Elliptic curve blended cross chaos based secure image communication

1Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Image encryption has proven a successful method to communicate the confidential information. Some of the images may or may not be confidential. So there is a need to secure the confidential images. Initially, symmetric encryption is used for security purpose. But it has the problem that if the key is revealed the interceptors can immediately decode it. To make the key transformation more secure, asymmetric encryption is introduced. In this two different keys are used for encoding and decoding. So even the interceptors hacked the key it cannot be possible to decode. In this project Elliptic Curve Cryptography (ECC) is utilized for generating the keys and the cross chaotic map used for generating the chaotic sequence. These chaotic sequences are utilized to encode the image for secure communication.

Author supplied keywords

Cite

CITATION STYLE

APA

Rajendran, S., Abilashaa, S., & Doraipandian, M. (2019). Elliptic curve blended cross chaos based secure image communication. International Journal of Recent Technology and Engineering, 8(3), 4481–4484. https://doi.org/10.35940/ijrte.C6807.098319

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free