Saeid Bakhtiari, S. Ibrahim, M. Salleh, M. Bakhtiari
{"title":"JPEG mage encryption with Elliptic Curve Cryptography","authors":"Saeid Bakhtiari, S. Ibrahim, M. Salleh, M. Bakhtiari","doi":"10.1109/ISBAST.2014.7013111","DOIUrl":null,"url":null,"abstract":"Nowadays, the topic of multipurpose use of images is thriving in the fields of security establishment, authentication, watermarking, and etc. Simultaneously, the rise of multidisciplinary fields has drowned more attentions to this topic. Amongst the cryptographic algorithms, Elliptic Curve Cryptography with suitable characteristics such as low bandwidth usage, low computational time and small key size s satisfactory for image encryption. In this paper, image encryption by using ECC during and before image compression is proposed elaborately, as well as the results and analysis of applying ECC for image encryption/decryption, encryption performance and compression performance.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISBAST.2014.7013111","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
Nowadays, the topic of multipurpose use of images is thriving in the fields of security establishment, authentication, watermarking, and etc. Simultaneously, the rise of multidisciplinary fields has drowned more attentions to this topic. Amongst the cryptographic algorithms, Elliptic Curve Cryptography with suitable characteristics such as low bandwidth usage, low computational time and small key size s satisfactory for image encryption. In this paper, image encryption by using ECC during and before image compression is proposed elaborately, as well as the results and analysis of applying ECC for image encryption/decryption, encryption performance and compression performance.