Implementation of Cryptographic Approach for Image Transmission with Security

  • Authors

    • M. SandhyaRani
    • T. Sivaprasad
    2018-09-27
    https://doi.org/10.14419/ijet.v7i4.7.20568
  • ECC- Elliptic Curve Cryptography, Discrete Logarithm, Authenticity, Integrity.
  • In this paper an approach for secured transmission of images and its implementation is being proposed.  The proposed method proves to be better compared to various presently existing cryptographic algorithms. The basic application of this algorithm is to provide secured transmission of digital images for various multimedia usages. These encrypted messages can further be used for compact storage of information of patient details which are very much confidently for patient centric approach. The results of the implementation show that the computation time is faster comparatively and it is highly secured and also efficient method for image transmission. The input for demonstration is taken as Lena image on which the Elliptic Curve Cryptography method is applied. The major advantage of this approach is reduced key size.

     

     

  • References

    1. [1] Novel Architecture for Efficient FPGA Implementation of Elliptic Curve Cryptographic Processor Over GF(2^163)†byHosseinMahdizaeh and Massoud Ma soumi. IEEE Transactions on Very Large Scale Integration Systems,vol.21,no.12,December 2013.

      [2] W.Stallings, Cryptography and Network Security, 4th Ed..,Prentice-Hall,2006.

      [3] K.Jarvenin,M.Tommiska, and J.Skytta,â€A scalable architecture for elliptic curve point multiplicationâ€ICFPT,Brisbane,Australia,2004.

      [4] T.Wollinger, J.Guuajardo, and C.Paar,â€Security on FPGAs:State-of-the –art and LmplementationsAttacks,â€ACM Trans. On Embedded Computing Sys.,3(3):534-574,2004.

      [5] R.C.C.Cheung,N.JTelle,W.Luk, and P.Y.K.Cheung,â€Customizable elliptic curve Cryptosystems†IEEE Trans.Very Large Scale Integr.(VLSI) Syst.â€., vol.13,no.9,pp.1048 1059,Sep.2005.

      [6] W.N.Chelton and M.Benaissa,â€Fast elliptic curve cryptography on FPGA,â€IEEE Trans.on Very Large Scale Integration (VLSI)Systems.†Vol.16,no.2,Feb.2008,pp.198-205.

      [7] B.Ansari and a.Hasan,â€High-Performance Architecture of Elliptic Curve Scalar multiplicationâ€,IEEETrans.on Comp.,Vol.57, No. 11, pp.1443-1453.,Nov.2008

      [8] C.H.Kim,S.Kwon, C.P.Hong,â€FPGA implementation of high performance elliptic curvecryptographic processor over GF(2^163),â€J.ofSys.Architecture, 54 (10)(2008) 893-900.

      [9] J.Fan, K. Sakiyama, and I .Verbanuwhede,†Montgomery modular multiplication algorithm on multi-core systems,†in Proc.IEEE Workshop SignalProcess.Syst.,Shanghai,China,Oct.2007,pp. 261-266.

  • Downloads

  • How to Cite

    SandhyaRani, M., & Sivaprasad, T. (2018). Implementation of Cryptographic Approach for Image Transmission with Security. International Journal of Engineering & Technology, 7(4.7), 311-314. https://doi.org/10.14419/ijet.v7i4.7.20568