A Novel Approach to Enhance Image Security using Hyperchaos with Elliptic Curve Cryptography

A Novel Approach to Enhance Image Security using Hyperchaos with Elliptic Curve Cryptography

Ganavi M, Prabhudeva S
Copyright: © 2021 |Volume: 7 |Issue: 1 |Pages: 17
ISSN: 2334-4598|EISSN: 2334-4601|EISBN13: 9781799808275|DOI: 10.4018/IJRSDA.288520
Cite Article Cite Article

MLA

Ganavi M, and Prabhudeva S. "A Novel Approach to Enhance Image Security using Hyperchaos with Elliptic Curve Cryptography." IJRSDA vol.7, no.1 2021: pp.1-17. http://doi.org/10.4018/IJRSDA.288520

APA

Ganavi M & Prabhudeva S. (2021). A Novel Approach to Enhance Image Security using Hyperchaos with Elliptic Curve Cryptography. International Journal of Rough Sets and Data Analysis (IJRSDA), 7(1), 1-17. http://doi.org/10.4018/IJRSDA.288520

Chicago

Ganavi M, and Prabhudeva S. "A Novel Approach to Enhance Image Security using Hyperchaos with Elliptic Curve Cryptography," International Journal of Rough Sets and Data Analysis (IJRSDA) 7, no.1: 1-17. http://doi.org/10.4018/IJRSDA.288520

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Information security dominate the world. All the time we connect to the internet for social media, banking, and online shopping through various applications. Our priceless data may be hacked by attackers. There is a necessity for a better encryption method to enhance information security. The distinctive features of Elliptic Curve Cryptography (ECC) in particular the key atomity, speedy ciphering and preserving bandwidth captivating its use in multimedia encipher. An encryption method is proposed by incorporating ECC, Secure Hash Algorithm – 256 (SHA-256), Arnold transform, and hyperchaos. Randomly generated salt values are concatenated with each pixel of an image. SHA-256 hash is imposed which produces a hash value of 32-bit, later used to generate the key in ECC. Stronger ciphering is done by applying Arnold’s transformation and hyperchaos thereby achieved more randomness in image. Simulation outcomes and analysis show that the proposed approach provides more confidentiality for color images.