Use of elliptic curve cryptography for multimedia encryption

L Tawalbeh, M Mowafi, W Aljoby - IET Information Security, 2013 - Wiley Online Library
The unique characteristics of the elliptic curve cryptography (ECC) such as the small key
size, fast computations and bandwidth saving make its use attractive for multimedia …

An efficient image encryption technique based on optimized key generation in ECC using genetic algorithm

K Shankar, P Eswaran - Artificial Intelligence and Evolutionary …, 2016 - Springer
Nowadays image encryption has turned into an approach to transmit interactive image
information with utmost confidentiality and authenticity. In order to transmit the secret …

Optimal visual cryptographic scheme with multiple share creation for multimedia applications

P Geetha, VS Jayanthi, AN Jayanthi - computers & security, 2018 - Elsevier
The criminal activity of hackers to retrieve the highly secured information on multimedia
application generates major security concerned problems towards the human life. Basically …

[PDF][PDF] Image encryption using logistic-cosine-sine chaos map and elliptic curve cryptography

B Jasra, M Saqib, AH Moon - Journal of theoretical and applied …, 2021 - researchgate.net
ABSTRACT A number of image encryption schemes based upon chaotic systems proposed
in the past, have been found to be vulnerable to known-plaintext attack due to the usage of …

Multiple share creation based visual cryptographic scheme using diffusion method with a combination of chaotic maps for multimedia applications

P Geetha, VS Jayanthi, AN Jayanthi - Multimedia Tools and Applications, 2019 - Springer
In the modern years, multimedia security has become a prime agenda for secure
transmission over unsecured channels due to the increase in digitalization of media …

Software application for simulation-based AES, RSA and elliptic-curve algorithms

A Chaouch, B Bouallegue… - 2016 2nd International …, 2016 - ieeexplore.ieee.org
In this paper we represent a develo** work in an advanced algorithm for image
encryption. First, we have programmed a flexible encrypting algorithms based on AES, RSA …

Performance analysis of elliptic curves for real-time video encryption

N Sen, R Dantu, J Vempati… - 2018 National Cyber …, 2018 - ieeexplore.ieee.org
The use of real-time video streaming is increasing day-by-day, and its security has become
a serious issue now. Video encryption is a challenging task because of its large frame size …

JPEG mage encryption with Elliptic Curve Cryptography

S Bakhtiari, S Ibrahim, M Salleh… - … on Biometrics and …, 2014 - ieeexplore.ieee.org
Nowadays, the topic of multipurpose use of images is thriving in the fields of security
establishment, authentication, watermarking, and etc. Simultaneously, the rise of …

Scalable Anomaly Detection for Large-Scale Heterogeneous Data in Cloud Using Optimal Elliptic Curve Cryptography and Gaussian Kernel Fuzzy -Means …

P Santhosh Kumar, L Parthiban - Journal of Circuits, Systems and …, 2020 - World Scientific
In most systems, a smart functionality is enabled through an essential vital service such as
detecting anomalies from complex, large-scale and dynamic data. However, ensuring the …

Map** images over elliptic curve for encryption

B Jasra, M Saqib, AH Moon - 2021 6th International …, 2021 - ieeexplore.ieee.org
The emergence of Elliptic curve cryptography as a preferred cryptographic scheme using
minimal computational resources is quite discernible. Its extension to the domain of image …