Mapping Etat de L'art
Mapping Etat de L'art
                                                                                                                                                              Abstract— The emergence of Elliptic curve cryptography as                    attention of researchers and other vendors of information
                                                                                                                                                          a preferred cryptographic scheme using minimal                                   security. Researchers claim that among the top 100 websites
                                                                                                                                                          computational resources is quite discernible. Its extension to                   at least 63 are using some form of ECC [5]. Application of
                                                                                                                                                          the domain of image encryption using various mapping                             Elliptical curves in cryptography was first proposed by
                                                                                                                                                          techniques has been analyzed in this paper. The efficiency of an                 Miller and Koblitz in 1985 [6]. In their work they proposed a
                                                                                                                                                          encryption scheme based on ECC shall depend upon the                             key exchange technique using ECC that’s much faster than
2021 6th International Conference for Convergence in Technology (I2CT) | 978-1-7281-8876-8/21/$31.00 ©2021 IEEE | DOI: 10.1109/I2CT51068.2021.9417892
                                                                                                                                                          appropriateness of mapping technique used to map pixels onto                     its discrete logarithmic counterpart the Deffie-Hellman key
                                                                                                                                                          the Elliptic curve. Parameters like cost efficiency,
                                                                                                                                                                                                                                           exchange and also more resistant to attacks. After its wide
                                                                                                                                                          Completeness, inversibility, and bandwidth used must be taken
                                                                                                                                                                                                                                           use since 2005 ECC has become one of the most powerful
                                                                                                                                                          into consideration before designing any such mapping
                                                                                                                                                          technique.
                                                                                                                                                                                                                                           and efficient public key cryptosystems used for key
                                                                                                                                                                                                                                           exchange (ECDSA) as well as encryption. The popularity of
                                                                                                                                                              Keywords—Image Encryption Techniques; Image security;                        ECC can be attributed to following factors:
                                                                                                                                                          Elliptical Curve Cryptography; Image Encryption Using ECC.                            1.    It uses smaller key size (160 bits) than other public
                                                                                                                                                                                    I.    INTRODUCTION                                                cryptosystems like RSA (1024 bits) and still
                                                                                                                                                                                                                                                      provides similar security.
                                                                                                                                                              Generation, processing and exchange of multimedia                                 2.    Security strength due to computational complexity
                                                                                                                                                          content has increased rapidly due to rapid increase in                                      of exponentially hard elliptical curve discrete
                                                                                                                                                          processing power, bandwidth, efficient multimedia
                                                                                                                                                                                                                                                      logarithmic problem [Stallings].
                                                                                                                                                          processing and storage capacity of current devices. Internet,
                                                                                                                                                                                                                                                3.    Lesser number of computations needed makes its
                                                                                                                                                          social media produces massive image data. When this data is
                                                                                                                                                          shared over insecure networks, it is vulnerable to different                                use feasible for resource constrained scenarios like
                                                                                                                                                          kinds of attacks. Attacks on images vary from unauthorized                                  WSN, and complex data types like images.
                                                                                                                                                          access, unintended or intended modification, violation of                             4.    It can be used to provide authentication using
                                                                                                                                                          copyright and other privacy concerns. So, security methods                                  Elliptic curve digital signature algorithm (ECDSA)
                                                                                                                                                          must be developed to protect this data. Researchers have                                    as well as data secrecy.
                                                                                                                                                          developed different approaches to ensure the protection of
                                                                                                                                                          this data; It includes steganography that hides the secret
                                                                                                                                                          information     efficiently,   Image     watermarking      for
                                                                                                                                                          authentication and verification of image sources, and last but
                                                                                                                                                          not least image encryption [1].
                                                                                                                                                              Image encryption is the technique of transforming a plain
                                                                                                                                                          image into a totally different cipher image by applying a
                                                                                                                                                          transformation function on a collection or individual pixels
                                                                                                                                                          of original image. The most commonly used cryptographic
                                                                                                                                                          techniques include classic block ciphers like DES, AES etc.
                                                                                                                                                          [2], Pseudo random number generators like chaotic maps
                                                                                                                                                          etc., hash functions like SHA-256 etc., and Public
                                                                                                                                                          cryptosystems like RSA etc. [3][4].
                                                                                                                                                              While most of the conventional cryptosystems perform
                                                                                                                                                          well on simpler data forms like text, their computational                        Fig. 1. Comparison between RSA and ECC in terms of key size and time
                                                                                                                                                          complexity increases when applied to images. This can be                               efficiency [7]
                                                                                                                                                          attributed to high data redundancy, large size, correlation
                                                                                                                                                          between neighboring pixels and multi-dimensional data                                       II.    ELLIPTIC CURVE CRYPTOGRAPHY
                                                                                                                                                          usually present in images. Moreover, these algorithms don’t                          An Elliptic curve unlike the name suggests are not
                                                                                                                                                          consider issues like human visual perception properties,                         ellipses but are topologically more like Tori defined by a
                                                                                                                                                          codec compliance etc. Therefore, all these properties must be                    cubic equation in 2 variables:
                                                                                                                                                          taken care of while designing a security model for images.
                                                                                                                                                                                                                                                             Y2=x3+ax+b                                           (1)
                                                                                                                                                              In recent years a comparatively newer encryption
                                                                                                                                                          technique, Elliptical curve cryptography (ECC) is gaining
                                                                                                                                                                 Authorized licensed use limited to: San Francisco State Univ. Downloaded on June 24,2021 at 17:35:03 UTC from IEEE Xplore. Restrictions apply.
    The above equation also known as normalized                                            A(xa, ya)-B(xb,yb)= A(xa,ya)+B(xb,-yb)                       (8)
weierstrass equation is used for cryptography. The values of
coefficients and variables are restricted to elements of a finite                    (Note that the Abelian groups over which elliptical
field. Usually two types of curves are used for cryptographic                    curves are defined have closure over addition and
purposes                                                                         multiplication) i.e. for any binary operation *, if A, B belong
                                                                                 to group then C=A*B also is in the group.
A. Elliptical curve defined over prime field Fp
   The domain parameters for Elliptical curve over Fp are:                           Geometrically it can be achieved by drawing a tangent on
prime number p, coefficients a and b, generator point G on                       curve through A, and the mirror image on y-axis of the
curve, the smallest possible integer n known as order of G                       intersection point of this tangent on curve is double of A.
such that for cyclic group nG=O ; where O is known as zero
point or point at infinity.
B. Elliptical curve defined over binary field F2m:
      Authorized licensed use limited to: San Francisco State Univ. Downloaded on June 24,2021 at 17:35:03 UTC from IEEE Xplore. Restrictions apply.
   The receiver selects nB a random integer as its private key                      encryption, it uses a simpler transformation method instead
and public key PB=nBG.                                                              [17].
   Both sender and receiver share their public keys with                                       V.     IMAGE TO ECC MAPPING TECHNIQUES
each other.
                                                                                        In section III we saw that ECC encrypts any message in
      The Encrypted message CM is a pair of points on curve                         terms of points on curve. Therefore, in order to apply ECC
as:                                                                                 for encryption on image we must first map the image to
                                                                                    some points on elliptical curve. For this we must have a
                         CM ={nAG, AM+nAPB}                              (12)
                                                                                    transformation/mapping technique that can map pixel values
   At Decryption end the receiver multiplies its private key                        to points on curve before encryption and back to pixels after
with first point i.e. nBnAG and recovers encrypted point by                         decryption. Before designing a mapping, technique following
subtracting it from 2nd point of CM i.e.                                            criteria should be taken into consideration:
                      AM= [AM+nAPB-nAnBG]                                (13)           i)    Mapping should be time, cost efficient and easy to
      (note: all binary operations are done as discussed earlier)
                                                                                              implement.
                                                                                        ii)    Every message should be mapped to a point on
                    IV.      ECC IN IMAGE ENCRYPTION                                          curve i.e. AM=(xM,yM) Є Ep(a,b); where m is the
    ECC is being used extensively used to encrypt images to                                   message/pixel.
attain better security using smaller key size and hence lesser
computations. Researchers have used ECC in different forms                              iii) It should be invertible, such that original
to attain image security goals like:                                                         image/message can be reverse mapped from
                                                                                             decrypted points at receiver end.
      x      ECDH to exchange secret key that can be used for
                                                                                        iv) It should be secure against frequency/Correlation
             further encryption of image.[8][9]
                                                                                            analysis on cipher image. E.g. if pixels with same
      x      Use ECC as pseudo-random number generator to                                   intensity values are mapped to same point on curve,
             generate random numbers to be used in encryption or                            attacks based on correlation are possible.
             as seed to chaotic systems etc.
                                                                                        v) It should use minimum possible number of bits to
      x      Using ECC cryptosystem (ECIS) to encrypt images.                              map a pixel value for optimal bandwidth utilization.
      x      Elliptic curve based signature schemes (ECDSA) for                         Researchers have used many techniques for mapping an
             authentication and verification.[10][11]                               image to points on elliptic curve. Some of these techniques
                                                                                    have been directly adapted from techniques of mapping text
    Gupta and Silakari proposed a hybrid encryption                                 (alphabets and symbols) to ECC mapping. Methods are
technique that uses sequences of 2D cat map and 2D                                  devised particularly for images. In this section we will
standard chaotic maps to achieve good confusion and                                 review many such mapping methods and try to identify their
diffusion properties [9]. The session key used in encryption                        pros and cons.
is exchanged securely by encrypting it using ECC. This
technique is time efficient and sufficiently secure. Ponmani
and others first compresses an image using DWT and then
encrypts it using ECC [12]. Gobi and Kannan use ECC and
hyper-ECC to encrypt biometric images like fingerprints etc
[13]. They keys used are generated from the biometric
templates given. Yadav and others use Binary group Elliptic
curves, where pixels of image are encoded into points on
curve in terms of exponents of generator point [14].
Encryption is then preformed on the encoded points. Singh
and Singh Use a Combination of Logistic chaotic system and
elliptic curve over finite field are used to generate a chaotic
sequence xn+1 = μxn(1 − xn). It uses ECDHKE to share a
secret point p(x,y) that’s used as seed for chaotic sequence
[8].Zhao and Zhang proposed a encryption technique that
encodes binary value of pixels into sequence of four
characters A,B,C,D as 00=A,01=B,10=C,11=D. Specific
operations of addition and subtraction are defined for codes
[15]. An image is converted into a matrix of codes which are
then further processed along with encoded key matrix to get
an encrypted image. This technique is easy to implement yet
efficient. The key used for encrypting and decrypting is
shared using ECC. Nagaraj and others also propose an ECC
based image encryption algorithm [16], where images are
processed in 8*8 blocks, these blocks are transformed into
curve points using a predefined magic matrix before
encryption. Laiphrakpam et. al. tries to increase computation
speed by eliminating the image to ECC encoding step before                          Flowchart 1: Image Encryption Using ECC
          Authorized licensed use limited to: San Francisco State Univ. Downloaded on June 24,2021 at 17:35:03 UTC from IEEE Xplore. Restrictions apply.
A. Method 1: Generator point based mapping[11]:                                  mapped to same point on curve. And while encrypting these
   Generator point based mapping is one of the simplest                          points the cipher text will be same, this will lead to high
ways of mapping an image onto Elliptic curve. It’s directly                      correlation between these pixels in cipher image. One more
adapted from mapping text to ECC.                                                drawback of this technique is that in (ii), it’s not possible to
                                                                                 find integer ym for all values of m and all such pixels remain
    This method proceeds as follows: Select an Elliptic curve                    un-mapped.
Ep(a,b); Choose a generator point G; For every pixel P with
intensity value I corresponding point on curve is given by                       D. Method 4:Binary grouping [20]
Pm= G*I. e.g if I=127, Pm=127*G.                                                     This technique is a modified version of method 2. Instead
                                                                                 of mapping intensities directly to ECC, grouped intensities
    A major advantage of this method lies in its simplicity                      are taken. Firstly, all possible points on the given curve Ep
and ease of implementation. It is a preferred choice in cases                    (a, b) are generated (ECC data table) and indexed from 0
where computational time is more crucial than security                           onwards. A grey scale image of size m*n is taken, The
efficiency. As it can be seen that this is a one to one mapping                  Binary values of successive pixels are taken and grouped in
technique, i.e. pixels with same intensities will always be                      N-bit groups where N=floor (Log2(#EP(a,b)), #Ep(a,b) is total
mapped to the same point. Therefore, the cipher image will                       number of points on the curve. Each group is then mapped to
reflect the pixel correlation similar to original image, and is                  the point in ECC Data table whose index value is same as
prone to frequency, histogram analysis attacks, Known                            decimal value of the group. Encryption is done on the
Plaintext, chosen cipher text attacks.                                           mapped pixel points, and at decryption process reverse
B. Method 2: Using pixel Intensity/points map table[7]                           mapping is done to retrieve back the original image.
    This method maps pixels of a 256bit grayscale image                              Unlike method 2, the binary groups with same intensity
onto curve. It first generates all the possible points on the                    values will be mapped to same point on curve. If size of
curve, distributes these points into 256 groups sequentially.                    image is huge and order of curve #Ep(a,b) is not large
Each group has N/256 points where N is total no. of points                       enough then the overlapping will be increased. Even though
on curve. The rows of mapping table are marked from 0 to                         this method is not prone to direct frequency analysis of
255(referring to intensities of 0-255) and the points from the                   pixels values, but analysis of binary groups is possible as the
groups are filled in. Then first pixel of image is taken and                     order of Ep(a,b) and hence value of N is publicly known.
mapped to point in table from row with same intensity, first
column.(e.g. if intensity is 234, the point is mapped to first                   E. Method 5: Pixel grouping [10][21]:
column entry of row 234) and if a second pixel of same                              This technique maps an image onto Elliptic curve without
intensity is scanned it will be mapped to 2nd column of same                     need of any mapping table. It proceeds as follows:
row. Once first column of all 256 rows are mapped, we
proceed to start over in next column. the mapping table                             i)   Groups pixels of image sequentially and calculates a
created is then encrypted using ECC.                                                     single large integer from this group. The number of
                                                                                         pixels to be grouped depends upon bit length of
    This technique maps pixels with same intensity values to                             curve parameter p and number of bits used to
different points on ECC, therefore is not directly prone to                              represent pixel intensities. (Larger the value of p,
frequency analysis. It is reversible and time efficient.                                 larger number of pixels grouped)
However to view the cipher text as image we need mapping
table , also at the decryption end the mapping table is needed                      ii) These large integers are then paired up and
to retrieve original image from the decrypted points.                                   encrypted as points using ECC encryption.
Therefore the secrecy of mapping table is crucial. Also to                           Singh and Singh performed Grouping of pixels into one
map a color image (e.g. RGB) with more than one intensity                        big integer and back using functions FromDigits,
values at a pixel the mapping complexity will increase.                          IntegerDigits of Mathematica software [10]. Zhang and
                                                                                 Wang also adapt a similar mapping technique in their
C. Method 3:koblitz method [18][19]
                                                                                 encryption system [21]. They use PWLCM and ECC to
   This technique maps any integer m(intensity value) to a                       achieve secure image encryption. The pixels of original
point (xm,ym) on elliptic curve Ep(a,b) as:                                      image are grouped in large integers, likewise the chaotic
                      xm=(m*k+j)mod p                                 (i)        sequence generated using PWLCM are also grouped into big
                                                                                 integers. Encryption is achieved by XORing these big
   Where j=0,1,2,..M and k is a random positive integer pre-                     integers along with the public key of receiver that was
decided between sender and receiver such that m*k<p.                             exchanged using ECKE.
                ym=sqrt(x^3+ax+b)mod p                                (ii)           An advantage of this mapping technique is that instead of
    If ym in (ii) corresponding to xm is an integer then (xm,ym)                 processing/encrypting individual pixels it takes groups,
is mapped to m, else we keep on checking until j=k-1. If no                      hence reducing the overall number of encryptions and
integer value for ym is found in this interval then the point is                 decryptions. This technique can be easily adapted for Color,
not found with the specified value of k.                                         multidimensional images. However, this method treats every
                                                                                 pair of large integers formed as a point on the elliptic curve
   The original message m can be recovered as:                                   which may be false for many pairs. Therefore, a proper
                                                                                 conversion of these big integers to points on curve must be
          m=floor(xm/k)                                              (iii)
                                                                                 followed to make encryption and decryption feasible. As
    The advantage of this technique lies in its simplicity and                   discussed in section III encryption and decryption in elliptic
computational efficiency but if the curve parameter p is not                     curve include point addition, doubling and multiplication. If
sufficiently large then more than one pixel points will be                       the size of points is very large, the time taken for these
                                                                                 individual operations is large as number of atomic operations
     Authorized licensed use limited to: San Francisco State Univ. Downloaded on June 24,2021 at 17:35:03 UTC from IEEE Xplore. Restrictions apply.
(addition/mul./xor etc.) involved in individual point                                                           REFERENCES
encryptions increase. As the size of integers is very large as                   [1]    Zhou, X., Duan, X., & Wang, D. (2004, January). A semifragile
compared to individual pixels, the time taken by individual                             watermark scheme for image authentication. In 10th International
point encryptions is highly increased as compared to other                              Multimedia Modelling Conference, 2004. Proceedings. (pp. 374-377).
techniques discussed so far.                                                            IEEE.
                                                                                 [2]    Zeghid, M., Machhout, M., Khriji, L., Baganne, A., & Tourki, R.
                                                                                        (2007). A modified AES based algorithm for image
       TABLE I.        DIFFERENT IMAGE TO ECC MAPPING                                   encryption. International Journal of Computer Science and
                           TECHNIQUES.
                                                                                        Engineering, 1(1), 70-75.
  Mapping                                                                        [3]    Sun, Q., Chang, S. F., Maeno, K., & Suto, M. (2002, May). A new
                         Advantages                 Disadvantages                       semi-fragile image authentication framework combining ECC and
  Technique
                                                  Prone to frequency,                   PKI infrastructures. In 2002 IEEE International Symposium on
                                                                                        Circuits and Systems. Proceedings (Cat. No. 02CH37353) (Vol. 2, pp.
                                                   histogram analysis
   Generator        Simplicity and ease of                                              II-II). IEEE.
                                               attacks, Known Plaintext,         [4]    Gong, Lihua, et al. "An optical image compression and encryption
  Point Based         implementation.
   Mapping             Time Efficient              chosen cipher text                   scheme based on compressive sensing and RSA algorithm." Optics
                                                         attacks.                       and Lasers in Engineering 121 (2019): 169-180.
                                                                                 [5]    Harkanson, R., & Kim, Y. (2017, April). Applications of elliptic
                     Low Computational          Mapping Table must be                   curve cryptography: A light introduction to elliptic curves and a
      Pixel           Complexity (for           available at both sender                survey of their applications. In Proceedings of the 12th Annual
 Intensity/Point     grayscale images).            and receiver end.                    Conference on Cyber and Information Security Research (pp. 1-7).
  s Map Table         No overlapping.              Extension to color            [6]    Miller, V. S. (1985, August). Use of elliptic curves in cryptography.
                                               images may get complex.                  In Conference on the theory and application of cryptographic
                                                                                        techniques (pp. 417-426). Springer, Berlin, Heidelberg.
                                                P must be large enough
                                                                                 [7]    Soleymani, A., Nordin, M. J., Hoshyar, A. N., Ali, Z. M., &
    Koblitz            Simplicity and            to avoid overlapping.
                                                                                        Sundararajan, E. (2013). An image encryption scheme based on
    Method         computational efficiency     Doesn’t necessarily map
                                                                                        elliptic curve and a novel mapping method. International Journal of
                                                 all pixels onto curve.
                                                                                        Digital Content Technology and its Applications, 7(13), 85.
                                                  Frequency analysis of          [8]    Singh, L. D., & Singh, K. M. (2018). Visually meaningful multi-
                                                binary groups is possible               image encryption scheme. Arabian Journal for Science and
                     Low computational                                                  Engineering, 43(12), 7397-7407.
    Binary                                        as the order of Ep(a,b)
                        complexity.                                              [9]    Gupta, K., &Silakari, S. (2011). Efficient hybrid image cryptosystem
   Grouping                                      and hence value of N is
                    Low time complexity.                                                using ECC and chaotic map. Int. J. Comput. Appl, 29(3), 1-13.
                                                     publicly known.
                                                                                 [10]   Singh, L. D., & Singh, K. M. (2015). Image encryption using elliptic
                                                                                        curve cryptography. Procedia Computer Science, 54, 472-481.
                        Reduced number of                                        [11]   Reyad, O. (2018). Text message encoding based on elliptic curve
                                                All Integer pairs must lie              cryptography and a mapping methodology. Inf. Sci. Lett, 7(1), 7-11.
                        encryptions/decrypt
                                                        on Curve.                [12]   Ponmani, E., Nandhini, E., Karthika, K., & Saravanan, P. (2018).
Pixel Grouping                 ions.
                                                  Computation cost of                   Secured Transmission of a compressed image by using
  Technique                No mapping
                                                 individual encryptions                 ECC. International       Journal      of     Pure     and      Applied
                            Technique
                                                and decryptions is large.               Mathematics, 119(12), 13387-13396.
                             involved.
                                                                                 [13]   Gobi, M., & Kannan, D. (2015). A secured public key cryptosystem
                                                                                        for biometric encryption. International Journal of Computer Science
                         VI.     CONCLUSION                                             and Network Security, 15(1), 49-57.
                                                                                 [14]   Yadav, V. K., Malviya, A. K., Gupta, D. L., Singh, S., & Chandra, G.
    ECC is an efficient public key cryptosystem that can be                             (2012). Public key cryptosystem technique elliptic curve
used to achieve data integrity, authenticity, and secure key                            cryptography with generator g for image encryption. Int. J. Comput.
exchange. It attains security using smaller keys as compared                            Technol. Appl, 3(1), 298-302.
to its counterparts. In this paper we discussed prospects of                     [15]   Zhao, Z., & Zhang, X. (2013). ECC-based image encryption using
ECC in image security. ECC can be used to secure image                                  code computing. In Proceedings of the 2012 International Conference
                                                                                        on Communication, Electronics and Automation Engineering (pp.
data in various application scenarios such as unattended                                859-865). Springer, Berlin, Heidelberg.
monitoring devices like drones, sensors, CCTV cameras.                           [16]   Nagaraj, S., Raju, G. S. V. P., & Rao, K. K. (2015). Image encryption
Although its computationally cheaper than other PKEs,                                   using elliptic curve cryptograhy and matrix. Procedia Computer
Using ECC cryptosystem for image encryption in resource                                 Science, 48, 276-281.
constrained environments is computationally inefficient.                         [17]   Laiphrakpam, D. S., & Khumanthem, M. S. (2017). Medical image
                                                                                        encryption      based      on    improved       ElGamal     encryption
Therefore, we must optimize it by using efficient mapping                               technique. Optik, 147, 88-102.
techniques. To use ECC for image encryption, an image                            [18]   Tawalbeh, L. A., Mowafi, M., &Aljoby, W. (2013). Use of elliptic
must be mapped onto the curve. This mapping is very crucial                             curve cryptography for multimedia encryption. IET Information
and has an impact on the security strength of the overall                               Security, 7(2), 67-74.
                                                                                 [19]   Gupta, K., Silakari, S., Gupta, R., & Khan, S. A. (2009, July). An
encryption process. Hence before using any mapping                                      ethical way of image encryption using ECC. In 2009 First
technique one must consider its security implications. In this                          International     Conference     on      Computational    Intelligence,
paper we discussed various parameters like completeness of                              Communication Systems and Networks (pp. 342-345). IEEE.
mapping, reversibility, bandwidth/ number of bits used, time                     [20]   Soleymani, A., Nordin, M. J., Ali, Z. M., &Golafshan, L. (2013,
and cost efficiency that determine efficiency of a mapping                              November). A binary grouping approach for image encryption based
                                                                                        on elliptic curves over prime group field. In 2013 IEEE 11th Malaysia
technique. We also reviewed various mapping techniques                                  International Conference on Communications (MICC) (pp. 373-378).
used so far in literature. We analyze these approaches for                              IEEE.
security and efficiency.                                                         [21]    Zhang, X., & Wang, X. (2018). Digital image encryption algorithm
                                                                                        based on elliptic curve public cryptosystem. IEEE Access, 6, 70025-
                                                                                        70034.
Authorized licensed use limited to: San Francisco State Univ. Downloaded on June 24,2021 at 17:35:03 UTC from IEEE Xplore. Restrictions apply.