Authors :
Surekha Samsani; Deepti Asi
Volume/Issue :
Volume 10 - 2025, Issue 8 - August
Google Scholar :
https://tinyurl.com/y9vjap6c
Scribd :
https://tinyurl.com/57ye7pws
DOI :
https://doi.org/10.38124/ijisrt/25aug864
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Note : Google Scholar may take 30 to 40 days to display the article.
Abstract :
The proliferation of picture use across several sectors is directly attributable to the exponential growth of digital
technology. Confidential data transfer over networks is becoming commonplace. Images privacy so becomes extremely
important, and they must be shielded from any illegal user access. In order to provide a highly secure and resilient method
of picture encryption, this study introduces a hybrid approach that combines SHA-256 with ECC and LFT. An ECC private
key is derived from a SHA-256 hash of the image filename, which seeds pseudo-random generators for all cryptographic
elements. The image undergoes LFT-based transformation for nonlinearity, followed by S-box substitution and XOR-based
diffusion using ECC-derived values. Essential metadata is stored for accurate decryption and integrity verification. Security
is evaluated through metrics like Information Entropy, Correlation Coefficient assessment, PSNR, UACI and NPCR and
SAC,BIC confirming that the method significantly strengthens Encryption Against different Attacks.
Keywords :
Image Encryption, Secure Hash Algorithm (SHA), Elliptic Curve (EC), Linear Fractional Transformation (LFT), Substitution Box (S-Box).
References :
- Sajjad Shaukat jamal, Zaid Bassfar, Ouafae Lahlou, Amer Aliaedi and Mohammad Mazyad Hazzazi, “Image Encryption based on Elliptic Curve point and Linear Fractional Transformation”, IEE access, vol. 12, 2024, doi:01.
- H.U.Rehman, M.M.Hazzazi, T.Shah, A.Aljaedi, and Z.Bassfar, ‘‘Color image encryption by piecewise function and elliptic curve over the Galois field GF(2n),’’ AIMS Math., vol. 9, no. 3, pp. 5722–5745, 2024,doi:02.
- M. I. Haider, T. Shah, A. Ali, D. Shah, and I. Khalid, ‘‘An innovative approach towards image encryption by using novel PRNs and S- boxes modeling techniques,’’ Math. Comput. Simul., vol. 209, pp. 153–168, Jul. 2023, doi:03.
- RadhaKrishna M, Sridevi KS, Sowmya BS, Susmita TJ, “Digital Image Encryption and Decryption based on RSA Algorithm”, Int. J. Sci. Res. Sci. Eng. Technol., vol. 9, no. 4, pp. 168–173, Jul.–Aug. 2022, doi:04.
- Y. Xian and X. Wang, ‘‘Fractal sorting matrix and its application on chaotic image encryption,’’ Inf. Sci., vol. 547, pp. 1154–1169, Feb. 2021, doi:05.
- Ibrahim and A. M. Abbas, ‘‘Efficient key-dependent dynamic S-boxes based on permutated elliptic curves,’’ Inf. Sci., vol. 558,pp. 246–264, May 2021, doi:06.
- A. A. El-Latif, B.Abd-El-Atty, M.Amin, and A.M.Iliyasu, ‘‘Quantum inspired cascaded discrete-time quantum walks with induced chaotic dynamics and cryptographic applications,’’ Sci. Rep., vol. 10, no. 1, pp. 1–16,Feb. 2020, doi:07.
- M. I. Haider, A. Ali, D. Shah, and T. Shah, ‘‘Block Cipher’s nonlinear component design by elliptic curves, An image encryption application,’’ Multimedia Tools Appl., vol. 1, pp. 1–26, Jan. 2020, doi:08.
- A. H. Zahid, E. Al-Solami, and M. Ahmad, ‘‘A novel modular approach based substitution-box design for image encryption,’’ IEEE Access, vol. 8, pp. 150326–150340, 2020,doi:09.
- Q. Lu, C. Zhu, and X. Deng, ‘‘An efficient image encryption scheme based on the LSS chaotic map and single S-box,’’ IEEE Access, vol. 8, pp. 25664–25678, 2020, doi:10.
- Y. Lu, K. Yu, and X. Lv, ‘‘Image encryption with one-time password mechanism and pseudo-features,’’ Multimedia Tools Appl., vol. 80, no. 10, pp. 15041–15055, Apr. 2021,doi:11.
- A. K. Volos, I. M. Kyprianidis, and I. N. Stouboulos, ‘‘Image encryption process based on chaotic synchronization phenomena,’’ Signal Process., vol. 93, no. 5, pp. 1328–1340, May2013, doi:12.
- Q. Liu and L. Liu, ‘‘Color image encryption algorithm based on DNA coding and double chaos system,’’ IEEE Access, vol. 8, pp. 83596–83610, 2020, doi:13.
- Wang and Y. Li, ‘‘Chaotic image encryption algorithm based on hybrid multi- objective particle swarm optimization and DNA sequence,’’ Opt. Lasers Eng., vol. 137, Feb. 2021, Art. no. 106393, doi:14.
- Z. E. Dawahdeh, S. N. Yaakob, and R.B. Othman, ‘‘A new image encryption technique combining elliptic curve cryptosystem with Hill cipher,’’ J. King Saud Univ. Comput. Inf. Sci., vol. 30, no. 3, pp. 349–355, Jul. 2018, doi:15.
- J. Wu, X. Liao, and B. Yang, ‘‘Color image encryption based on chaotic systems and elliptic curve ElGamal scheme,’’ Signal Process., vol. 141, pp. 109–124, Dec. 2017, doi:16.
- S. Toughi, M. H. Fathi, and Y. A. Sekhavat, ‘‘An image encryption scheme based on elliptic curve pseudo random and advanced encryption system,’’ Signal Process., vol. 141,pp. 217–227, Dec. 2017, doi:17.
- Amnah Firdous, Aqeel Ur Rehman, and Malik Muhammad Saad Missen, “A Gray Image encryption using of water waves, chaos and hash Function”, IEEE Access, vol. 9, pp. 11675– 11693, Jan. 2021, doi: 18.
- D. S. Laiphrakpam, R. Thingbaijam, K.M. Singh, and M. Alawida, “Encrypting multiple images with an enhanced chaotic map,” IEEE Access, vol. 10, pp. 87844–87859, Aug. 2022,doi: 19.
- Wei, L. Guo, Q. Zhang, J. Zhang, and R Lian, ‘‘A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system,’’ J. Syst. Softw., vol. 85, no. 2, pp. 290–299, Feb. 2012, doi:20.
- M. Ramzan, T. Shah, M. M. Hazzazi, A. Aljaedi, and A. R. Alharbi, ‘‘Construction of S- boxes using different maps over elliptic curves for image encryption,’’ IEEE Access, vol. 9, pp. 157106–157123, 2021, doi:21.
The proliferation of picture use across several sectors is directly attributable to the exponential growth of digital
technology. Confidential data transfer over networks is becoming commonplace. Images privacy so becomes extremely
important, and they must be shielded from any illegal user access. In order to provide a highly secure and resilient method
of picture encryption, this study introduces a hybrid approach that combines SHA-256 with ECC and LFT. An ECC private
key is derived from a SHA-256 hash of the image filename, which seeds pseudo-random generators for all cryptographic
elements. The image undergoes LFT-based transformation for nonlinearity, followed by S-box substitution and XOR-based
diffusion using ECC-derived values. Essential metadata is stored for accurate decryption and integrity verification. Security
is evaluated through metrics like Information Entropy, Correlation Coefficient assessment, PSNR, UACI and NPCR and
SAC,BIC confirming that the method significantly strengthens Encryption Against different Attacks.
Keywords :
Image Encryption, Secure Hash Algorithm (SHA), Elliptic Curve (EC), Linear Fractional Transformation (LFT), Substitution Box (S-Box).