA is based on Factorization Problem and ECC is based on Elliptic Curve arithmetic and Discrete Logarithm Problem. ECC provides same level of security or comparatively better security with smaller key size (bit lengths) than traditional cryptosystems like RSA, thereby requiring less storage and processing time.

References
  1. GUIDE TO ELLIPTIC CURVE CRYPTOGRAPHY, Darrel Hankerson, Alfrared Menzes, Scott Vanstone, Springer
  2. ELLIPTIC CURVE CRYPTOGRAPHY FOR CIPHERING IMAGES, Nikita Gupta, Vikas Kundu, Neha Kurra, Shivani Sharma, Bhagyashree Pal, Department of Computer Engineering
  3. IMAGE ENCRYPTION USING ELLIPTIC CURVE CRYPTOGRAPHY, Laiphrakpam Dolendro Singh and Khumanthem Manglem Singh, Eleventh International Multi-conference Information Processing.
  4. TWO IMPROVEMENTS TO DIGITAL SIGNATURE SCHEME BASED ON ELLIPTIC CURVE CRYPTOSYSTEM, Tao LONG, Xiaoxia LIU School of Information Science and Technology, Northwest University
  5. A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIENTS, Greeshma Sarath, Devesh C Jinwala and Sankita Patel, Department of Computer Engineering SVNIT, Surat.
  6. https://www.wolfram.com/mathematica
Index Terms

Computer Science
Information Sciences

Keywords

Elliptic Curve Cryptography Image Security