Elliptic Curve Blended Cross Chaos Based Secure Image Communication
Sujarani Rajendran1, S Abilashaa2, Manivannan Doraipandian3

1Sujarani Rajendran, Department of Computer Science and Engineering, Srinivasa Ramanujan Centre, SASTRA Deemed University, Kumbakonam ,Tamilnadu, India.
2S. Abilashaa, Department of Computer Science and Engineering, Srinivasa Ramanujan Centre, SASTRA Deemed University, Kumbakonam. (Tamil Nadu), India.
3Manivannan Doraipandian, School of Computing, SASTRA Deemed University, Thanjavur , Tamilnadu, India.

Manuscript received on 03 August 2019. | Revised Manuscript received on 10 August 2019. | Manuscript published on 30 September 2019. | PP: 4481-4484 | Volume-8 Issue-3 September 2019 | Retrieval Number: C6807098319/2019©BEIESP | DOI: 10.35940/ijrte.C6807.098319
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Image encryption has proven a successful method to communicate the confidential information. Some of the images may or may not be confidential. So there is a need to secure the confidential images. Initially, symmetric encryption is used for security purpose. But it has the problem that if the key is revealed the interceptors can immediately decode it. To make the key transformation more secure, asymmetric encryption is introduced. In this two different keys are used for encoding and decoding. So even the interceptors hacked the key it cannot be possible to decode. In this project Elliptic Curve Cryptography (ECC) is utilized for generating the keys and the cross chaotic map used for generating the chaotic sequence. These chaotic sequences are utilized to encode the image for secure communication.
Keywords— Chaotic , ECC, Encryption, Image Security.

Scope of the Article:
Image Security