Image Encryption/Decryption using ECC
This is the code that simulates the encryption and decryption of an image using random and private keys in MATLAB. This is the best online image encryption algorithm. In this, the elliptic curve cryptography is applied to achieve the security of any image before transmitting it to someone so that no other can see the data hidden in the image. At the receiver end, the destined user will already have the decryption key used for this. If the key is altered, the image will not be decrypted.
In the modern scenario, the digital images contain important information which required proper security while transmitting from one point to another. The security is valuable for some applications like military picture database, medical imaging system, and cable TV broadcasting. Image encryption has many benefits and it is the most popular security scheme of data or information processing.
Thesis statement ( Image encryption/decryption thesis)
In industries, confidential images are required security functions so that unauthorized access of images is not possible. For the encryption or decryption of images, some public and private keys are used. The private key image encryption/decryption process follows the symmetric cryptographic scheme, whereas asymmetric cryptographic systems use in the public key encryption image. In public-key cryptography, the encryption and decryption keys are not the same.
The pixel value of the image is first converted into the points and formed groups onto the elliptic curve finite field. All the programs are developed in the MATLAB software, and performance is measured via some security analysis parameters. Simulate the MATLAB script and observed the results with different stages of encrypting and decrypting process.
Elliptical Curve Cryptography (ECC)
Elliptical curve cryptography is a traditional approach to image encryption and decryption. The ECC (Elliptical Curve Cryptography) is a public key type and uses for those applications in which secure transmission channels are not available. In the image encryption process of ECC (Elliptical Curve Cryptography), the image message is mapping to point on the curve and converting the mapped point into the message types. The quality of the image depends on the pixel value, and the image encryption process mapped these pixel values to point onto the curve.
Figure 1 graph of an elliptical curve 
The ECC (Elliptical Curve Cryptography) is a private-public key pair uses to encrypting and decrypt the data. ECC is asymmetric in nature which means for encryption a public key is used and decryption is retained via private key. The image pixel value is encrypted with the public key and decrypt the ciphertext later using the corresponding private key. The image pixel value is converted into the points on the Elliptical curve, then the mapping process is applied in the finite field.
A map table is created with respect to the group of elliptic points. A private key is applied to the mapped points and encrypted the pixel values of the image. Later a corresponding public key is used for the decryption process and retained the actual image from the encrypted image. The image encryption and decryption code are written in MATLAB.
The image consists of pixel values for different formats, like a grayscale image contains 8-bit pixel values from 0 to 255. A color image consists of three octet value separately; shows Red, Green, and Blue intensity of color. An image is encrypted with ECC (Elliptical Curve Cryptography) considers each pixel as a message mapped to a point on the predefined elliptical curve. A map table is created with the help of the elliptic group generated first and then points are placed into the 256 groups. ECC(Elliptical Curve Cryptography) is used for the encryption of points after the mapping process of all pixel values of images related to point one by one. Mapping matrix generated after the code is debugging in MATLAB.
MATLAB, matrix laboratory, is the software used by engineers and computer scientists for designing algorithms, data analysis, exploration, visualization, application development and many more things. They also do image encryption and decryption using Matlab. The above-mentioned Matlab code for image encryption and decryption will stimulate the same for you.
AES image encryption code algorithm is also implemented with the help of the MATLAB platform. AES image encryption Matlab code makes a cipher Image from the original and vice versa.
Encryption and Decryption using MATLAB TOOL
- The image pixel values generated the groups on the elliptical curve with different instant points after the mapping process. A point’s vector is added to all instant points generated in the group.
- After the pixel values mapped onto the elliptical curve through the map table and then a public key is generated by the sender which multiplied with each pixel value or point value.
- The pixel values of the image encrypted using the public key onto the elliptic curve points.
- The mapped or converted image is retained using possession of a secret public key. Each pixel value is retained, and the real image is reconstructed from the encrypted image.
This thesis provided the secure encryption and decryption of an image using ECC. The online image encryption and decryption code are generated in the MATLAB tool.
Another technique Logistic map and Arnold cat scrambling are used for the online image encryption and code are available at free-thesis.
The security analysis of encrypted and decrypted image depends on the various attacks which affect the algorithm. Following analysis based on encrypted and decrypted performance of algorithm performed as
- Histogram analysis
- Correlation analysis
- Entropy analysis
- Key sensitive analysis
Figure 2 – experiment‘s image of encryption and decryption via the ECC method
All the performance analysis curves are the plot in MATLAB software, and a mapping table is also generated in the command window of MATLAB.
- The ECC method is completely sensitive to the secret key so that the encrypted image cannot be decrypted while making some changes in the secret key.
- The entropy value is higher (8) which provides the optimal length of the code assign to the pixel of an image.
- The range of the correlation coefficient must be lie between 0 to 1. The adjacent pixels correlation coefficient is maximum for better security.
- The input image contains some information that can be extracted for the encryption process. So histogram analysis provided the spectrum analysis of information of input and encrypted image.
- The secret key size is smaller.
- Low mathematical complexity.
- High-speed encryption.
- Brute force attack is impracticable for elliptical curve cryptography due to its logarithmic type of nature.
In this work, the ECC (Elliptical Curve Cryptography) algorithm is proposed for the online image encryption and decryption process. ECC (Elliptical Curve Cryptography) is provided fast encryption and use for high information images. The mapping is performed for the conversion of pixel value into the point of an affine elliptic curve over a finite field using the map table. The encryption process is very fast and low complex in nature. The strength of the algorithm is checked by the security analysis function like histogram, key security, and correlation.
- Soleymani, Ali, Md Jan Nordin, Azadeh Noori Hoshyar, Zulkarnain Md Ali, and Elankovan Sundararajan. “An image encryption scheme based on elliptic curve and a novel mapping method.”Â International Journal of Digital Content Technology and its Applications7, no. 13 (2013): 85.
- Astya, Dr ParmaNand, Ms Bhairvee Singh, and Mr Divyanshu Chauhan. “Image encryption and decryption using elliptic curve cryptography.”Â International Journal of Advance Research In Science And Engineering IJARSE3 (2014).
- Singh, Laiphrakpam Dolendro, and Khumanthem Manglem Singh. “Image encryption using elliptic curve cryptography.”Â Procedia Computer Science54 (2015): 472-481.
- Soleymani, Ali, Md Jan Nordin, and Zulkarnain Md Ali. “A Novel Public Key Image Encryption Based on Elliptic Curves over Prime Group Field.”Â Journal of Image and Graphics1, no. 1 (2013): 43-49.
- Nagaraj, Srinivasan, G. S. V. P. Raju, and K. Koteswara Rao. “Image encryption using elliptic curve cryptograhy and matrix.”Â Procedia Computer Science48 (2015): 276-281.
- Shankar, Tarun Narayan, and G. Sahoo. “Cryptography by karatsuba multiplier with ASCII codes.”Â International journal on computer applications(2010): 53-60.