Call for Paper - August 2019 Edition
IJCA solicits original research papers for the August 2019 Edition. Last date of manuscript submission is July 20, 2019. Read More

A Hybrid Approach for Image Encryption using Different Number Iterations in ECC and AES Techniques

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Authors:
Divija Ameta, Sandeep Upadhyay
10.5120/ijca2017915469

Divija Ameta and Sandeep Upadhyay. A Hybrid Approach for Image Encryption using Different Number Iterations in ECC and AES Techniques. International Journal of Computer Applications 175(3):10-12, October 2017. BibTeX

@article{10.5120/ijca2017915469,
	author = {Divija Ameta and Sandeep Upadhyay},
	title = {A Hybrid Approach for Image Encryption using Different Number Iterations in ECC and AES Techniques},
	journal = {International Journal of Computer Applications},
	issue_date = {October 2017},
	volume = {175},
	number = {3},
	month = {Oct},
	year = {2017},
	issn = {0975-8887},
	pages = {10-12},
	numpages = {3},
	url = {http://www.ijcaonline.org/archives/volume175/number3/28467-2017915469},
	doi = {10.5120/ijca2017915469},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

Image encryption has been emerged as the important aspect in order to protect the authenticity of the data being transferred among the different sources. Protecting the multimedia data so as to keep the integrity of the data intact has become the major concern these days. There have been several algorithms made so far. But each of them has some sort of disabilities and suffers from limitations. To overcome drawback of such algorithms we had formulated the same in the paper whose main focus is on keeping the original information secure. This paper includes the hybrid approach for implementing encryption techniques over a binary image. This work basically focus on image encryption using the derived concept of AES and ECC, once applying ECC individually on a single image and then altogether with AES with different threshold value set by user to check the accuracy on pixel intensity. The work not focuses only normal encryption but also considering horizontal and vertical components along with region of interest (ROI). The work will apply the proposed algorithm over specific area within an image.

References

  1. Rajdeep Bhanot , Rahul Hans, “ A Review and Comparative Analysis of Various Encryption Algorithms”, International Journal of Security and Its Applications Vol. 9, No. 4 (2015), pp. 289-306.
  2. Prakash Kuppuswamy, Saeed Q. Y. Al-Khalidi, “Hybrid Encryption/Decryption Technique Using New Public Key and Symmetric Key Algorithm ”, MIS Review Vol. 19, No. 2, March (2014).
  3. Kundankumar Rameshwar Saraf, Vishal Prakash Jagtap, Amit Kumar Mishra, “Text and Image Encryption Decryption UsingAdvanced Encryption Standard”, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Volume 3, Issue 3, May – June 2014.
  4. Preeti Poonia, Praveen Kantha, “Comparative Study of Various Substitution and Transposition Encryption Techniques”, International Journal of Computer Applications (0975 – 8887) Volume 145 – No.10, July 2016.
  5. Ahmad Jawahir, Haviluddin, “An audio encryption using transposition method”, International Journal of Advances in Intelligent Informatics ISSN: 2442-6571 Vol 1, No 2, July 2015.
  6. A. P Shaikh and V. kaul, “Enhanced security algorithm using hybrid encryption and ECC”, IOSR Journal of Computer Engineering (IOSRJCE),Vol. 6, Issue 3, pp. 80-85, 2014.
  7. Rohit kumar, bhanu pratap, and vaibhav singh, “image encryption using a combinantion of haar and dna algorithm”, international journal of advanced trends in computer science and engineering issn 2278-3091 volume 3, no.5, september - october 2014
  8. Nidhi Sethi, Ram Krishna and Prof R.P. Arora, “Image Compression Using Haar Wavelet Transform”, Computer Engineering and Intelligent Systems ISSN 2222-1719 (Paper) ISSN 2222-2863

Keywords

Image encryption, AES, ECC, ROI, Transposition