An efficient image encryption scheme using Fresnelet transform and elliptic curve based scrambling

  • PDF / 825,026 Bytes
  • 14 Pages / 439.642 x 666.49 pts Page_size
  • 27 Downloads / 209 Views

DOWNLOAD

REPORT


An efficient image encryption scheme using Fresnelet transform and elliptic curve based scrambling Shabieh Farwa1 · Nargis Bibi2 · Nazeer Muhammad3 Received: 24 June 2019 / Revised: 22 June 2020 / Accepted: 9 July 2020 / © Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract This work introduces a novel and more efficient image encryption scheme, that deploys Fresnelet diffraction in the wave-propagation domain in conjunction with image scrambling effect, based on a specific elliptic curve group, that substantially reduces the computational cost for the desired outcome. Significantly elevated security of the encrypted image is guaranteed by highly complex algebraic structure of the elliptic curve over the Galois field F42 , in association with Fresnelet transform-based data-decomposition. At first stage, the proposed scheme, propagates confidential information, with selected wavelength at ceratin specific distance, using the Fresnelet transform. During this process confidential data decomposes into four complex sub-bands. We further separate these sub-bands into real and imaginary sub-band data. Then, at the second stage, elliptic curve group law is deployed to add confusion by scrambling the net sub-band data. The security and quality of the presented technique is examined through highly significant tools and we prove that when compared with other prevailing schemes, the proposed scheme offers coherent outcomes. Keywords Fresnelet transform · Galois field · Fn2 · Elliptic curve · Group law

1 Introduction The expeditious development of multimedia technology has dramatically transfigured the confidential communication but concurrently, the advanced technique must comply with  Nazeer Muhammad

[email protected] Shabieh Farwa [email protected] Nargis Bibi [email protected] 1

Department of Mathematics, COMSATS University Islamabad, Wah Campus, Wah Cantt, Pakistan

2

Department of Computer Science, Fatima Jinnah Women University, Rawalpindi, Pakistan

3

Department of IT & CS, Pak-Austria Fachhochschule Institute of Applied Sciences and Technology, Haripur, Pakistan

Multimedia Tools and Applications

the essential demands of elevated security against untoward surveillance, data integrity and access control etc. In the process of transmitting multimedia data over an insecure channel, many techniques can help to keep confidential information more secure. By this, only authorized person will have access to the original data [6, 17, 18, 22, 41]. The most basic goal of image encryption process is assurance of data consistency and confidentiality [34, 46]. In digital data encryption, meaningful information is encrypted into dummy data which provides protection. Such information security strategies have been evolved since last two decades which are strongly based on cryptography [37] (Fig. 1). It is worth-noticing that improved security and confidentiality can be served in any cryptosystem by involving the prime attributes of confusion and diffusion together into one hybrid system [33]. In