Elliptical curve cryptography image encryption scheme with aid of optimization technique using gravitational search algorithm
نویسندگان
چکیده
<p>Image <span>encryption enables users to safely transmit digital photographs via a wireless medium while maintaining enhanced anonymity and validity. Numerous studies are being conducted strengthen picture encryption systems. Elliptical curve cryptography (ECC) is an effective tool for transferring images recovering them at the receiver end in asymmetric cryptosystems. This method's key generation generates public private pair that used encrypt decrypt picture. They use before sending it intended user. When receives image, they their it. paper proposes ECC-dependent image scheme utilizing enhancement strategy based on gravitational search algorithm (GSA) algorithm. The step of ECC system uses GSA-based optimization process boost efficiency encryption. image's output as health attribute phase, such peak signal noise ratio (PSNR) value, which demonstrates efficacy proposed approach. As comparison method, has been discovered suggested offers better optimal PSNR </span>values.</p>
منابع مشابه
Identity Based Encryption through Elliptical Curve Cryptography
Although the Boneh and Franklin identity-based encryption scheme is not overly complex theoretically, the implementation of the system proves to be somewhat difficult. 1 Identity Based Encryption: The difficulty with public key encryption involves distribution of the keys and the assumption that they will always be available (Ding 194). It is not always practical to be connected to a key certif...
متن کاملAn Efficient Encryption Scheme using Elliptic Curve Cryptography (ECC) with Symmetric Algorithm for Healthcare System
Wireless Body Area Networks (WBANs) has been recognized as one of the promising wireless sensor technologies for improving healthcare service thanks to its capability of seamlessly and continuously exchanging medical information in real time. However, the lack of a clear in-depth defense line in such a new networking paradigm would make it potential users worry about the leakage of their privat...
متن کاملBlind Signature Scheme Based On Elliptical Curve Cryptography ( ECC ) Preeti
Blind signature is a concept to ensure anonymity of e-coins. Untracebility and unlinkability are ttwo main properties of real coins and should also be mimicked electronicaly. A user has fulfill above two properties of blind signature for permission to send an e-coins. During the last few years, asymmetric cryptography based on curve based cryptography have becomes very popular, especially for e...
متن کاملParameters Assignment of Electric Train Controller by Using Gravitational Search Optimization Algorithm
The speed profile of the train will be determined according to criteria such as safety, travel convenience, and the type of electric motor used for traction. Due to the passengers and cargo on the train, the electric train load is constantly changing. This will require reassigning the speed controller’s parameters of the electric train. For this purpose, the Gravitational Search optimization Al...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Indonesian Journal of Electrical Engineering and Computer Science
سال: 2022
ISSN: ['2502-4752', '2502-4760']
DOI: https://doi.org/10.11591/ijeecs.v25.i1.pp247-255