{"title":"椭圆曲线密码(ECC)中基于相位检索的图像加密算法的设计与实现","authors":"Reena Hooda, Himanhu, Vikas Poply","doi":"10.1109/IC3I56241.2022.10072750","DOIUrl":null,"url":null,"abstract":"The excessive demand for digitized images across all fields has made it necessary to safeguard the images from attackers for secure network transfer. Due to their sensitivity, sensitive photographs used in medical and criminal investigations are assumed to be of the highest quality. Modern encryption techniques simply expand the one developed for grayscale photos rather than being specifically created for colour images. To handle colour images utilized in medical and forensic applications, a multi-layered hybrid approach has been devised and given the term Hybrid multi-layered “Hyper-chaotic Hyper-elliptic curve-based image encryption (HHH)” technique. DNA encryption based on hyper chaos is used in the first layer to produce chaotic sequences. Images often hold very private and sensitive information. Since images are crucial in many situations, such as “military communication, object tracking, and medical image processing, protecting sensitive and secret information” from unauthorized use and modification is essential. Encryption is one of the greatest methods for concealing information for reaching this objective. In recent years, researchers have created a variety of techniques for image encryption. To boost security, they employ several picture encryptions concepts. To strengthen the integrity of the crypto system, substitution permutation raises the level of confusion dissemination. Secondary analysis has been done for this research to gather relevant information related to this topic.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"To Design & Implement the Image Encryption Algorithm, using Phase Retrieval in Elliptic Curve Cryptography (ECC)\",\"authors\":\"Reena Hooda, Himanhu, Vikas Poply\",\"doi\":\"10.1109/IC3I56241.2022.10072750\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The excessive demand for digitized images across all fields has made it necessary to safeguard the images from attackers for secure network transfer. Due to their sensitivity, sensitive photographs used in medical and criminal investigations are assumed to be of the highest quality. Modern encryption techniques simply expand the one developed for grayscale photos rather than being specifically created for colour images. To handle colour images utilized in medical and forensic applications, a multi-layered hybrid approach has been devised and given the term Hybrid multi-layered “Hyper-chaotic Hyper-elliptic curve-based image encryption (HHH)” technique. DNA encryption based on hyper chaos is used in the first layer to produce chaotic sequences. Images often hold very private and sensitive information. Since images are crucial in many situations, such as “military communication, object tracking, and medical image processing, protecting sensitive and secret information” from unauthorized use and modification is essential. Encryption is one of the greatest methods for concealing information for reaching this objective. In recent years, researchers have created a variety of techniques for image encryption. To boost security, they employ several picture encryptions concepts. To strengthen the integrity of the crypto system, substitution permutation raises the level of confusion dissemination. Secondary analysis has been done for this research to gather relevant information related to this topic.\",\"PeriodicalId\":274660,\"journal\":{\"name\":\"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)\",\"volume\":\"16 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IC3I56241.2022.10072750\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC3I56241.2022.10072750","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
To Design & Implement the Image Encryption Algorithm, using Phase Retrieval in Elliptic Curve Cryptography (ECC)
The excessive demand for digitized images across all fields has made it necessary to safeguard the images from attackers for secure network transfer. Due to their sensitivity, sensitive photographs used in medical and criminal investigations are assumed to be of the highest quality. Modern encryption techniques simply expand the one developed for grayscale photos rather than being specifically created for colour images. To handle colour images utilized in medical and forensic applications, a multi-layered hybrid approach has been devised and given the term Hybrid multi-layered “Hyper-chaotic Hyper-elliptic curve-based image encryption (HHH)” technique. DNA encryption based on hyper chaos is used in the first layer to produce chaotic sequences. Images often hold very private and sensitive information. Since images are crucial in many situations, such as “military communication, object tracking, and medical image processing, protecting sensitive and secret information” from unauthorized use and modification is essential. Encryption is one of the greatest methods for concealing information for reaching this objective. In recent years, researchers have created a variety of techniques for image encryption. To boost security, they employ several picture encryptions concepts. To strengthen the integrity of the crypto system, substitution permutation raises the level of confusion dissemination. Secondary analysis has been done for this research to gather relevant information related to this topic.