[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content
Log in

Image encryption method based on improved ECC and modified AES algorithm

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Currently, embedded systems can be found everywhere in quotidian life. In the development of embedded systems, information security is one of the important factors. Encryption is an efficient technique to protect information against attacks. However, because of constraints, existing encryption functions are not compatible and do not agree with real-time applications in embedded systems. In this paper, an improved cryptographic approach with a high level of security and high speed is put forward. Our work uses an efficient version of a hybrid scheme comprising an Advanced Encryption Standard (AES) - Elliptic Curve Cryptography (ECC) for medical image encryption, which combines the benefits of the symmetric AES to speed-up data encryption and asymmetric ECC in order to secure the interchange of a symmetric session key. The contribution of this paper consists of the following two main points: First, we put forward an optimized ECC hardware architecture to respect the compromise between area, power dissipation, and speed. Thus, we primarily utilize only two multipliers to develop the Point Addition (PA) block and the Point Doubling (PD) block, which reduces time complexity. Then, a 32-bit multiplier and a 32-bit inverter architecture based on shifts and XORs are proposed to reduce power consumption and area occupancy. Second, for image encryption, we primarily propose to modify the AES by eliminating the mix-columns transformation and replacing it with a permutation based on the shifts of columns, which decreases time complexity while maintaining the Shannon diffusion and the confusion principle. Then, an adjustment of the rearrangement of the general structure is given to enhance the entropy value. The global cryptosystem is implemented using a co-design approach where the modified AES runs on the NIOS II processor, and the scalar ECC multiplication is designed as a hardware accelerator. The suggested cryptographic system spends much less execution time, which is a significant factor for being applied in practice. Security analysis is successfully performed, and our experiments prove that our proposed technique provides the basics of cryptography with more simplicity and correctness. In fact, the results of the evaluation prove the effectiveness, rapidity and high security of the suggested algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22

Similar content being viewed by others

References

  1. Abd El-Latif AA, Niu X (2013) A hybrid chaotic system and cyclic elliptic curve for image encryption. Elsevier AEU – Int J Electron Commun 67(2):136–143. https://doi.org/10.1016/j.aeue.2012.07.004

    Article  Google Scholar 

  2. Ansarmohammadi S. A, Shahinfar S, Nejatollahi H (2015) Fast and area efficient implementation for chaotic image encryption algorithms. 18th CSI International Symposium on Computer Architecture and Digital Systems (CADS), Tehran, pp. 1–4. https://doi.org/10.1109/CADS.2015.7377788.

  3. Atteya A M, Madian A H (2014) A hybrid Chaos-AES encryption algorithm and its implementation based on FPGA. International new circuits and systems conference (NEWCAS), Trois-Rivieres, QC, 2014, pp. 217–220. https://doi.org/10.1109/NEWCAS.2014.6934022.

  4. Bentoutou Y, Bensikaddour El H, Taleb N, Bounoua N (2020) An improved image encryption algorithm for satellite applications. Adv Space Res 66(1):176–192. https://doi.org/10.1016/j.asr.2019.09.027

    Article  Google Scholar 

  5. Elhoseny M, Ramírez-González G, Abu-Elnasr O M, Shawkat S A, Arunkumar N, Farouk A (2018) Secure Medical Data Transmission Model for IoT-Based Healthcare Systems. IEEE Access, vol. 6, pp. 20596–20608. https://doi.org/10.1109/ACCESS.2018.2817615.

  6. FIPS PUB 197 (2001) Advanced encryption standard (AES). Information Technology Laboratory. Computer Security Resource Center

  7. Gafsi M, Hajjaji M A, Malek J, Mtibaa A (2020) Efficient Encryption System for Numerical Image Safe Transmission. J Electric Comput Eng, vol. 2020, Article ID 8937676. https://doi.org/10.1155/2020/8937676

  8. Ganesh A R, Manikandan P N, Sethu SP, Sundararajan R, Pargunarajan K (2011) An improved AES-ECC hybrid encryption scheme for secure communication in cooperative diversity based wireless sensor networks. International conference on recent trends in information technology (ICRTIT). Chennai, Tamil Nadu. 1209-1214. https://doi.org/10.1109/ICRTIT.2011.5972351.

  9. Hafsa A, Alimi N, Sghaier N, Zeghid M, Machhout M (2017) A hardware-software co-designed AES-ECC cryptosystem. International conference on advanced systems and electric technologies (IC_ASET), Hammamet, pp. 50-54, https://doi.org/10.1109/ASET.2017.7983665.

  10. Hafsa A, Sghaier A, Zeghid M, Malek J, Machhout M (2020) An improved co-designed AES-ECC cryptosystem for secure data transmission. Int J Inf Comput Secur 13(1):118–140. https://doi.org/10.1504/IJICS.2020.108145

    Article  Google Scholar 

  11. Hajajneh T, Mohd B J, Itradat A, Quttoum A N (2013) Performance and information security evaluation with firewalls. International Journal of Security and Its Applications Vol.7, No.6 (2013), pp.355–372. https://doi.org/10.14257/ijsia.2013.7.6.36.

  12. Hayajneh T, Ullah S, Mohd BJ, Balagani KS (2017) An enhanced WLAN security system with FPGA implementation for multimedia applications. IEEE Syst J 11(4):2536–2545. https://doi.org/10.1109/JSYST.2015.2424702

    Article  Google Scholar 

  13. Koblitz N (1987) Elliptic curve cryptosystems. Math Comput 48(177):203–203

    Article  MathSciNet  Google Scholar 

  14. Laiphrakpam DS, Khumanthem MS (2017) Medical image encryption based on improved ElGamal encryption technique. Optik 147:88–102. https://doi.org/10.1016/j.ijleo.2017.08.028

    Article  Google Scholar 

  15. Lin Z, Liu J, Lian J, Ma Y, Zhang X (2019) A novel fast image encryption algorithm for embedded systems. Multimed Tools Appl 78:20511–20531. https://doi.org/10.1007/s11042-018-6824-5

    Article  Google Scholar 

  16. Liu H, Liu Y (2014) Cryptanalyzing an image encryption scheme based on hybrid chaotic system and cyclic elliptic curve. Opt Laser Technol 56:15–19. https://doi.org/10.1016/j.optlastec.2013.07.009

    Article  Google Scholar 

  17. Liu J, Ma Y, Li S, Lian J, Zhang X (2018) A new simple chaotic system and its application in medical image encryption. Multimed Tools Appl 77:22787–22808. https://doi.org/10.1007/s11042-017-5534-8

    Article  Google Scholar 

  18. Sbiaa F, Kotel S, Zeghid M, Tourki R, Machhout M, Baganne A (2017) High-Level Implementation of a Chaotic and AES Based Crypto-System. J Circuits Syst Comput 26(07):1750122. https://doi.org/10.1142/S0218126617501225

    Article  Google Scholar 

  19. Sghaier A, Zeghid M, Masoud CH, Machhout M (2017) Design and implementation of low area/power elliptic curve digital signature hardware Core. Electron 6(2):46. https://doi.org/10.3390/electronics6020046

    Article  Google Scholar 

  20. Shankar K., Eswaran P (2016) An efficient image encryption technique based on optimized key generation in ECC using genetic algorithm. Artificial intelligence and evolutionary computations in engineering systems. Adv intell syst comput, vol 394, pp 705-714. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2656-7_64.

  21. Toughi S, Fathi MH, Sekhavat YA (2017) An image encryption scheme based on elliptic curve Pseudo random and advanced encryption system. Signal Process 141:217–227. https://doi.org/10.1016/j.sigpro.2017.06.010

    Article  Google Scholar 

  22. Wang X, Zhao Y, Zhang H, Guo K (2016) A novel color image encryption scheme using alternate chaotic mapping structure. Opt Lasers Eng 82:79–86. https://doi.org/10.1016/j.optlaseng.2015.12.006

    Article  Google Scholar 

  23. Yang CH, Wu HC, Su FS (2019) Implementation of encryption algorithm and wireless image transmission system on FPGA. IEEE Access 7:50513–50523. https://doi.org/10.1109/ACCESS.2019.2910859

    Article  Google Scholar 

  24. Zhao Z, Zhang X (2013) ECC-based image encryption using code computing. International conference on communication, electronics and automation engineering. Advances in intelligent systems and computing, vol 181. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31698-2_121.

Download references

Acknowledgments

This work is backed through EuE Laboratory.

Author information

Authors and Affiliations

Authors

Contributions

All the authors have helped to conceive these simulation experiments. Amal Hafsa and Anissa Sghaier have designed and performed such experiments and have written the main part of the manuscript with the help of Mohamed Gafsi. Amal Hafsa, Anissa Sghaier, Jihene Malek and Mohsen Machhout have contributed to the interpretation of the results, as well as the revision and writing of the paper.

Corresponding author

Correspondence to Amal Hafsa.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hafsa, A., Sghaier, A., Malek, J. et al. Image encryption method based on improved ECC and modified AES algorithm. Multimed Tools Appl 80, 19769–19801 (2021). https://doi.org/10.1007/s11042-021-10700-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-10700-x

Keywords

Navigation