Advertisement

Color Image Encryption: A New Public Key Cryptosystem Based on Polynomial Equation

  • P. K. KavithaEmail author
  • P. Vidhya Saraswathi
Conference paper
Part of the Lecture Notes in Computational Vision and Biomechanics book series (LNCVB, volume 30)

Abstract

Image security is the need of today’s era. The security task is being convoluted as there are a variety of data to secure as different levels of data security is needed based on the data type. Encryption is the maximum expedient approach to guarantee the safety of images over public networks. We have proposed a new public key cryptosystem based on polynomial equation. This approach has been desired because of their resistance to the cryptanalysis attacks. Parameters such as correlation coefficient, entropy, histogram analysis are used for the efficiency of our proposed method. The theoretic and simulation result provides a high quantity of protection. Thus, it is suitable for practical use in secure communication.

Keywords

Polynomial Encryption Decryption 

References

  1. 1.
    Gonzalez W (2008) Digital image processing, 2nd edn. Prentice Hall, Englewood CliffsGoogle Scholar
  2. 2.
    Stallings W (2014) Cryptography and network security, principle and practice, 6th ednGoogle Scholar
  3. 3.
    Tambe Chaitali A, Gadilkar Rupali S, Pawar Vimal T (2017) A survey on new image encryption algorithm based on Diffie-Hellman and singular value decomposition. Int J Innov Res Comput Commun EngGoogle Scholar
  4. 4.
    Seyedzade SM, Atani RE, Mirzakuchaki S (2010) A novel image encryption algorithm based on hash function. In: 6th Iranian conference on machine vision and image processing, 27–28 Oct 2010, pp 1–6Google Scholar
  5. 5.
    Hashim HR, Neamaa IA (2014) Image encryption and decryption in a modification of ElGamal cryptosystem in MATLAB. Int J Sci: Basic Appl Res 14(2):141–147Google Scholar
  6. 6.
    Khachatrian G, Kyureghyan M (2014) A new public key encryption system based on permutation polynomials. In: IEEE international conference on cloud engineeringGoogle Scholar
  7. 7.
    Sokouti M, Zakerolhosseini A, Sokouti B (2016) Medical Image encryption: an application for improved padding based GGH encryption algorithm. Open Med Inf JGoogle Scholar
  8. 8.
    Dwivedi N, Gupta RK, Agarwal S (2017) Image encryption using curved scrambling and diffusion. Int J Eng TechnolGoogle Scholar
  9. 9.
    Wagh NB, Kolhekar M (2017) A novel approach utilizing permutation polynomials over integer rings as a cryptological application for effective encryption of digital images., IJCSE 5(1). E-ISSN 2347–2693Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Department of Computer ApplicationsKalasalingam Academy of Research and EducationKrishnankoilIndia

Personalised recommendations