Abstract
Security of information is becoming main criteria while transferring information through communication networks. Nowadays images are used as information source; therefore its security from unauthorized or unintended access is important. Image encryption play an important role in protecting images from hacking and stealing while sending over an unsecured channel. The proposed method is a combination of encryption using Hill cipher algorithm along with Elliptic curve for enhanced security. Elliptic curve cryptographic method is used to make the system to asymmetric from the less secured symmetric key encryption technique; hill cipher algorithm. In our proposed method we use both grayscale images as well as color images regardless its size. Steganography of actual image with a cover image before encryption is an advantage. The cover image is selected as it mocks like an informative to unauthorized access. Least Significant Bit (LSB) steganography method is used here as it provides more security than any other methods.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Acharya, B., Rath, G.S., Patra, S.K., Panigrahy, S.K.: Novel methods of generating self-invertible matrix for hill cipher algorithm. Int. J. Secur. 1, 14–21 (2007)
Acharya, B., Panigrahy, S.K., Patra, S.K., Panda, G.: Image encryption using advanced hill cipher algorithm. Int. J. Recent Trends Eng. 1, 663–667 (2009)
Foster, I., Kesselman, C.: The Grid: Blueprint for a New Computing Infrastructure. Mor-gan Kaufmann, San Francisco (1999)
Agrawal, K., Gera, A.: Elliptic curve cryptography with hill cipher generation for secure text cryptosystem. Int. J. Comput. Appl. (2014)
Alese, B.K., Philemon, E.D., Falaki, S.O.: Comparative analysis of public-key encryption schemes. Int. J. Comput. Appl. 2(9), 1552–1568 (2012)
Bokhari, M.U., Shallal, Q.M.: A review on symmetric key encryption techniques in cryptography. Int. J. Comput. Appl. (2016)
Darrel, H., Alfred, M., Scott, V.: Guide to Elliptic Curve Cryptography, p. 11. Springer Professional Computing Series. Springer, Heidelberg (2004)
Dawahdeh, Z.E., Yaakob, S.N., Othman, R.R.B.: A new modification for Menezes - Vanstone elliptic curve cryptosystem. J. Theor. Appl. Inf. Technol. 85(3), 290 (2016)
Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)
Sateesh, G., Lakshmi, E.S., Ramanamma, M., Jairam, K., Yeswanth, A.: Assured data communication using cryptography and steganography
Chikouchen, S.L., Chikouche, N.: An improved approach for LSB-based image-steganography using AES algorithm. Computer Science Department, University of M’sila, Algeria
Anurag, Meena, S.: Color image steganography using random key matrix. National Institute of Technology (2018)
Mitasha, R.J., Christainbach: Information hiding in images using steganography techniques. University of Zakho, Iraq
Cimato, S., Yang, C.-N.: Visual cryptography and secret image sharing. CRC Press. ISBN 978-1-4398-3721-4
Yang, C.N., Chen, T.S., Yu, K.H., Wang, C.C.: Improvements of image sharing with steganography and authentication. J. Syst. Softw. 80, 1600–16010 (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Faizal, N., Sharan, S., Nair, P.S., Sankar, D.S. (2020). Securing Color Image Using Combined Elliptic Curve Crypto-System and Hill Cipher Encryption Along with Least Significant Bit - Steganography. In: Smys, S., Bestak, R., Rocha, Á. (eds) Inventive Computation Technologies. ICICIT 2019. Lecture Notes in Networks and Systems, vol 98. Springer, Cham. https://doi.org/10.1007/978-3-030-33846-6_40
Download citation
DOI: https://doi.org/10.1007/978-3-030-33846-6_40
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-33845-9
Online ISBN: 978-3-030-33846-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)