Digital Image Encryption with Validation by ECC and Embedding at Low-Frequency Region Using Genetic Approach

Authors

  • Kartikey Pandey National Institute of Technology Raipur, India
  • Deepmala Sharma National Institute of Technology Raipur, India

Abstract

In the current internet era, the security of digital images has become increasingly important due to their numerous applications and uses. Although many researchers have proposed end-to-end security and authenticity against various attacks, achieving security, validation, and robustness together has been a challenge. This paper proposes a model called Low-Frequency Embedding and Elliptical Curve Cryptography (LFE-ECC), which provides all the necessary requirements for image security.
The proposed model achieves image validation for the authentic sender by embedding a secret signature in the low-frequency region of the image. The robustness of the image is achieved by embedding a secret signature at a selected coefficient of the DWT feature. The moth flame optimization genetic algorithm is used for coefficient selection, and the additional security of embedded images is achieved using the elliptical curve cryptography technique. ECC provides encryption and validation for both parties.
An experiment is conducted on real and artificial datasets under ideal and attack environments, and the results demonstrate the improved performance of the proposed LFE-ECC model against a range of attacks.

Author Biographies

Kartikey Pandey, National Institute of Technology Raipur, India

Research Scholar, Department of Mathematics NIT Raipur, India

Deepmala Sharma, National Institute of Technology Raipur, India

Associate Professor, Department of Mathematics, NIT Raipur, India

References

K. Ding, S. Chen, and F. Meng, “A novel perceptual hash algorithm

for multispectral image authentication,” Algorithms, vol. 11, no. 1, p. 6,

J. Jain, A. Jain et al., “Securing e-healthcare images using an efficient

image encryption model,” Scientific Programming, vol. 2022, 2022.

C. Kumar, A. K. Singh, and P. Kumar, “A recent survey on image wa-

termarking techniques and its application in e-governance,” Multimedia

Tools and Applications, vol. 77, pp. 3597–3622, 2018.

Z. Zhao and X. Zhang, “Ecc-based image encryption using code

computing,” in Proceedings of the 2012 International Conference on

Communication, Electronics and Automation Engineering. Springer,

, pp. 859–865.

M. Ganavi and S. Prabhudeva, “A novel approach to enhance image se-

curity using hyperchaos with elliptic curve cryptography,” International

Journal of Rough Sets and Data Analysis (IJRSDA), vol. 7, no. 1, pp.

–17, 2021.

A. Hafsa, A. Sghaier, J. Malek, and M. Machhout, “Image encryption

method based on improved ecc and modified aes algorithm,” Multimedia

Tools and Applications, vol. 80, pp. 19 769–19 801, 2021.

P. Parida, C. Pradhan, X.-Z. Gao, D. S. Roy, and R. K. Barik, “Image

encryption and authentication with elliptic curve cryptography and

multidimensional chaotic maps,” IEEE Access, vol. 9, pp. 76 191–76 204,

M. Benssalah, Y. Rhaskali, and K. Drouiche, “An efficient image

encryption scheme for tmis based on elliptic curve integrated encryption

and linear cryptography,” Multimedia Tools and Applications, vol. 80,

no. 2, pp. 2081–2107, 2021.

Z. E. Dawahdeh, S. N. Yaakob, and R. R. bin Othman, “A new image

encryption technique combining elliptic curve cryptosystem with hill

cipher,” Journal of King Saud University-Computer and Information

Sciences, vol. 30, no. 3, pp. 349–355, 2018.

K. I. Masud, M. R. Hasan, M. M. Hoque, U. D. Nath, and M. O.

Rahman, “A new approach of cryptography for data encryption and

decryption,” in 2022 5th International Conference on computing and

Informatics (ICCI). IEEE, 2022, pp. 234–239.

C.-H. Lin, J.-X. Wu, P.-Y. Chen, H.-Y. Lai, C.-M. Li, C.-L. Kuo, and

N.-S. Pai, “Intelligent symmetric cryptography with chaotic map and

quantum based key generator for medical images infosecurity,” IEEE

Access, vol. 9, pp. 118 624–118 639, 2021.

R. Xie and P. Huang, “An improved anti-counterfeiting printed qr

watermarking algorithm based on self-adaptive genetic algorithm,” in

IOP Conference Series: Materials Science and Engineering, vol. 768,

no. 5. IOP Publishing, 2020, p. 052002.

A. A. Abd El-Latif and X. Niu, “A hybrid chaotic system and cyclic

elliptic curve for image encryption,” AEU-International Journal of

Electronics and Communications, vol. 67, no. 2, pp. 136–143, 2013.

S. Nagaraj, G. Raju, and K. K. Rao, “Image encryption using elliptic

curve cryptograhy and matrix,” Procedia Computer Science, vol. 48, pp.

–281, 2015.

L. D. Singh and K. M. Singh, “Image encryption using elliptic curve

cryptography,” Procedia Computer Science, vol. 54, pp. 472–481, 2015.

D. S. Laiphrakpam and M. S. Khumanthem, “Medical image encryption

based on improved elgamal encryption technique,” Optik, vol. 147, pp.

–102, 2017.

N. A. Azam, I. Ullah, and U. Hayat, “A fast and secure public-key image

encryption scheme based on mordell elliptic curves,” Optics and Lasers

in Engineering, vol. 137, p. 106371, 2021.

S. M. C. Vigila and K. Muneeswaran, “Nonce based elliptic curve

cryptosystem for text and image applications.” Int. J. Netw. Secur.,

vol. 14, no. 4, pp. 236–242, 2012.

S. Behnia, A. Akhavan, A. Akhshani, and A. Samsudin, “Image en-

cryption based on the jacobian elliptic maps,” Journal of Systems and

Software, vol. 86, no. 9, pp. 2429–2438, 2013.

T. Tabassum and S. M. Islam, “A digital video watermarking technique

based on identical frame extraction in 3-level dwt,” in 2012 15th

International Conference on Computer and Information Technology

(ICCIT). IEEE, 2012, pp. 101–106.

P. Dabas and K. Khanna, “A study on spatial and transform domain wa-

termarking techniques,” International journal of computer applications,

vol. 71, no. 14, 2013.

Z. E. Dawahdeh, S. N. Yaakob, and R. R. bin Othman, “A new image

encryption technique combining elliptic curve cryptosystem with hill

cipher,” Journal of King Saud University-Computer and Information

Sciences, vol. 30, no. 3, pp. 349–355, 2018.

X. Zhou, C. Cao, J. Ma, and L. Wang, “Adaptive digital watermark-

ing scheme based on support vector machines and optimized genetic

algorithm,” Mathematical Problems in Engineering, vol. 2018, 2018.

A. K. Sahu and G. Swain, “An optimal information hiding approach

based on pixel value differencing and modulus function,” Wireless

Personal Communications, vol. 108, pp. 159–174, 2019.

Additional Files

Published

2025-03-26

Issue

Section

Cryptography and Cybersecurity