Design and Evaluation of Performance for Text and Image Cryptography Using Biometric Key and ECC
Keywords:
Elliptic Curve Cryptography (ECC), Cryptography, Biometric Image, Text, Encryption, DecryptionAbstract
Cryptography is one of the important sciences in the current era. It is a science of secret writing. It is the art of protecting the information by transforming it into an unreadable format in which a message can be concealed from the casual reader and only the intended recipient will be able to convert it into original text .Cryptography renders the message unintelligible to outsider by various transformations. Data Cryptography is the scrambling of the content of data like text, image, audio and video to make it unreadable or unintelligible during transmission. Its main goal is to keep the data secure from unauthorized access. The importance of cryptography comes from the intensive digital transactions which we daily perform on the internet and other communication channels. Visual cryptography, an emerging cryptography technology, uses the characteristics of human vision to decrypt encrypted images. It needs neither cryptography knowledge nor complex computation. For security concerns, it also ensures that hackers cannot perceive any clues about a secret image from individual cover images. In this work, the authentication of the user will be verified based on the user information as well as the signature. It means the cryptography will be performed over the text information as well as on digital signature. This two layer scheme will improve the security for the authentication. The proposed algorithm is implemented on both text and image for encoding and decoding purpose. All the implementation work has been done in MATLAB R2009 using general MATLAB toolbox and image processing toolbox. Encryption time, decryption time and size of encrypted data have been taken as parameter for evaluation of performance of algorithm.
References
Farshid Delgosha, and Faramarz Fekri, "Public-Key Cryptography Using Paraunitary Matrices" IEEE transaction on signal processing, vil. 54, no. 9, September 2006.
Sean O"Melia and Adam J. Elbirt, "Enhancing the Performance of Symmetric-Key Cryptography via Instruction Set Extensions" transaction on very large on very large scale integration system, Vol. 18, No. 11, November 2010.
Zhimin Chen and Patrick Schaumont, "A Parallel Implementation of Montgomery Multiplication on Multicore Systems: Algorithm, Analysis, and Prototype" IEEE Transaction on computers, Vol. 60, No. 12, December 2011.
Daniel Page and Frederik Vercauteren , "A Fault Attack on Pairing-Based Cryptography" IEEE Transaction on computers, Vol. 55, No. 9, September 2006.
Zhi Zhou, Gonzalo R. Arce, Giovanni Di Crescenzo, "Halftone Visual Cryptography" IEEE Transaction on image processing, Vol. 15, No. 8, August 2006.
Ohood S. Althobaiti1 and Hatim A. Aboalsamh, "An Enhanced Elliptic Curve Cryptography for Biometric".
Gururaja.H.S., M.Seetha, Anjan.K.Koundinya, "Design and Performance Analysis of Secure Elliptic Curve Cryptosystem" International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 8, August 2013.
Vaibhav Choudhary, Kishore Kumar, Pravin Kumar and D.S. Singh, "Modified Pixel Sieve Method for Visual Cryptography" Indian Journal of Computer Science and Engineering, Vol. 1 No. 4 321-326.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
