Performance Evaluation of AES, ECC and Logistic Chaotic Map Algorithms in Image Encryption

I n these days of technology, the usage of images has become increasingly high especially now that almost everyone has access to internet. Also, image helps us to learn, grabs our attention, explains complicated concepts as well as inspires us. Sharing these images is essential and therefore image e...

Full description

Saved in:
Bibliographic Details
Published inInternational journal of interactive mobile technologies Vol. 17; no. 10; pp. 193 - 211
Main Authors Farah Tawfiq Abdul Hussien, Teaba Wala Aldeen Khairi
Format Journal Article
LanguageEnglish
Published 22.05.2023
Online AccessGet full text
ISSN1865-7923
1865-7923
DOI10.3991/ijim.v17i10.38787

Cover

Abstract I n these days of technology, the usage of images has become increasingly high especially now that almost everyone has access to internet. Also, image helps us to learn, grabs our attention, explains complicated concepts as well as inspires us. Sharing these images is essential and therefore image encryption algorithms are proposed to secure the transmission of these image from many types of attacks such as Man-in-the-middle attack (MITM). In this paper, we proposed a hybrid security system that consist of Elliptic Curve Cryptography (ECC) and Advanced Encryption System (AES). Where ECC is used to generate private/public keys and AES is for encryption and decryption of the image using the ECC generated keys. The system works as follows; it begins by inserting the image to be encrypted which is “lena.png” of size 256*256 and passing it to AES Algorithm along with the generated public key. Then, in AES algorithm, the public key is hashed then used to encrypt the image with AES encryption algorithm. On the other hand, the decryption algorithm works as follows; inserting the encrypted image then calculating the decryption key to use it to decrypt the image using AES decryption algorithm. Finally, our experimental results shows that the National Institute of Standards and Technology (NIST) test shows that the ECC generated keys have better randomness than using only AES generated keys. Also, the encrypted image histogram show that the image pixels values are well distributed across all three channels R, G and B. This shows that the hybrid system is a step further to get a more secure image encryption system against attacks with the generated ECC keys. To get further, Logistic chaotic map has been used to encrypt images for comparison purposes with AES and ECC generated images in terms of randomness, security and histogram
AbstractList I n these days of technology, the usage of images has become increasingly high especially now that almost everyone has access to internet. Also, image helps us to learn, grabs our attention, explains complicated concepts as well as inspires us. Sharing these images is essential and therefore image encryption algorithms are proposed to secure the transmission of these image from many types of attacks such as Man-in-the-middle attack (MITM). In this paper, we proposed a hybrid security system that consist of Elliptic Curve Cryptography (ECC) and Advanced Encryption System (AES). Where ECC is used to generate private/public keys and AES is for encryption and decryption of the image using the ECC generated keys. The system works as follows; it begins by inserting the image to be encrypted which is “lena.png” of size 256*256 and passing it to AES Algorithm along with the generated public key. Then, in AES algorithm, the public key is hashed then used to encrypt the image with AES encryption algorithm. On the other hand, the decryption algorithm works as follows; inserting the encrypted image then calculating the decryption key to use it to decrypt the image using AES decryption algorithm. Finally, our experimental results shows that the National Institute of Standards and Technology (NIST) test shows that the ECC generated keys have better randomness than using only AES generated keys. Also, the encrypted image histogram show that the image pixels values are well distributed across all three channels R, G and B. This shows that the hybrid system is a step further to get a more secure image encryption system against attacks with the generated ECC keys. To get further, Logistic chaotic map has been used to encrypt images for comparison purposes with AES and ECC generated images in terms of randomness, security and histogram
Author Farah Tawfiq Abdul Hussien
Teaba Wala Aldeen Khairi
Author_xml – sequence: 1
  surname: Farah Tawfiq Abdul Hussien
  fullname: Farah Tawfiq Abdul Hussien
– sequence: 2
  surname: Teaba Wala Aldeen Khairi
  fullname: Teaba Wala Aldeen Khairi
BookMark eNqNkM9Kw0AQhxepYK19AG_7AKbun6bZPZYQbaGioF68hMl2025JdsNuWunbm7QexIM4lxmG-X4w3zUaWGc1QreUTLiU9N7sTD050MT0C5GI5AINqZjFUSIZH_yYr9A4hB3pitNpzMgQfbxoXzpfg1UaZweo9tAaZ7Er8Tx7vcNZmmKwa7xyGxNao3C6Bdf3J2jwvNo4b9ptHbCxeFnDpsuwyh-bPuMGXZZQBT3-7iP0_pC9pYto9fy4TOerSDHCk0goUahYEaXkmkpeMK2ZjpkuhJx2zyhaUM0loSC1ZIIBrIF3B7KnqZxN-Qixc-7eNnD8hKrKG29q8MeckrwXlPeC8rOg_CSog-gZUt6F4HX5Lyb5xSjTnnS1Hkz1B_kF8Kx-wg
CitedBy_id crossref_primary_10_1016_j_eij_2024_100487
crossref_primary_10_3390_e26080690
crossref_primary_10_1515_jisys_2024_0191
ContentType Journal Article
DBID AAYXX
CITATION
ADTOC
UNPAY
DOI 10.3991/ijim.v17i10.38787
DatabaseName CrossRef
Unpaywall for CDI: Periodical Content
Unpaywall
DatabaseTitle CrossRef
DatabaseTitleList CrossRef
Database_xml – sequence: 1
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1865-7923
EndPage 211
ExternalDocumentID 10.3991/ijim.v17i10.38787
10_3991_ijim_v17i10_38787
GroupedDBID .4S
.DC
29J
2WC
5GY
AAKDD
AAYXX
ADBBV
ADMLS
ALMA_UNASSIGNED_HOLDINGS
ARCSS
BCNDV
CITATION
E3Z
EDO
I-F
KQ8
KWQ
M~E
OK1
OVT
P2P
TR2
TUS
ADTOC
C1A
UNPAY
ID FETCH-LOGICAL-c2037-8c8bc5c0cc9d193b2ee2e52eb894387c1b1e3901a9e9282aada32e59c20319643
IEDL.DBID UNPAY
ISSN 1865-7923
IngestDate Tue Aug 19 16:33:08 EDT 2025
Tue Jul 01 01:45:35 EDT 2025
Thu Apr 24 23:11:31 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 10
Language English
License https://creativecommons.org/licenses/by/4.0
cc-by
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c2037-8c8bc5c0cc9d193b2ee2e52eb894387c1b1e3901a9e9282aada32e59c20319643
OpenAccessLink https://proxy.k.utb.cz/login?url=https://online-journals.org/index.php/i-jim/article/download/38787/13225
PageCount 19
ParticipantIDs unpaywall_primary_10_3991_ijim_v17i10_38787
crossref_primary_10_3991_ijim_v17i10_38787
crossref_citationtrail_10_3991_ijim_v17i10_38787
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2023-05-22
PublicationDateYYYYMMDD 2023-05-22
PublicationDate_xml – month: 05
  year: 2023
  text: 2023-05-22
  day: 22
PublicationDecade 2020
PublicationTitle International journal of interactive mobile technologies
PublicationYear 2023
SSID ssj0000314520
Score 2.232343
Snippet I n these days of technology, the usage of images has become increasingly high especially now that almost everyone has access to internet. Also, image helps us...
SourceID unpaywall
crossref
SourceType Open Access Repository
Enrichment Source
Index Database
StartPage 193
Title Performance Evaluation of AES, ECC and Logistic Chaotic Map Algorithms in Image Encryption
URI https://online-journals.org/index.php/i-jim/article/download/38787/13225
UnpaywallVersion publishedVersion
Volume 17
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAFT
  databaseName: Open Access Digital Library
  customDbUrl:
  eissn: 1865-7923
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000314520
  issn: 1865-7923
  databaseCode: KQ8
  dateStart: 20070101
  isFulltext: true
  titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html
  providerName: Colorado Alliance of Research Libraries
– providerCode: PRVEBS
  databaseName: Inspec with Full Text
  customDbUrl:
  eissn: 1865-7923
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000314520
  issn: 1865-7923
  databaseCode: ADMLS
  dateStart: 20071001
  isFulltext: true
  titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text
  providerName: EBSCOhost
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 1865-7923
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000314520
  issn: 1865-7923
  databaseCode: M~E
  dateStart: 20070101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LS8NAEB5qPejFt_gse_Ckpmk2zetYSqSKLQUtqJewu9lotE1KbRU9-NvdSdL6OCiCp0CYWZKZfXyzu_MNwEEU2jbnpqGZdk1qdWl4GqtTrjHPrDHGuWWGuN_R7titXv3syroqQWuaC5PzQ2iFIR-zs_yMNxDJIvRYu48HemFTPUQ6-ZSFuumqbqdjXGXNwbxtKVRehvlep9u4xnjLtZGVkZr5oaZakQ09Vu1Unwwnxheo_WVZWpgkQ_byzPr9T2vNyTLE06_Mr5g8VCdjXhWv3wgc_-M3VmCpAKSkkYutQkkma7A8LfZAirG_DjfdjxQD4s84wkkakYZ_cUz8ZpOwJCTnWUpRLEjzjqX4bLMhafRv01E8vhs8kjghpwM1iRE_EaOXbMLagN6Jf9lsaUVhBk1QTCt0hcuFJWpCeKECgJxKSaVFJUcyd9cRBjck7qUwT3oqpGMsZKYS8FA7IwDbhHKSJnILCDLOKUSh2nKYwhaUO5zWI-o5hifcSETbUJv6JRAFazkWz-gHKnpBVwboyiB3ZZBZcBsOZyrDnLLjJ-GjmbN_l975k_QuLGJxerxrQOkelMejidxXEGbMKzDXfvMrRR99B-ph9BM
linkProvider Unpaywall
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LS8NAEB60PejFt_hmD57UNM2meR1LSalipaCF6iXsbjYabZNSW6X-eneStD4OiuApEGaWZGYf3-zufANwHIW2zblpaKZdlVpNGp7GapRrzDOrjHFumSHud7Sv7Fa3dtGzegvQmuXC5PwQWmHI5-wsP-MNRLIIPdYe44Fe2FQPkU4-ZaFuuqrb6RhXWYtQti2FyktQ7l516rcYb7k2sjJSMz_UVCuyoceqncqL4cT4ArW_LEtLk2TIpq-s3_-01jRXIZ59ZX7F5KkyGfOKePtG4Pgfv7EGKwUgJfVcbB0WZLIBq7NiD6QY-5tw1_lIMSD-nCOcpBGp-9dnxG80CEtCcpmlFMWCNB5Yis82G5J6_z4dxeOHwTOJE3I-UJMY8RMxmmYT1hZ0m_5No6UVhRk0QTGt0BUuF5aoCuGFCgByKiWVFpUcydxdRxjckLiXwjzpqZCOsZCZSsBD7YwAbBtKSZrIHSDIOKcQhWrLYQpbUO5wWouo5xiecCMR7UJ15pdAFKzlWDyjH6joBV0ZoCuD3JVBZsFdOJmrDHPKjp-ET-fO_l1670_S-7CMxenxrgGlB1AajybyUEGYMT8qeuc7Nnry4g
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Performance+Evaluation+of+AES%2C+ECC+and+Logistic+Chaotic+Map+Algorithms+in+Image+Encryption&rft.jtitle=International+journal+of+interactive+mobile+technologies&rft.au=Farah+Tawfiq+Abdul+Hussien&rft.au=Teaba+Wala+Aldeen+Khairi&rft.date=2023-05-22&rft.issn=1865-7923&rft.eissn=1865-7923&rft.volume=17&rft.issue=10&rft.spage=193&rft.epage=211&rft_id=info:doi/10.3991%2Fijim.v17i10.38787&rft.externalDBID=n%2Fa&rft.externalDocID=10_3991_ijim_v17i10_38787
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1865-7923&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1865-7923&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1865-7923&client=summon