Securing Color Image Using Combined Elliptic Curve Crypto-System and Hill Cipher Encryption Along with Least Significant Bit - Steganography

  • N. FaizalEmail author
  • S. Sharan
  • Panchami S. Nair
  • Devi S. Sankar
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 98)


Security of information is becoming main criteria while transferring information through communication networks. Nowadays images are used as information source; therefore its security from unauthorized or unintended access is important. Image encryption play an important role in protecting images from hacking and stealing while sending over an unsecured channel. The proposed method is a combination of encryption using Hill cipher algorithm along with Elliptic curve for enhanced security. Elliptic curve cryptographic method is used to make the system to asymmetric from the less secured symmetric key encryption technique; hill cipher algorithm. In our proposed method we use both grayscale images as well as color images regardless its size. Steganography of actual image with a cover image before encryption is an advantage. The cover image is selected as it mocks like an informative to unauthorized access. Least Significant Bit (LSB) steganography method is used here as it provides more security than any other methods.


Image encryption Visual cryptography Hill cipher Steganography Elliptic curve cryptography 


  1. 1.
    Acharya, B., Rath, G.S., Patra, S.K., Panigrahy, S.K.: Novel methods of generating self-invertible matrix for hill cipher algorithm. Int. J. Secur. 1, 14–21 (2007)Google Scholar
  2. 2.
    Acharya, B., Panigrahy, S.K., Patra, S.K., Panda, G.: Image encryption using advanced hill cipher algorithm. Int. J. Recent Trends Eng. 1, 663–667 (2009)Google Scholar
  3. 3.
    Foster, I., Kesselman, C.: The Grid: Blueprint for a New Computing Infrastructure. Mor-gan Kaufmann, San Francisco (1999)Google Scholar
  4. 4.
    Agrawal, K., Gera, A.: Elliptic curve cryptography with hill cipher generation for secure text cryptosystem. Int. J. Comput. Appl. (2014)Google Scholar
  5. 5.
    Alese, B.K., Philemon, E.D., Falaki, S.O.: Comparative analysis of public-key encryption schemes. Int. J. Comput. Appl. 2(9), 1552–1568 (2012)Google Scholar
  6. 6.
    Bokhari, M.U., Shallal, Q.M.: A review on symmetric key encryption techniques in cryptography. Int. J. Comput. Appl. (2016)Google Scholar
  7. 7.
    Darrel, H., Alfred, M., Scott, V.: Guide to Elliptic Curve Cryptography, p. 11. Springer Professional Computing Series. Springer, Heidelberg (2004)Google Scholar
  8. 8.
    Dawahdeh, Z.E., Yaakob, S.N., Othman, R.R.B.: A new modification for Menezes - Vanstone elliptic curve cryptosystem. J. Theor. Appl. Inf. Technol. 85(3), 290 (2016)Google Scholar
  9. 9.
    Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)MathSciNetCrossRefGoogle Scholar
  10. 10.
    Sateesh, G., Lakshmi, E.S., Ramanamma, M., Jairam, K., Yeswanth, A.: Assured data communication using cryptography and steganographyGoogle Scholar
  11. 11.
    Chikouchen, S.L., Chikouche, N.: An improved approach for LSB-based image-steganography using AES algorithm. Computer Science Department, University of M’sila, AlgeriaGoogle Scholar
  12. 12.
    Anurag, Meena, S.: Color image steganography using random key matrix. National Institute of Technology (2018)Google Scholar
  13. 13.
    Mitasha, R.J., Christainbach: Information hiding in images using steganography techniques. University of Zakho, IraqGoogle Scholar
  14. 14.
    Cimato, S., Yang, C.-N.: Visual cryptography and secret image sharing. CRC Press. ISBN 978-1-4398-3721-4Google Scholar
  15. 15.
    Yang, C.N., Chen, T.S., Yu, K.H., Wang, C.C.: Improvements of image sharing with steganography and authentication. J. Syst. Softw. 80, 1600–16010 (2007)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • N. Faizal
    • 1
    Email author
  • S. Sharan
    • 1
  • Panchami S. Nair
    • 1
  • Devi S. Sankar
    • 1
  1. 1.Department of Computer ScienceUniversity of KeralaTrivandrumIndia

Personalised recommendations