Advanced Image Encryption: Utilizing SHA-256 Empowered ECC and LFT Approach for Enhancing Image Security


Authors : Surekha Samsani; Deepti Asi

Volume/Issue : Volume 10 - 2025, Issue 8 - August


Google Scholar : https://tinyurl.com/y9vjap6c

Scribd : https://tinyurl.com/57ye7pws

DOI : https://doi.org/10.38124/ijisrt/25aug864

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.

Note : Google Scholar may take 30 to 40 days to display the article.


Abstract : The proliferation of picture use across several sectors is directly attributable to the exponential growth of digital technology. Confidential data transfer over networks is becoming commonplace. Images privacy so becomes extremely important, and they must be shielded from any illegal user access. In order to provide a highly secure and resilient method of picture encryption, this study introduces a hybrid approach that combines SHA-256 with ECC and LFT. An ECC private key is derived from a SHA-256 hash of the image filename, which seeds pseudo-random generators for all cryptographic elements. The image undergoes LFT-based transformation for nonlinearity, followed by S-box substitution and XOR-based diffusion using ECC-derived values. Essential metadata is stored for accurate decryption and integrity verification. Security is evaluated through metrics like Information Entropy, Correlation Coefficient assessment, PSNR, UACI and NPCR and SAC,BIC confirming that the method significantly strengthens Encryption Against different Attacks.

Keywords : Image Encryption, Secure Hash Algorithm (SHA), Elliptic Curve (EC), Linear Fractional Transformation (LFT), Substitution Box (S-Box).

References :

  1. Sajjad Shaukat jamal, Zaid Bassfar, Ouafae Lahlou, Amer Aliaedi and Mohammad Mazyad Hazzazi, “Image Encryption based on Elliptic Curve point and Linear Fractional Transformation”, IEE access, vol. 12, 2024, doi:01.
  2. H.U.Rehman, M.M.Hazzazi, T.Shah, A.Aljaedi, and Z.Bassfar, ‘‘Color image encryption by piecewise function and elliptic curve over the Galois field GF(2n),’’ AIMS Math., vol. 9, no. 3, pp. 5722–5745, 2024,doi:02.
  3. M. I. Haider, T. Shah, A. Ali, D. Shah, and I. Khalid, ‘‘An innovative approach towards image encryption by using novel PRNs and S- boxes modeling techniques,’’ Math. Comput. Simul., vol. 209, pp. 153–168, Jul. 2023, doi:03.
  4. RadhaKrishna M, Sridevi KS, Sowmya BS, Susmita TJ, “Digital Image Encryption and Decryption based on RSA Algorithm”, Int. J. Sci. Res. Sci. Eng. Technol., vol. 9, no. 4, pp. 168–173, Jul.–Aug. 2022, doi:04.
  5. Y. Xian and X. Wang, ‘‘Fractal sorting matrix and its application on chaotic image encryption,’’ Inf. Sci., vol. 547, pp. 1154–1169, Feb. 2021, doi:05.
  6. Ibrahim and A. M. Abbas, ‘‘Efficient key-dependent dynamic S-boxes based on permutated elliptic curves,’’ Inf. Sci., vol. 558,pp. 246–264, May 2021, doi:06.
  7. A. A. El-Latif, B.Abd-El-Atty, M.Amin, and A.M.Iliyasu, ‘‘Quantum inspired cascaded discrete-time quantum walks with induced chaotic dynamics and cryptographic applications,’’ Sci. Rep., vol. 10, no. 1, pp. 1–16,Feb. 2020, doi:07.
  8. M. I. Haider, A. Ali, D. Shah, and T. Shah, ‘‘Block Cipher’s nonlinear component design by elliptic curves, An image encryption application,’’ Multimedia Tools Appl., vol. 1, pp. 1–26, Jan. 2020, doi:08.
  9. A. H. Zahid, E. Al-Solami, and M. Ahmad, ‘‘A novel modular approach based substitution-box design for image encryption,’’ IEEE Access, vol. 8, pp. 150326–150340, 2020,doi:09.
  10. Q. Lu, C. Zhu, and X. Deng, ‘‘An efficient image encryption scheme based on the LSS chaotic map and single S-box,’’ IEEE Access, vol. 8, pp. 25664–25678, 2020, doi:10.
  11. Y. Lu, K. Yu, and X. Lv, ‘‘Image encryption with one-time password mechanism and pseudo-features,’’ Multimedia Tools Appl., vol. 80, no. 10, pp. 15041–15055, Apr. 2021,doi:11.
  12. A. K. Volos, I. M. Kyprianidis, and I. N. Stouboulos, ‘‘Image encryption process based on chaotic synchronization phenomena,’’ Signal Process., vol. 93, no. 5, pp. 1328–1340, May2013, doi:12.
  13. Q. Liu and L. Liu, ‘‘Color image encryption algorithm based on DNA coding and double chaos system,’’ IEEE Access, vol. 8, pp. 83596–83610, 2020, doi:13.
  14. Wang and Y. Li, ‘‘Chaotic image encryption algorithm based on hybrid multi- objective particle swarm optimization and DNA sequence,’’ Opt. Lasers Eng., vol. 137, Feb. 2021, Art. no. 106393, doi:14.
  15. Z. E. Dawahdeh, S. N. Yaakob, and R.B. Othman, ‘‘A new image encryption technique combining elliptic curve cryptosystem with Hill cipher,’’ J. King Saud Univ. Comput. Inf. Sci., vol. 30, no. 3, pp. 349–355, Jul. 2018, doi:15.
  16. J. Wu, X. Liao, and B. Yang, ‘‘Color image encryption based on chaotic systems and elliptic curve ElGamal scheme,’’ Signal Process., vol. 141, pp. 109–124, Dec. 2017, doi:16.
  17. S. Toughi, M. H. Fathi, and Y. A. Sekhavat, ‘‘An image encryption scheme based on elliptic curve pseudo random and advanced encryption system,’’ Signal Process., vol. 141,pp. 217–227, Dec. 2017, doi:17.
  18. Amnah Firdous, Aqeel Ur Rehman, and Malik Muhammad Saad Missen, “A Gray Image encryption using of water waves, chaos and hash Function”, IEEE Access, vol. 9, pp. 11675– 11693, Jan. 2021, doi: 18.
  19. D. S. Laiphrakpam, R. Thingbaijam, K.M. Singh, and M. Alawida, “Encrypting multiple images with an enhanced chaotic map,” IEEE Access, vol. 10, pp. 87844–87859, Aug. 2022,doi: 19.
  20. Wei, L. Guo, Q. Zhang, J. Zhang, and R  Lian, ‘‘A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system,’’ J. Syst. Softw., vol. 85, no. 2, pp. 290–299, Feb. 2012, doi:20.
  21. M. Ramzan, T. Shah, M. M. Hazzazi, A. Aljaedi, and A. R. Alharbi, ‘‘Construction of S- boxes using different maps over elliptic curves for image encryption,’’ IEEE Access, vol. 9, pp. 157106–157123, 2021, doi:21.

The proliferation of picture use across several sectors is directly attributable to the exponential growth of digital technology. Confidential data transfer over networks is becoming commonplace. Images privacy so becomes extremely important, and they must be shielded from any illegal user access. In order to provide a highly secure and resilient method of picture encryption, this study introduces a hybrid approach that combines SHA-256 with ECC and LFT. An ECC private key is derived from a SHA-256 hash of the image filename, which seeds pseudo-random generators for all cryptographic elements. The image undergoes LFT-based transformation for nonlinearity, followed by S-box substitution and XOR-based diffusion using ECC-derived values. Essential metadata is stored for accurate decryption and integrity verification. Security is evaluated through metrics like Information Entropy, Correlation Coefficient assessment, PSNR, UACI and NPCR and SAC,BIC confirming that the method significantly strengthens Encryption Against different Attacks.

Keywords : Image Encryption, Secure Hash Algorithm (SHA), Elliptic Curve (EC), Linear Fractional Transformation (LFT), Substitution Box (S-Box).

CALL FOR PAPERS


Paper Submission Last Date
30 - November - 2025

Video Explanation for Published paper

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe