Performance Evaluation of AES, ECC and Logistic Chaotic Map Algorithms in Image Encryption
I n these days of technology, the usage of images has become increasingly high especially now that almost everyone has access to internet. Also, image helps us to learn, grabs our attention, explains complicated concepts as well as inspires us. Sharing these images is essential and therefore image e...
        Saved in:
      
    
          | Published in | International journal of interactive mobile technologies Vol. 17; no. 10; pp. 193 - 211 | 
|---|---|
| Main Authors | , | 
| Format | Journal Article | 
| Language | English | 
| Published | 
          
        22.05.2023
     | 
| Online Access | Get full text | 
| ISSN | 1865-7923 1865-7923  | 
| DOI | 10.3991/ijim.v17i10.38787 | 
Cover
| Abstract | I
n these days of technology, the usage of images has become increasingly high especially now that almost everyone has access to internet. Also, image helps us to learn, grabs our attention, explains complicated concepts as well as inspires us. Sharing these images is essential and therefore image encryption algorithms are proposed to secure the transmission of these image from many types of attacks such as Man-in-the-middle attack (MITM). In this paper, we proposed a hybrid security system that consist of Elliptic Curve Cryptography (ECC) and Advanced Encryption System (AES). Where ECC is used to generate private/public keys and AES is for encryption and decryption of the image using the ECC generated keys. The system works as follows; it begins by inserting the image to be encrypted which is “lena.png” of size 256*256 and passing it to AES Algorithm along with the generated public key. Then, in AES algorithm, the public key is hashed then used to encrypt the image with AES encryption algorithm. On the other hand, the decryption algorithm works as follows; inserting the encrypted image then calculating the decryption key to use it to decrypt the image using AES decryption algorithm. Finally, our experimental results shows that the National Institute of Standards and Technology (NIST) test shows that the ECC generated keys have better randomness than using only AES generated keys. Also, the encrypted image histogram show that the image pixels values are well distributed across all three channels R, G and B. This shows that the hybrid system is a step further to get a more secure image encryption system against attacks with the generated ECC keys. To get further, Logistic chaotic map has been used to encrypt images for comparison purposes with AES and ECC generated images in terms of randomness, security and histogram | 
    
|---|---|
| AbstractList | I
n these days of technology, the usage of images has become increasingly high especially now that almost everyone has access to internet. Also, image helps us to learn, grabs our attention, explains complicated concepts as well as inspires us. Sharing these images is essential and therefore image encryption algorithms are proposed to secure the transmission of these image from many types of attacks such as Man-in-the-middle attack (MITM). In this paper, we proposed a hybrid security system that consist of Elliptic Curve Cryptography (ECC) and Advanced Encryption System (AES). Where ECC is used to generate private/public keys and AES is for encryption and decryption of the image using the ECC generated keys. The system works as follows; it begins by inserting the image to be encrypted which is “lena.png” of size 256*256 and passing it to AES Algorithm along with the generated public key. Then, in AES algorithm, the public key is hashed then used to encrypt the image with AES encryption algorithm. On the other hand, the decryption algorithm works as follows; inserting the encrypted image then calculating the decryption key to use it to decrypt the image using AES decryption algorithm. Finally, our experimental results shows that the National Institute of Standards and Technology (NIST) test shows that the ECC generated keys have better randomness than using only AES generated keys. Also, the encrypted image histogram show that the image pixels values are well distributed across all three channels R, G and B. This shows that the hybrid system is a step further to get a more secure image encryption system against attacks with the generated ECC keys. To get further, Logistic chaotic map has been used to encrypt images for comparison purposes with AES and ECC generated images in terms of randomness, security and histogram | 
    
| Author | Farah Tawfiq Abdul Hussien Teaba Wala Aldeen Khairi  | 
    
| Author_xml | – sequence: 1 surname: Farah Tawfiq Abdul Hussien fullname: Farah Tawfiq Abdul Hussien – sequence: 2 surname: Teaba Wala Aldeen Khairi fullname: Teaba Wala Aldeen Khairi  | 
    
| BookMark | eNqNkM9Kw0AQhxepYK19AG_7AKbun6bZPZYQbaGioF68hMl2025JdsNuWunbm7QexIM4lxmG-X4w3zUaWGc1QreUTLiU9N7sTD050MT0C5GI5AINqZjFUSIZH_yYr9A4hB3pitNpzMgQfbxoXzpfg1UaZweo9tAaZ7Er8Tx7vcNZmmKwa7xyGxNao3C6Bdf3J2jwvNo4b9ptHbCxeFnDpsuwyh-bPuMGXZZQBT3-7iP0_pC9pYto9fy4TOerSDHCk0goUahYEaXkmkpeMK2ZjpkuhJx2zyhaUM0loSC1ZIIBrIF3B7KnqZxN-Qixc-7eNnD8hKrKG29q8MeckrwXlPeC8rOg_CSog-gZUt6F4HX5Lyb5xSjTnnS1Hkz1B_kF8Kx-wg | 
    
| CitedBy_id | crossref_primary_10_1016_j_eij_2024_100487 crossref_primary_10_3390_e26080690 crossref_primary_10_1515_jisys_2024_0191  | 
    
| ContentType | Journal Article | 
    
| DBID | AAYXX CITATION ADTOC UNPAY  | 
    
| DOI | 10.3991/ijim.v17i10.38787 | 
    
| DatabaseName | CrossRef Unpaywall for CDI: Periodical Content Unpaywall  | 
    
| DatabaseTitle | CrossRef | 
    
| DatabaseTitleList | CrossRef | 
    
| Database_xml | – sequence: 1 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository  | 
    
| DeliveryMethod | fulltext_linktorsrc | 
    
| Discipline | Computer Science | 
    
| EISSN | 1865-7923 | 
    
| EndPage | 211 | 
    
| ExternalDocumentID | 10.3991/ijim.v17i10.38787 10_3991_ijim_v17i10_38787  | 
    
| GroupedDBID | .4S .DC 29J 2WC 5GY AAKDD AAYXX ADBBV ADMLS ALMA_UNASSIGNED_HOLDINGS ARCSS BCNDV CITATION E3Z EDO I-F KQ8 KWQ M~E OK1 OVT P2P TR2 TUS ADTOC C1A UNPAY  | 
    
| ID | FETCH-LOGICAL-c2037-8c8bc5c0cc9d193b2ee2e52eb894387c1b1e3901a9e9282aada32e59c20319643 | 
    
| IEDL.DBID | UNPAY | 
    
| ISSN | 1865-7923 | 
    
| IngestDate | Tue Aug 19 16:33:08 EDT 2025 Tue Jul 01 01:45:35 EDT 2025 Thu Apr 24 23:11:31 EDT 2025  | 
    
| IsDoiOpenAccess | true | 
    
| IsOpenAccess | true | 
    
| IsPeerReviewed | true | 
    
| IsScholarly | true | 
    
| Issue | 10 | 
    
| Language | English | 
    
| License | https://creativecommons.org/licenses/by/4.0 cc-by  | 
    
| LinkModel | DirectLink | 
    
| MergedId | FETCHMERGED-LOGICAL-c2037-8c8bc5c0cc9d193b2ee2e52eb894387c1b1e3901a9e9282aada32e59c20319643 | 
    
| OpenAccessLink | https://proxy.k.utb.cz/login?url=https://online-journals.org/index.php/i-jim/article/download/38787/13225 | 
    
| PageCount | 19 | 
    
| ParticipantIDs | unpaywall_primary_10_3991_ijim_v17i10_38787 crossref_primary_10_3991_ijim_v17i10_38787 crossref_citationtrail_10_3991_ijim_v17i10_38787  | 
    
| ProviderPackageCode | CITATION AAYXX  | 
    
| PublicationCentury | 2000 | 
    
| PublicationDate | 2023-05-22 | 
    
| PublicationDateYYYYMMDD | 2023-05-22 | 
    
| PublicationDate_xml | – month: 05 year: 2023 text: 2023-05-22 day: 22  | 
    
| PublicationDecade | 2020 | 
    
| PublicationTitle | International journal of interactive mobile technologies | 
    
| PublicationYear | 2023 | 
    
| SSID | ssj0000314520 | 
    
| Score | 2.232343 | 
    
| Snippet | I
n these days of technology, the usage of images has become increasingly high especially now that almost everyone has access to internet. Also, image helps us... | 
    
| SourceID | unpaywall crossref  | 
    
| SourceType | Open Access Repository Enrichment Source Index Database  | 
    
| StartPage | 193 | 
    
| Title | Performance Evaluation of AES, ECC and Logistic Chaotic Map Algorithms in Image Encryption | 
    
| URI | https://online-journals.org/index.php/i-jim/article/download/38787/13225 | 
    
| UnpaywallVersion | publishedVersion | 
    
| Volume | 17 | 
    
| hasFullText | 1 | 
    
| inHoldings | 1 | 
    
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAFT databaseName: Open Access Digital Library customDbUrl: eissn: 1865-7923 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000314520 issn: 1865-7923 databaseCode: KQ8 dateStart: 20070101 isFulltext: true titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html providerName: Colorado Alliance of Research Libraries – providerCode: PRVEBS databaseName: Inspec with Full Text customDbUrl: eissn: 1865-7923 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000314520 issn: 1865-7923 databaseCode: ADMLS dateStart: 20071001 isFulltext: true titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text providerName: EBSCOhost – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 1865-7923 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000314520 issn: 1865-7923 databaseCode: M~E dateStart: 20070101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre  | 
    
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LS8NAEB5qPejFt_gse_Ckpmk2zetYSqSKLQUtqJewu9lotE1KbRU9-NvdSdL6OCiCp0CYWZKZfXyzu_MNwEEU2jbnpqGZdk1qdWl4GqtTrjHPrDHGuWWGuN_R7titXv3syroqQWuaC5PzQ2iFIR-zs_yMNxDJIvRYu48HemFTPUQ6-ZSFuumqbqdjXGXNwbxtKVRehvlep9u4xnjLtZGVkZr5oaZakQ09Vu1Unwwnxheo_WVZWpgkQ_byzPr9T2vNyTLE06_Mr5g8VCdjXhWv3wgc_-M3VmCpAKSkkYutQkkma7A8LfZAirG_DjfdjxQD4s84wkkakYZ_cUz8ZpOwJCTnWUpRLEjzjqX4bLMhafRv01E8vhs8kjghpwM1iRE_EaOXbMLagN6Jf9lsaUVhBk1QTCt0hcuFJWpCeKECgJxKSaVFJUcyd9cRBjck7qUwT3oqpGMsZKYS8FA7IwDbhHKSJnILCDLOKUSh2nKYwhaUO5zWI-o5hifcSETbUJv6JRAFazkWz-gHKnpBVwboyiB3ZZBZcBsOZyrDnLLjJ-GjmbN_l975k_QuLGJxerxrQOkelMejidxXEGbMKzDXfvMrRR99B-ph9BM | 
    
| linkProvider | Unpaywall | 
    
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LS8NAEB60PejFt_hmD57UNM2meR1LSalipaCF6iXsbjYabZNSW6X-eneStD4OiuApEGaWZGYf3-zufANwHIW2zblpaKZdlVpNGp7GapRrzDOrjHFumSHud7Sv7Fa3dtGzegvQmuXC5PwQWmHI5-wsP-MNRLIIPdYe44Fe2FQPkU4-ZaFuuqrb6RhXWYtQti2FyktQ7l516rcYb7k2sjJSMz_UVCuyoceqncqL4cT4ArW_LEtLk2TIpq-s3_-01jRXIZ59ZX7F5KkyGfOKePtG4Pgfv7EGKwUgJfVcbB0WZLIBq7NiD6QY-5tw1_lIMSD-nCOcpBGp-9dnxG80CEtCcpmlFMWCNB5Yis82G5J6_z4dxeOHwTOJE3I-UJMY8RMxmmYT1hZ0m_5No6UVhRk0QTGt0BUuF5aoCuGFCgByKiWVFpUcydxdRxjckLiXwjzpqZCOsZCZSsBD7YwAbBtKSZrIHSDIOKcQhWrLYQpbUO5wWouo5xiecCMR7UJ15pdAFKzlWDyjH6joBV0ZoCuD3JVBZsFdOJmrDHPKjp-ET-fO_l1670_S-7CMxenxrgGlB1AajybyUEGYMT8qeuc7Nnry4g | 
    
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Performance+Evaluation+of+AES%2C+ECC+and+Logistic+Chaotic+Map+Algorithms+in+Image+Encryption&rft.jtitle=International+journal+of+interactive+mobile+technologies&rft.au=Farah+Tawfiq+Abdul+Hussien&rft.au=Teaba+Wala+Aldeen+Khairi&rft.date=2023-05-22&rft.issn=1865-7923&rft.eissn=1865-7923&rft.volume=17&rft.issue=10&rft.spage=193&rft.epage=211&rft_id=info:doi/10.3991%2Fijim.v17i10.38787&rft.externalDBID=n%2Fa&rft.externalDocID=10_3991_ijim_v17i10_38787 | 
    
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1865-7923&client=summon | 
    
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1865-7923&client=summon | 
    
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1865-7923&client=summon |