An Image Encryption Method Based on Elliptic Curve Elgamal Encryption and Chaotic Systems

Due to the potential security problem about key management and distribution for the symmetric image encryption schemes, a novel asymmetric image encryption method is proposed in this paper, which is based on the elliptic curve ElGamal (EC-ElGamal) cryptography and chaotic theory. Specifically, the S...

Full description

Bibliographic Details
Main Authors: Yuling Luo, Xue Ouyang, Junxiu Liu, Lvchen Cao
Format: Article
Language:English
Published: IEEE 2019-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8669767/
_version_ 1819052439258529792
author Yuling Luo
Xue Ouyang
Junxiu Liu
Lvchen Cao
author_facet Yuling Luo
Xue Ouyang
Junxiu Liu
Lvchen Cao
author_sort Yuling Luo
collection DOAJ
description Due to the potential security problem about key management and distribution for the symmetric image encryption schemes, a novel asymmetric image encryption method is proposed in this paper, which is based on the elliptic curve ElGamal (EC-ElGamal) cryptography and chaotic theory. Specifically, the SHA-512 hash is first adopted to generate the initial values of a chaotic system, and a crossover permutation in terms of chaotic index sequence is used to scramble the plain-image. Furthermore, the generated scrambled image is embedded into the elliptic curve for the encrypted by EC-ElGamal which can not only improve the security but also can help solve the key management problems. Finally, the diffusion combined chaos game with DNA sequence is executed to get the cipher image. The experimental analysis and performance comparisons demonstrate that the proposed method has high security, good efficiency, and strong robustness against the chosen-plaintext attack which make it have potential applications for the image secure communications.
first_indexed 2024-12-21T12:19:51Z
format Article
id doaj.art-e33df54d101a4a3ea8bb298960a38b65
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-21T12:19:51Z
publishDate 2019-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-e33df54d101a4a3ea8bb298960a38b652022-12-21T19:04:20ZengIEEEIEEE Access2169-35362019-01-017385073852210.1109/ACCESS.2019.29060528669767An Image Encryption Method Based on Elliptic Curve Elgamal Encryption and Chaotic SystemsYuling Luo0https://orcid.org/0000-0002-0117-4614Xue Ouyang1Junxiu Liu2https://orcid.org/0000-0002-9790-1571Lvchen Cao3School of Electronic Engineering, Guangxi Normal University, Guilin, ChinaSchool of Electronic Engineering, Guangxi Normal University, Guilin, ChinaSchool of Electronic Engineering, Guangxi Normal University, Guilin, ChinaSchool of Information and Electronics, Beijing Institute of Technology, Beijing, ChinaDue to the potential security problem about key management and distribution for the symmetric image encryption schemes, a novel asymmetric image encryption method is proposed in this paper, which is based on the elliptic curve ElGamal (EC-ElGamal) cryptography and chaotic theory. Specifically, the SHA-512 hash is first adopted to generate the initial values of a chaotic system, and a crossover permutation in terms of chaotic index sequence is used to scramble the plain-image. Furthermore, the generated scrambled image is embedded into the elliptic curve for the encrypted by EC-ElGamal which can not only improve the security but also can help solve the key management problems. Finally, the diffusion combined chaos game with DNA sequence is executed to get the cipher image. The experimental analysis and performance comparisons demonstrate that the proposed method has high security, good efficiency, and strong robustness against the chosen-plaintext attack which make it have potential applications for the image secure communications.https://ieeexplore.ieee.org/document/8669767/SHA-512 hashelliptic curve ElGamal encryptionchaos gamecrossover permutation
spellingShingle Yuling Luo
Xue Ouyang
Junxiu Liu
Lvchen Cao
An Image Encryption Method Based on Elliptic Curve Elgamal Encryption and Chaotic Systems
IEEE Access
SHA-512 hash
elliptic curve ElGamal encryption
chaos game
crossover permutation
title An Image Encryption Method Based on Elliptic Curve Elgamal Encryption and Chaotic Systems
title_full An Image Encryption Method Based on Elliptic Curve Elgamal Encryption and Chaotic Systems
title_fullStr An Image Encryption Method Based on Elliptic Curve Elgamal Encryption and Chaotic Systems
title_full_unstemmed An Image Encryption Method Based on Elliptic Curve Elgamal Encryption and Chaotic Systems
title_short An Image Encryption Method Based on Elliptic Curve Elgamal Encryption and Chaotic Systems
title_sort image encryption method based on elliptic curve elgamal encryption and chaotic systems
topic SHA-512 hash
elliptic curve ElGamal encryption
chaos game
crossover permutation
url https://ieeexplore.ieee.org/document/8669767/
work_keys_str_mv AT yulingluo animageencryptionmethodbasedonellipticcurveelgamalencryptionandchaoticsystems
AT xueouyang animageencryptionmethodbasedonellipticcurveelgamalencryptionandchaoticsystems
AT junxiuliu animageencryptionmethodbasedonellipticcurveelgamalencryptionandchaoticsystems
AT lvchencao animageencryptionmethodbasedonellipticcurveelgamalencryptionandchaoticsystems
AT yulingluo imageencryptionmethodbasedonellipticcurveelgamalencryptionandchaoticsystems
AT xueouyang imageencryptionmethodbasedonellipticcurveelgamalencryptionandchaoticsystems
AT junxiuliu imageencryptionmethodbasedonellipticcurveelgamalencryptionandchaoticsystems
AT lvchencao imageencryptionmethodbasedonellipticcurveelgamalencryptionandchaoticsystems