4.6 Article

Color image encryption based on chaotic systems and elliptic curve ElGamal scheme

Journal

SIGNAL PROCESSING
Volume 141, Issue -, Pages 109-124

Publisher

ELSEVIER
DOI: 10.1016/j.sigpro.2017.04.006

Keywords

Chaos; Four-dimensional cat map; Elliptic curve (EC); ElGamal cryptosystem; Three-dimensional Lorenz system

Funding

  1. National Key Research and Development Program of China [2016 YFB 0800601]
  2. National Natural Science Foundation of China [61472331]
  3. Talents of Science and Technology Promote Plan, Chongqing Science & Technology Commission
  4. Fundamental Research Funds for the Central Universities [XDJK2015C078]

Ask authors/readers for more resources

Color image can provide more information than gray image, so it is used more widely in the field of the communication. In recent years, how to safely encrypt images has received increasing attention. Numerous previous image encryption algorithms are based on the symmetric encryption algorithm, but each pair of users communicating with symmetric encryption algorithm can only use the key that others do not know, so when the sender communicates with a receiver multiple times or sends the message to multiple receivers, the key number will grow at a geometric rate, and key management will become a burden on the users. In this paper, we propose an asymmetric image encryption algorithm for the advantages that the key groups and the number of keys in secret information transmission among multiple people are very small, and key transmission mode is relatively simple and secure. In our algorithm, first, the plain image is compressed and then the color image is encrypted by using the improved 4D cat map followed by asymmetric encryption which is based on elliptic curve ElGamal encryption, and finally, the encrypted image is globally diffused. The performance analysis is performed on key spaces, key sensitivity, the capability of resisting statistical attacks, differential attacks, known plaintext attacks and chosen plaintexticiphertext attacks and quality evaluation metrics of decrypted image. Simulation results show that the proposed algorithm has better security comparing with other algorithms. (C) 2017 Elsevier B.V. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available