Abstract
Aiming to address the problems of high costs associated with the storage and transmission of environmental monitoring images, as well as potential security risks, this paper proposes a security compressed sensing image encryption algorithm based on elliptic curve cryptography. The algorithm introduces elliptic curve encryption technology within a compressed sensing framework, using elliptic curve cryptography to encrypt the matrix during the compression perception acquisition process. This enables secure acquisition of environmental monitoring encrypted images. Therefore, this paper presents a security compressed sensing framework to address security gaps in the compression perception reconstruction process and improve the security of environmental monitoring images. Experimental results show that the proposed algorithm effectively encrypts and reconstructs environmental monitoring images, with high security and resistance to cracking.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Li, J., et al.: A review of remote sensing for environmental monitoring in China. Remote Sens. 12(7), 1130 (2020)
Dunbabin, M., Marques, L.: Robots for environmental monitoring: significant advancements and applications. IEEE Robot. Autom. Mag. 19(1), 24–39 (2012)
Hakala, I., Tikkakoski, M., Kivelä, I.: Wireless sensor network in environmental monitoring-case foxhouse. In: 2008 Second International Conference on Sensor Technologies and Applications (sensorcomm 2008). IEEE (2008)
Xu, L.D., He, W., Li, S.: Internet of things in industries: a survey. IEEE Trans. Ind. Inform. 10(4), 2233–2243 (2014)
Dong, B., et al.: A novel approach to improving the efficiency of storing and accessing small files on hadoop: a case study by powerpoint files. In: 2010 IEEE International Conference on Services Computing. IEEE (2010)
Zhou, X., Zhang, H., Wang, C.: A robust image watermarking technique based on DWT, APDCBT, and SVD. Symmetry 10(3), 77 (2018)
Zhang, Y., et al.: HF-TPE: high-fidelity thumbnail-preserving encryption. IEEE Trans. Circuits Syst. Video Technol. 32(3), 947–961 (2021)
Shah, T., Jamal, S.S.: An improved chaotic cryptosystem for image encryption and digital watermarking. Wireless Personal Commun. 110(3): 1429–1442 (2020)
Arora, M., Khurana, M.: Secure image encryption technique based on jigsaw transform and chaotic scrambling using digital image watermarking. Opt. Quant. Electron. 52(2), 1–30 (2020)
El-Khamy, S.E., Korany, N.O., Mohamed, A.G.: A new fuzzy-DNA image encryption and steganography technique. IEEE Access 8, 148935–148951 (2020)
Bala Krishnan, R., et al.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications: 1–17 (2021)
Liu, J., et al.: A sensitive image encryption algorithm based on a higher-dimensional chaotic map and steganography. Int. J. Bifurcation Chaos 32(01), 2250004 (2022)
Akkasaligar, P.T., Biradar, S.: Selective medical image encryption using DNA cryptography. Inf. Secur. J. Global Perspective 29(2), 91–101 (2020)
Liu, Y., et al.: Optical image encryption algorithm based on hyper-chaos and public-key cryptography. Optics Laser Technol. 127, 106171 (2020)
Donoho, D.L.: Compressed sensing. IEEE Trans. Inf. Theory 52(4), 1289–1306 (2006)
Candès, E.J., Romberg, J., Tao, T.: Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information. IEEE Trans. Inf. Theory 52(2), 489–509 (2006)
Baraniuk, R.G.: Compressive sensing [lecture notes]. IEEE Signal Process. Magaz. 24(4), 118–121 (2007)
Koblitz, N., Menezes, A., Vanstone, S.: The state of elliptic curve cryptography. Des. Codes Crypt. 19(2), 173–193 (2000)
Amara, M., Siad, A.: Elliptic curve cryptography and its applications. In: International workshop on systems, signal processing and their applications, WOSSPA. IEEE (2011)
Zhou, X., Tang, X.: Research and implementation of RSA algorithm for encryption and decryption. In: Proceedings of 2011 6th International Forum on Strategic Technology, vol. 2. IEEE (2011)
Corrigan-Gibbs, H., Kogan: The discrete-logarithm problem with preprocessing. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Cham (2018). Doi: https://doi.org/10.1007/978-3-319-78375-8_14
Mahto, D., Yadav, D.K.: RSA and ECC: a comparative analysis. Int. J. Appl. Eng. Res. 12(19), 9053–9061 (2017)
Yadav, A.K.: Significance of elliptic curve cryptography in blockchain IoT with comparative analysis of RSA algorithm. In: 2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). IEEE (2021)
Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system. Decentralized Bus. Rev., 21260 (2008)
Zhang, L., Zhang, J., Jin, A. Optimization and reconstruction for EPMA image compressed sensing based on chaotic measurement matrix. In: 2022 14th International Conference on Machine Learning and Computing (ICMLC), 02, pp. 474–482 (2022)
Kamali, S.H., et al.: A new modified version of advanced encryption standard based algorithm for image encryption. In: 2010 International Conference on Electronics and Information Engineering, vol. ol. 1. IEEE (2010)
Mohammad, O.F., et al.: A survey and analysis of the image encryption methods. Int. J. Appl. Eng. Res. 12(23), 13265–13280 (2017)
Mandal, M.K., et al.: Symmetric key image encryption using chaotic Rossler system.“ Security and Communication Networks 7(11): 2145–2152 (2014)
Yockey, H.P.: Information theory, evolution and the origin of life. Inf. Sci. 141(3–4), 219–225 (2002)
Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Techn. J. 28(4), 656–715 (1949)
Thomas, M.T.C.A.J., Thomas Joy, A.: Elements of information theory. Wiley-Interscience (2006)
Zhang, Y., et al.: Signal reconstruction of compressed sensing based on alternating direction method of multipliers. Circuits Syst. Signal Process. 39(1), 307–323 (2020)
Li, R.: Fingerprint-related chaotic image encryption scheme based on blockchain framework. Multimed. Tools Appl. 80(20), 30583–30603 (2020). https://doi.org/10.1007/s11042-020-08802-z
Certicom, E. C. C.: Challenge and The Elliptic Curve Cryptosystem, pp. 409–418 (1998)
Acknowledgments
This paper was supported by the Jiangxi Province Network Space Security Intelligent Perception Key Laboratory Open Fund (No.: JKLCIP202205).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Jin, A., Li, X., Xiong, Q. (2023). Security Compressed Sensing Image Encryption Algorithm Based on Elliptic Curve. In: Yu, Z., et al. Data Science. ICPCSEE 2023. Communications in Computer and Information Science, vol 1879. Springer, Singapore. https://doi.org/10.1007/978-981-99-5968-6_25
Download citation
DOI: https://doi.org/10.1007/978-981-99-5968-6_25
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-5967-9
Online ISBN: 978-981-99-5968-6
eBook Packages: Computer ScienceComputer Science (R0)