Skip to main content

Color Image Encryption: A New Public Key Cryptosystem Based on Polynomial Equation

  • Conference paper
  • First Online:
Proceedings of the International Conference on ISMAC in Computational Vision and Bio-Engineering 2018 (ISMAC-CVB) (ISMAC 2018)

Abstract

Image security is the need of today’s era. The security task is being convoluted as there are a variety of data to secure as different levels of data security is needed based on the data type. Encryption is the maximum expedient approach to guarantee the safety of images over public networks. We have proposed a new public key cryptosystem based on polynomial equation. This approach has been desired because of their resistance to the cryptanalysis attacks. Parameters such as correlation coefficient, entropy, histogram analysis are used for the efficiency of our proposed method. The theoretic and simulation result provides a high quantity of protection. Thus, it is suitable for practical use in secure communication.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 59.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gonzalez W (2008) Digital image processing, 2nd edn. Prentice Hall, Englewood Cliffs

    Google Scholar 

  2. Stallings W (2014) Cryptography and network security, principle and practice, 6th edn

    Google Scholar 

  3. Tambe Chaitali A, Gadilkar Rupali S, Pawar Vimal T (2017) A survey on new image encryption algorithm based on Diffie-Hellman and singular value decomposition. Int J Innov Res Comput Commun Eng

    Google Scholar 

  4. Seyedzade SM, Atani RE, Mirzakuchaki S (2010) A novel image encryption algorithm based on hash function. In: 6th Iranian conference on machine vision and image processing, 27–28 Oct 2010, pp 1–6

    Google Scholar 

  5. Hashim HR, Neamaa IA (2014) Image encryption and decryption in a modification of ElGamal cryptosystem in MATLAB. Int J Sci: Basic Appl Res 14(2):141–147

    Google Scholar 

  6. Khachatrian G, Kyureghyan M (2014) A new public key encryption system based on permutation polynomials. In: IEEE international conference on cloud engineering

    Google Scholar 

  7. Sokouti M, Zakerolhosseini A, Sokouti B (2016) Medical Image encryption: an application for improved padding based GGH encryption algorithm. Open Med Inf J

    Google Scholar 

  8. Dwivedi N, Gupta RK, Agarwal S (2017) Image encryption using curved scrambling and diffusion. Int J Eng Technol

    Google Scholar 

  9. Wagh NB, Kolhekar M (2017) A novel approach utilizing permutation polynomials over integer rings as a cryptological application for effective encryption of digital images., IJCSE 5(1). E-ISSN 2347–2693

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. K. Kavitha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kavitha, P.K., Vidhya Saraswathi, P. (2019). Color Image Encryption: A New Public Key Cryptosystem Based on Polynomial Equation. In: Pandian, D., Fernando, X., Baig, Z., Shi, F. (eds) Proceedings of the International Conference on ISMAC in Computational Vision and Bio-Engineering 2018 (ISMAC-CVB). ISMAC 2018. Lecture Notes in Computational Vision and Biomechanics, vol 30. Springer, Cham. https://doi.org/10.1007/978-3-030-00665-5_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00665-5_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00664-8

  • Online ISBN: 978-3-030-00665-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics