Open Access   Article Go Back

Design and Evaluation of Performance for Text and Image Cryptography Using Biometric Key and ECC

A. Kukreja1 , Ayushi 2

Section:Research Paper, Product Type: Journal Paper
Volume-2 , Issue-8 , Page no. 50-55, Aug-2014

Online published on Aug 31, 2014

Copyright © A. Kukreja, Ayushi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: A. Kukreja, Ayushi , “Design and Evaluation of Performance for Text and Image Cryptography Using Biometric Key and ECC,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.8, pp.50-55, 2014.

MLA Style Citation: A. Kukreja, Ayushi "Design and Evaluation of Performance for Text and Image Cryptography Using Biometric Key and ECC." International Journal of Computer Sciences and Engineering 2.8 (2014): 50-55.

APA Style Citation: A. Kukreja, Ayushi , (2014). Design and Evaluation of Performance for Text and Image Cryptography Using Biometric Key and ECC. International Journal of Computer Sciences and Engineering, 2(8), 50-55.

BibTex Style Citation:
@article{Kukreja_2014,
author = {A. Kukreja, Ayushi },
title = {Design and Evaluation of Performance for Text and Image Cryptography Using Biometric Key and ECC},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2014},
volume = {2},
Issue = {8},
month = {8},
year = {2014},
issn = {2347-2693},
pages = {50-55},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=225},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=225
TI - Design and Evaluation of Performance for Text and Image Cryptography Using Biometric Key and ECC
T2 - International Journal of Computer Sciences and Engineering
AU - A. Kukreja, Ayushi
PY - 2014
DA - 2014/08/31
PB - IJCSE, Indore, INDIA
SP - 50-55
IS - 8
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
3699 3597 downloads 3673 downloads
  
  
           

Abstract

Cryptography is one of the important sciences in the current era. It is a science of secret writing. It is the art of protecting the information by transforming it into an unreadable format in which a message can be concealed from the casual reader and only the intended recipient will be able to convert it into original text .Cryptography renders the message unintelligible to outsider by various transformations. Data Cryptography is the scrambling of the content of data like text, image, audio and video to make it unreadable or unintelligible during transmission. Its main goal is to keep the data secure from unauthorized access. The importance of cryptography comes from the intensive digital transactions which we daily perform on the internet and other communication channels. Visual cryptography, an emerging cryptography technology, uses the characteristics of human vision to decrypt encrypted images. It needs neither cryptography knowledge nor complex computation. For security concerns, it also ensures that hackers cannot perceive any clues about a secret image from individual cover images. A visual cryptography scheme encodes a black and white secret image into n shadow images called shares which are distributed to the n participants. Such shares are such that only qualified subsets of participants can �visually�� recover the secret image. Elliptical curves are mathematical NP-hard problems, which are proofed to be intractable in term of complexity. Cryptography has efficiently utilized the strength EC in developing several cryptosystems such as key agreement protocols, digital signatures and others. Elliptic Curve Cryptography (ECC) usage is with smaller key to give high security and high speed in a low bandwidth. ECC is considered as the best method for upcoming applications. There are number of existing cryptographic approaches. In this present work, we have defined a hybrid cryptography approach with the combination of biometric key concept and the Elliptical Curve Cryptography (ECC). ECC is a public key cryptography having equal and attractive significance over RSA algorithm with smaller key size. It is based on geometric elliptical curve design algorithm. In this work, the authentication of the user will be verified based on the user information as well as the signature. It means the cryptography will be performed over the text information as well as on digital signature. This two layer scheme will improve the security for the authentication. The proposed algorithm is implemented on both text and image for encoding and decoding purpose. All the implementation work has been done in MATLAB R2009 using general MATLAB toolbox and image processing toolbox. Encryption time, decryption time and size of encrypted data have been taken as parameter for evaluation of performance of algorithm.

Key-Words / Index Term

Elliptic Curve Cryptography (ECC), Cryptography, Biometric Image, Text, Encryption, Decryption.

References

[1]. Farshid Delgosha, and Faramarz Fekri, �Public-Key Cryptography Using Paraunitary Matrices� IEEE transaction on signal processing, vil. 54, no. 9, September 2006.
[2]. Sean O�Melia and Adam J. Elbirt, �Enhancing the Performance of Symmetric-Key Cryptography via Instruction Set Extensions� transaction on very large on very large scale integration system, Vol. 18, No. 11, November 2010.
[3]. Zhimin Chen and Patrick Schaumont, �A Parallel Implementation of Montgomery Multiplication on Multicore Systems: Algorithm, Analysis, and Prototype� IEEE Transaction on computers, Vol. 60, No. 12, December 2011.
[4]. Daniel Page and Frederik Vercauteren , �A Fault Attack on Pairing-Based Cryptography� IEEE Transaction on computers, Vol. 55, No. 9, September 2006.
[5]. Zhi Zhou, Gonzalo R. Arce, Giovanni Di Crescenzo, �Halftone Visual Cryptography� IEEE Transaction on image processing, Vol. 15, No. 8, August 2006.
[6]. Ohood S. Althobaiti1 and Hatim A. Aboalsamh, �An Enhanced Elliptic Curve Cryptography for Biometric�.
[7]. Gururaja.H.S., M.Seetha, Anjan.K.Koundinya, �Design and Performance Analysis of Secure Elliptic Curve Cryptosystem� International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 8, August 2013.
[8]. Vaibhav Choudhary, Kishore Kumar, Pravin Kumar and D.S. Singh, �Modified Pixel Sieve Method for Visual Cryptography� Indian Journal of Computer Science and Engineering, Vol. 1 No. 4 321-326.