Skip to main content

Securing Color Image Using Combined Elliptic Curve Crypto-System and Hill Cipher Encryption Along with Least Significant Bit - Steganography

  • Conference paper
  • First Online:
Inventive Computation Technologies (ICICIT 2019)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 98))

Included in the following conference series:

Abstract

Security of information is becoming main criteria while transferring information through communication networks. Nowadays images are used as information source; therefore its security from unauthorized or unintended access is important. Image encryption play an important role in protecting images from hacking and stealing while sending over an unsecured channel. The proposed method is a combination of encryption using Hill cipher algorithm along with Elliptic curve for enhanced security. Elliptic curve cryptographic method is used to make the system to asymmetric from the less secured symmetric key encryption technique; hill cipher algorithm. In our proposed method we use both grayscale images as well as color images regardless its size. Steganography of actual image with a cover image before encryption is an advantage. The cover image is selected as it mocks like an informative to unauthorized access. Least Significant Bit (LSB) steganography method is used here as it provides more security than any other methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Acharya, B., Rath, G.S., Patra, S.K., Panigrahy, S.K.: Novel methods of generating self-invertible matrix for hill cipher algorithm. Int. J. Secur. 1, 14–21 (2007)

    Google Scholar 

  2. Acharya, B., Panigrahy, S.K., Patra, S.K., Panda, G.: Image encryption using advanced hill cipher algorithm. Int. J. Recent Trends Eng. 1, 663–667 (2009)

    Google Scholar 

  3. Foster, I., Kesselman, C.: The Grid: Blueprint for a New Computing Infrastructure. Mor-gan Kaufmann, San Francisco (1999)

    Google Scholar 

  4. Agrawal, K., Gera, A.: Elliptic curve cryptography with hill cipher generation for secure text cryptosystem. Int. J. Comput. Appl. (2014)

    Google Scholar 

  5. Alese, B.K., Philemon, E.D., Falaki, S.O.: Comparative analysis of public-key encryption schemes. Int. J. Comput. Appl. 2(9), 1552–1568 (2012)

    Google Scholar 

  6. Bokhari, M.U., Shallal, Q.M.: A review on symmetric key encryption techniques in cryptography. Int. J. Comput. Appl. (2016)

    Google Scholar 

  7. Darrel, H., Alfred, M., Scott, V.: Guide to Elliptic Curve Cryptography, p. 11. Springer Professional Computing Series. Springer, Heidelberg (2004)

    Google Scholar 

  8. Dawahdeh, Z.E., Yaakob, S.N., Othman, R.R.B.: A new modification for Menezes - Vanstone elliptic curve cryptosystem. J. Theor. Appl. Inf. Technol. 85(3), 290 (2016)

    Google Scholar 

  9. Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)

    Article  MathSciNet  Google Scholar 

  10. Sateesh, G., Lakshmi, E.S., Ramanamma, M., Jairam, K., Yeswanth, A.: Assured data communication using cryptography and steganography

    Google Scholar 

  11. Chikouchen, S.L., Chikouche, N.: An improved approach for LSB-based image-steganography using AES algorithm. Computer Science Department, University of M’sila, Algeria

    Google Scholar 

  12. Anurag, Meena, S.: Color image steganography using random key matrix. National Institute of Technology (2018)

    Google Scholar 

  13. Mitasha, R.J., Christainbach: Information hiding in images using steganography techniques. University of Zakho, Iraq

    Google Scholar 

  14. Cimato, S., Yang, C.-N.: Visual cryptography and secret image sharing. CRC Press. ISBN 978-1-4398-3721-4

    Google Scholar 

  15. Yang, C.N., Chen, T.S., Yu, K.H., Wang, C.C.: Improvements of image sharing with steganography and authentication. J. Syst. Softw. 80, 1600–16010 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to N. Faizal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Faizal, N., Sharan, S., Nair, P.S., Sankar, D.S. (2020). Securing Color Image Using Combined Elliptic Curve Crypto-System and Hill Cipher Encryption Along with Least Significant Bit - Steganography. In: Smys, S., Bestak, R., Rocha, Á. (eds) Inventive Computation Technologies. ICICIT 2019. Lecture Notes in Networks and Systems, vol 98. Springer, Cham. https://doi.org/10.1007/978-3-030-33846-6_40

Download citation

Publish with us

Policies and ethics