Security Compressed Sensing Image Encryption Algorithm Based on Elliptic Curve

  • Conference paper
  • First Online:
Data Science (ICPCSEE 2023)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1879))

  • 330 Accesses

Abstract

Aiming to address the problems of high costs associated with the storage and transmission of environmental monitoring images, as well as potential security risks, this paper proposes a security compressed sensing image encryption algorithm based on elliptic curve cryptography. The algorithm introduces elliptic curve encryption technology within a compressed sensing framework, using elliptic curve cryptography to encrypt the matrix during the compression perception acquisition process. This enables secure acquisition of environmental monitoring encrypted images. Therefore, this paper presents a security compressed sensing framework to address security gaps in the compression perception reconstruction process and improve the security of environmental monitoring images. Experimental results show that the proposed algorithm effectively encrypts and reconstructs environmental monitoring images, with high security and resistance to cracking.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (France)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 71.68
Price includes VAT (France)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 89.66
Price includes VAT (France)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Li, J., et al.: A review of remote sensing for environmental monitoring in China. Remote Sens. 12(7), 1130 (2020)

    Google Scholar 

  2. Dunbabin, M., Marques, L.: Robots for environmental monitoring: significant advancements and applications. IEEE Robot. Autom. Mag. 19(1), 24–39 (2012)

    Article  Google Scholar 

  3. Hakala, I., Tikkakoski, M., Kivelä, I.: Wireless sensor network in environmental monitoring-case foxhouse. In: 2008 Second International Conference on Sensor Technologies and Applications (sensorcomm 2008). IEEE (2008)

    Google Scholar 

  4. Xu, L.D., He, W., Li, S.: Internet of things in industries: a survey. IEEE Trans. Ind. Inform. 10(4), 2233–2243 (2014)

    Google Scholar 

  5. Dong, B., et al.: A novel approach to improving the efficiency of storing and accessing small files on hadoop: a case study by powerpoint files. In: 2010 IEEE International Conference on Services Computing. IEEE (2010)

    Google Scholar 

  6. Zhou, X., Zhang, H., Wang, C.: A robust image watermarking technique based on DWT, APDCBT, and SVD. Symmetry 10(3), 77 (2018)

    Article  Google Scholar 

  7. Zhang, Y., et al.: HF-TPE: high-fidelity thumbnail-preserving encryption. IEEE Trans. Circuits Syst. Video Technol. 32(3), 947–961 (2021)

    Google Scholar 

  8. Shah, T., Jamal, S.S.: An improved chaotic cryptosystem for image encryption and digital watermarking. Wireless Personal Commun. 110(3): 1429–1442 (2020)

    Google Scholar 

  9. Arora, M., Khurana, M.: Secure image encryption technique based on jigsaw transform and chaotic scrambling using digital image watermarking. Opt. Quant. Electron. 52(2), 1–30 (2020)

    Article  Google Scholar 

  10. El-Khamy, S.E., Korany, N.O., Mohamed, A.G.: A new fuzzy-DNA image encryption and steganography technique. IEEE Access 8, 148935–148951 (2020)

    Article  Google Scholar 

  11. Bala Krishnan, R., et al.: An approach for attaining content confidentiality on medical images through image encryption with steganography. Wireless Personal Communications: 1–17 (2021)

    Google Scholar 

  12. Liu, J., et al.: A sensitive image encryption algorithm based on a higher-dimensional chaotic map and steganography. Int. J. Bifurcation Chaos 32(01), 2250004 (2022)

    Google Scholar 

  13. Akkasaligar, P.T., Biradar, S.: Selective medical image encryption using DNA cryptography. Inf. Secur. J. Global Perspective 29(2), 91–101 (2020)

    Article  Google Scholar 

  14. Liu, Y., et al.: Optical image encryption algorithm based on hyper-chaos and public-key cryptography. Optics Laser Technol. 127, 106171 (2020)

    Google Scholar 

  15. Donoho, D.L.: Compressed sensing. IEEE Trans. Inf. Theory 52(4), 1289–1306 (2006)

    Google Scholar 

  16. Candès, E.J., Romberg, J., Tao, T.: Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information. IEEE Trans. Inf. Theory 52(2), 489–509 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  17. Baraniuk, R.G.: Compressive sensing [lecture notes]. IEEE Signal Process. Magaz. 24(4), 118–121 (2007)

    Google Scholar 

  18. Koblitz, N., Menezes, A., Vanstone, S.: The state of elliptic curve cryptography. Des. Codes Crypt. 19(2), 173–193 (2000)

    Article  MathSciNet  MATH  Google Scholar 

  19. Amara, M., Siad, A.: Elliptic curve cryptography and its applications. In: International workshop on systems, signal processing and their applications, WOSSPA. IEEE (2011)

    Google Scholar 

  20. Zhou, X., Tang, X.: Research and implementation of RSA algorithm for encryption and decryption. In: Proceedings of 2011 6th International Forum on Strategic Technology, vol. 2. IEEE (2011)

    Google Scholar 

  21. Corrigan-Gibbs, H., Kogan: The discrete-logarithm problem with preprocessing. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Cham (2018). Doi: https://doi.org/10.1007/978-3-319-78375-8_14

  22. Mahto, D., Yadav, D.K.: RSA and ECC: a comparative analysis. Int. J. Appl. Eng. Res. 12(19), 9053–9061 (2017)

    Google Scholar 

  23. Yadav, A.K.: Significance of elliptic curve cryptography in blockchain IoT with comparative analysis of RSA algorithm. In: 2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). IEEE (2021)

    Google Scholar 

  24. Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system. Decentralized Bus. Rev., 21260 (2008)

    Google Scholar 

  25. Zhang, L., Zhang, J., **, A. Optimization and reconstruction for EPMA image compressed sensing based on chaotic measurement matrix. In: 2022 14th International Conference on Machine Learning and Computing (ICMLC), 02, pp. 474–482 (2022)

    Google Scholar 

  26. Kamali, S.H., et al.: A new modified version of advanced encryption standard based algorithm for image encryption. In: 2010 International Conference on Electronics and Information Engineering, vol. ol. 1. IEEE (2010)

    Google Scholar 

  27. Mohammad, O.F., et al.: A survey and analysis of the image encryption methods. Int. J. Appl. Eng. Res. 12(23), 13265–13280 (2017)

    Google Scholar 

  28. Mandal, M.K., et al.: Symmetric key image encryption using chaotic Rossler system.“ Security and Communication Networks 7(11): 2145–2152 (2014)

    Google Scholar 

  29. Yockey, H.P.: Information theory, evolution and the origin of life. Inf. Sci. 141(3–4), 219–225 (2002)

    Google Scholar 

  30. Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Techn. J. 28(4), 656–715 (1949)

    Google Scholar 

  31. Thomas, M.T.C.A.J., Thomas Joy, A.: Elements of information theory. Wiley-Interscience (2006)

    Google Scholar 

  32. Zhang, Y., et al.: Signal reconstruction of compressed sensing based on alternating direction method of multipliers. Circuits Syst. Signal Process. 39(1), 307–323 (2020)

    Google Scholar 

  33. Li, R.: Fingerprint-related chaotic image encryption scheme based on blockchain framework. Multimed. Tools Appl. 80(20), 30583–30603 (2020). https://doi.org/10.1007/s11042-020-08802-z

    Article  Google Scholar 

  34. Certicom, E. C. C.: Challenge and The Elliptic Curve Cryptosystem, pp. 409–418 (1998)

    Google Scholar 

Download references

Acknowledgments

This paper was supported by the Jiangxi Province Network Space Security Intelligent Perception Key Laboratory Open Fund (No.: JKLCIP202205).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to **ang Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

**, A., Li, X., **ong, Q. (2023). Security Compressed Sensing Image Encryption Algorithm Based on Elliptic Curve. In: Yu, Z., et al. Data Science. ICPCSEE 2023. Communications in Computer and Information Science, vol 1879. Springer, Singapore. https://doi.org/10.1007/978-981-99-5968-6_25

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-5968-6_25

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-5967-9

  • Online ISBN: 978-981-99-5968-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation