| Literature DB >> 32927714 |
Chiranji Lal Chowdhary1, Pushpam Virenbhai Patel2, Krupal Jaysukhbhai Kathrotia2, Muhammad Attique3, Kumaresan P1, Muhammad Fazal Ijaz4.
Abstract
The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encryption and decryption. This paper propose an analysis for performing image encryption and decryption by hybridization of Elliptic Curve Cryptography (ECC) with Hill Cipher (HC), ECC with Advanced Encryption Standard (AES) and ElGamal with Double Playfair Cipher (DPC). This analysis is based on the following parameters: (i) Encryption and decryption time, (ii) entropy of encrypted image, (iii) loss in intensity of the decrypted image, (iv) Peak Signal to Noise Ratio (PSNR), (v) Number of Pixels Change Rate (NPCR), and (vi) Unified Average Changing Intensity (UACI). The hybrid process involves the speed and ease of implementation from symmetric algorithms, as well as improved security from asymmetric algorithms. ECC and ElGamal cryptosystems provide asymmetric key cryptography, while HC, AES, and DPC are symmetric key algorithms. ECC with AES are perfect for remote or private communications with smaller image sizes based on the amount of time needed for encryption and decryption. The metric measurement with test cases finds that ECC and HC have a good overall solution for image encryption.Entities:
Keywords: Number of Pixels Change Rate (NPCR); Unified Average Changing Intensity (UACI); advanced encryption standard; cryptography algorithm; double playfair cipher; elliptic curve cryptography; encryption and decryption; hill cipher; lossy compression; peak signal to noise ratio
Year: 2020 PMID: 32927714 PMCID: PMC7570629 DOI: 10.3390/s20185162
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Elliptic Curve Cryptography (ECC) with hill cipher.
Figure 2Flow chart for image encryption and decryption.
Figure 3Parameter analysis of encryption and decryption.
Sample input and output for proposed hybrid algorithms.
| Image Name | Original Image | Encrypted Image | Encrypted Image | Encrypted Image | Encrypted Image |
|---|---|---|---|---|---|
| Mona Lisa |
|
|
|
|
|
| Mona Lisa |
|
|
|
|
|
| Egg |
|
|
|
|
|
| Egg |
|
|
|
|
|
Metric measures for Eggs (grayscale).
| Evaluation Metrics | ECC with | ECC with AES | ElGamal with Double |
|---|---|---|---|
| Encryption Time (seconds) | 0.33418 | 2.82401 | 0.18775 |
| Decryption Time (seconds) | 0.36932 | 2.75127 | 0.17856 |
| Entropy | 7.9434 | 7.99653 | 7.78708 |
| Mean Squared Error (MSE) in decrypted image | 0.0000 | 0.0000 | 0.0000 |
| PSNR (dB) | 9.45457 | 9.129 | 9.36168 |
| NPCR (%) | 86.91254 | 99.60632 | 94.81812 |
| UACI (%) | 26.06152 | 28.90828 | 27.91177 |
Metric measures for Mona Lisa (coloured).
| Evaluation | ECC with | ECC with | ElGamal with Double |
|---|---|---|---|
| Encryption Time (seconds) | 0.32915 | 2.52632 | 0.13013 |
| Decryption Time (seconds) | 00.35193 | 2.50829 | 0.1486 |
| Entropy | (7.99701, 7.9971, 7.98925) | (7.99667, 7.99659, 7.99672) | (7.95568, 7.96154, 7.8657) |
| Mean Squared Error (MSE) | (0, 0, 0) | (0, 0, 0) | (0, 0, 0) |
| PSNR (dB) | (8.80367, 8.45589, 7.91148) | (8.86691, 8.54116, 7.9478) | (9.19181, 8.8655,8.27107) |
| NPCR (%) | (99.48273, 99.38507, 99.47968) | (99.63379, 99.64142, 99.6109) | (93.57605, 93.23425, 93.7561) |
| UACI (%) | (29.85083, 31.02715, 32.87405) | (29.60341, 30.65091, 32.69575) | (27.70115, 28.5317, 30.3973) |
Metric measures for Mona Lisa (gray).
| Evaluation Metrics | ECC with Hill Cipher | ECC with AES | ElGamal with Double Playfair Cipher |
|---|---|---|---|
| Encryption Time (seconds) | 0.44584 | 2.84150 | 0.24519 |
| Decryption Time (seconds) | 0.35107 | 2.7866 | 0.20224 |
| Entropy | 7.99442 | 7.99671 | 7.92129 |
| Mean Squared Error (MSE) | 0.0000 | 0.0000 | 0.0000 |
| PSNR (dB) | 8.5959 | 8.62078 | 9.12066 |
| NPCR (%) | 97.41669 | 99.58191 | 94.13757 |
| UACI (%) | 30.26131 | 30.37332 | 27.97823 |
Metric measures for Eggs (grayscale).
| Evaluation | ECC with | ECC with | ElGamal with Double |
|---|---|---|---|
| Metrics | Hill Cipher | AES | Playfair Cipher |
| Encryption Time (s) | 0.32507 | 2.53642 | 0.13366 |
| Decryption Time (s) | 0.35904 | 2.52728 | 0.16954 |
| Entropy | (7.98534, 7.98371, 7.98925) | (7.99652, 7.99585, 7.99638) | (7.85019, 7.87646, 7.90649) |
| Mean Squared Error (MSE) | (0, 0, 0) | (0, 0, 0) | (0, 0, 0) |
| PSNR (dB) | (9.41053, 8.95845, 8.74391) | (9.39128, 8.98602, 8.7218) | (9.86406, 9.45456, 9.069) |
| NPCR (%) | (96.67358, 96.81854, 96.99249) | (99.646, 99.63684, 99.62463) | (94.05823, 94.08875, 94.1803) |
| UACI (%) | (27.87552, 29.14918, 29.73587) | (28.15297, 29.32043, 30.11092) | (26.05094, 27.09534, 28.17803) |
Histogram analysis for encrypted image (Mona Lisa) using hybrid algorithms.
| Image | Encrypted Image | Encrypted Image | Encrypted Image |
|---|---|---|---|
| Mona Lisa |
|
|
|
| Mona Lisa |
|
|
|
Histogram analysis for encrypted image (Egg) using hybrid algorithms.
| Image | Encrypted Image | Encrypted Image | Encrypted Image |
|---|---|---|---|
| Egg |
|
|
|
| Egg |
|
|
|
Comparative analysis of proposed hybrid algorithms.
| S. No. | Image Encryption and Decryption Algorithms | Proposed Hybrid Algorithms |
|---|---|---|
| 1 | Encryption and Decryption algorithms proposed | The proposed symmetric and |
| 2 | Symmetric Key provides faster processing, | Proposed algorithm solves the problem |
| 3 | Several techniques adopted without | The techniques proposed here compress |
| 4 | Requires high bandwidth without compression. | We have proposed with compression |
| 5 | Most researchers use only some | Different metric measures such as Entropy, |