Digital Image Encryption with Validation by ECC and Embedding at Low-Frequency Region Using Genetic Approach
Abstract
In the current internet era, the security of digital images has become increasingly important due to their numerous applications and uses. Although many researchers have proposed end-to-end security and authenticity against various attacks, achieving security, validation, and robustness together has been a challenge. This paper proposes a model called Low-Frequency Embedding and Elliptical Curve Cryptography (LFE-ECC), which provides all the necessary requirements for image security.
The proposed model achieves image validation for the authentic sender by embedding a secret signature in the low-frequency region of the image. The robustness of the image is achieved by embedding a secret signature at a selected coefficient of the DWT feature. The moth flame optimization genetic algorithm is used for coefficient selection, and the additional security of embedded images is achieved using the elliptical curve cryptography technique. ECC provides encryption and validation for both parties.
An experiment is conducted on real and artificial datasets under ideal and attack environments, and the results demonstrate the improved performance of the proposed LFE-ECC model against a range of attacks.
References
K. Ding, S. Chen, and F. Meng, “A novel perceptual hash algorithm
for multispectral image authentication,” Algorithms, vol. 11, no. 1, p. 6,
J. Jain, A. Jain et al., “Securing e-healthcare images using an efficient
image encryption model,” Scientific Programming, vol. 2022, 2022.
C. Kumar, A. K. Singh, and P. Kumar, “A recent survey on image wa-
termarking techniques and its application in e-governance,” Multimedia
Tools and Applications, vol. 77, pp. 3597–3622, 2018.
Z. Zhao and X. Zhang, “Ecc-based image encryption using code
computing,” in Proceedings of the 2012 International Conference on
Communication, Electronics and Automation Engineering. Springer,
, pp. 859–865.
M. Ganavi and S. Prabhudeva, “A novel approach to enhance image se-
curity using hyperchaos with elliptic curve cryptography,” International
Journal of Rough Sets and Data Analysis (IJRSDA), vol. 7, no. 1, pp.
–17, 2021.
A. Hafsa, A. Sghaier, J. Malek, and M. Machhout, “Image encryption
method based on improved ecc and modified aes algorithm,” Multimedia
Tools and Applications, vol. 80, pp. 19 769–19 801, 2021.
P. Parida, C. Pradhan, X.-Z. Gao, D. S. Roy, and R. K. Barik, “Image
encryption and authentication with elliptic curve cryptography and
multidimensional chaotic maps,” IEEE Access, vol. 9, pp. 76 191–76 204,
M. Benssalah, Y. Rhaskali, and K. Drouiche, “An efficient image
encryption scheme for tmis based on elliptic curve integrated encryption
and linear cryptography,” Multimedia Tools and Applications, vol. 80,
no. 2, pp. 2081–2107, 2021.
Z. E. Dawahdeh, S. N. Yaakob, and R. R. bin Othman, “A new image
encryption technique combining elliptic curve cryptosystem with hill
cipher,” Journal of King Saud University-Computer and Information
Sciences, vol. 30, no. 3, pp. 349–355, 2018.
K. I. Masud, M. R. Hasan, M. M. Hoque, U. D. Nath, and M. O.
Rahman, “A new approach of cryptography for data encryption and
decryption,” in 2022 5th International Conference on computing and
Informatics (ICCI). IEEE, 2022, pp. 234–239.
C.-H. Lin, J.-X. Wu, P.-Y. Chen, H.-Y. Lai, C.-M. Li, C.-L. Kuo, and
N.-S. Pai, “Intelligent symmetric cryptography with chaotic map and
quantum based key generator for medical images infosecurity,” IEEE
Access, vol. 9, pp. 118 624–118 639, 2021.
R. Xie and P. Huang, “An improved anti-counterfeiting printed qr
watermarking algorithm based on self-adaptive genetic algorithm,” in
IOP Conference Series: Materials Science and Engineering, vol. 768,
no. 5. IOP Publishing, 2020, p. 052002.
A. A. Abd El-Latif and X. Niu, “A hybrid chaotic system and cyclic
elliptic curve for image encryption,” AEU-International Journal of
Electronics and Communications, vol. 67, no. 2, pp. 136–143, 2013.
S. Nagaraj, G. Raju, and K. K. Rao, “Image encryption using elliptic
curve cryptograhy and matrix,” Procedia Computer Science, vol. 48, pp.
–281, 2015.
L. D. Singh and K. M. Singh, “Image encryption using elliptic curve
cryptography,” Procedia Computer Science, vol. 54, pp. 472–481, 2015.
D. S. Laiphrakpam and M. S. Khumanthem, “Medical image encryption
based on improved elgamal encryption technique,” Optik, vol. 147, pp.
–102, 2017.
N. A. Azam, I. Ullah, and U. Hayat, “A fast and secure public-key image
encryption scheme based on mordell elliptic curves,” Optics and Lasers
in Engineering, vol. 137, p. 106371, 2021.
S. M. C. Vigila and K. Muneeswaran, “Nonce based elliptic curve
cryptosystem for text and image applications.” Int. J. Netw. Secur.,
vol. 14, no. 4, pp. 236–242, 2012.
S. Behnia, A. Akhavan, A. Akhshani, and A. Samsudin, “Image en-
cryption based on the jacobian elliptic maps,” Journal of Systems and
Software, vol. 86, no. 9, pp. 2429–2438, 2013.
T. Tabassum and S. M. Islam, “A digital video watermarking technique
based on identical frame extraction in 3-level dwt,” in 2012 15th
International Conference on Computer and Information Technology
(ICCIT). IEEE, 2012, pp. 101–106.
P. Dabas and K. Khanna, “A study on spatial and transform domain wa-
termarking techniques,” International journal of computer applications,
vol. 71, no. 14, 2013.
Z. E. Dawahdeh, S. N. Yaakob, and R. R. bin Othman, “A new image
encryption technique combining elliptic curve cryptosystem with hill
cipher,” Journal of King Saud University-Computer and Information
Sciences, vol. 30, no. 3, pp. 349–355, 2018.
X. Zhou, C. Cao, J. Ma, and L. Wang, “Adaptive digital watermark-
ing scheme based on support vector machines and optimized genetic
algorithm,” Mathematical Problems in Engineering, vol. 2018, 2018.
A. K. Sahu and G. Swain, “An optimal information hiding approach
based on pixel value differencing and modulus function,” Wireless
Personal Communications, vol. 108, pp. 159–174, 2019.
Additional Files
Published
Issue
Section
License
Copyright (c) 2024 International Journal of Electronics and Telecommunications

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
1. License
The non-commercial use of the article will be governed by the Creative Commons Attribution license as currently displayed on https://creativecommons.org/licenses/by/4.0/.
2. Author’s Warranties
The author warrants that the article is original, written by stated author/s, has not been published before, contains no unlawful statements, does not infringe the rights of others, is subject to copyright that is vested exclusively in the author and free of any third party rights, and that any necessary written permissions to quote from other sources have been obtained by the author/s. The undersigned also warrants that the manuscript (or its essential substance) has not been published other than as an abstract or doctorate thesis and has not been submitted for consideration elsewhere, for print, electronic or digital publication.
3. User Rights
Under the Creative Commons Attribution license, the author(s) and users are free to share (copy, distribute and transmit the contribution) under the following conditions: 1. they must attribute the contribution in the manner specified by the author or licensor, 2. they may alter, transform, or build upon this work, 3. they may use this contribution for commercial purposes.
4. Rights of Authors
Authors retain the following rights:
- copyright, and other proprietary rights relating to the article, such as patent rights,
- the right to use the substance of the article in own future works, including lectures and books,
- the right to reproduce the article for own purposes, provided the copies are not offered for sale,
- the right to self-archive the article
- the right to supervision over the integrity of the content of the work and its fair use.
5. Co-Authorship
If the article was prepared jointly with other authors, the signatory of this form warrants that he/she has been authorized by all co-authors to sign this agreement on their behalf, and agrees to inform his/her co-authors of the terms of this agreement.
6. Termination
This agreement can be terminated by the author or the Journal Owner upon two months’ notice where the other party has materially breached this agreement and failed to remedy such breach within a month of being given the terminating party’s notice requesting such breach to be remedied. No breach or violation of this agreement will cause this agreement or any license granted in it to terminate automatically or affect the definition of the Journal Owner. The author and the Journal Owner may agree to terminate this agreement at any time. This agreement or any license granted in it cannot be terminated otherwise than in accordance with this section 6. This License shall remain in effect throughout the term of copyright in the Work and may not be revoked without the express written consent of both parties.
7. Royalties
This agreement entitles the author to no royalties or other fees. To such extent as legally permissible, the author waives his or her right to collect royalties relative to the article in respect of any use of the article by the Journal Owner or its sublicensee.
8. Miscellaneous
The Journal Owner will publish the article (or have it published) in the Journal if the article’s editorial process is successfully completed and the Journal Owner or its sublicensee has become obligated to have the article published. Where such obligation depends on the payment of a fee, it shall not be deemed to exist until such time as that fee is paid. The Journal Owner may conform the article to a style of punctuation, spelling, capitalization and usage that it deems appropriate. The Journal Owner will be allowed to sublicense the rights that are licensed to it under this agreement. This agreement will be governed by the laws of Poland.
By signing this License, Author(s) warrant(s) that they have the full power to enter into this agreement. This License shall remain in effect throughout the term of copyright in the Work and may not be revoked without the express written consent of both parties.