Header menu link for other important links
X
Elliptical Curve Cryptography for Images Using Fractal Based Multiple Key Hill Cipher
Kedarisetti K, Gamini R,
Published in IEEE
2018
Pages: 643 - 649
Abstract
Ever since the evolution of time, there have been changes in the transmission and storage of images, but the only constants are the security issues that came along. Eavesdropping is the major pivotal security challenge and throughout the evolution of time even though many encryption methods are developed, the middlemen and hackers etc. also developed new methods, simultaneously, to sniff the information. In this process of eavesdropping, there are many different methods like chosen-cipher text attack, brute force attack etc. In order to cope up with these deficiencies, we proposed an improvised version of the Elliptical curve cryptography (ECC) with multiple keys generated by fractals. Keys which are generated by the combination of ECC and Fractals are used for the conversion of the symmetric Hill Cipher encryption to asymmetric, which has higher security. In order to measure the efficiency of proposed algorithm we have used the entropy, peak to signal noise ratio(PSNR), unified average changing intensity(UACI) and the correlation between pixels along horizontal, vertical and diagonal directions. © 2018 IEEE.
About the journal
JournalData powered by Typeset2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)
PublisherData powered by TypesetIEEE
Open AccessNo