Skip to main content

ECC Image Encryption Using Matlab Simulink Blockset

  • Conference paper
  • First Online:
Digital Technologies and Applications (ICDTA 2021)

Abstract

To implement hardware operations on various Xilinx FPGAs, we provide a method of software simulation, providing models (set of Simulink blocks) and presenting the concept of software simulation using Matleb Simulink for processing and encryption of images.

This work presents an efficient architecture of various image algorithms, en-cryption, decryption and Keys generate using an elliptic curve, for all kinds of color and grayscale images with a minimum number of generator blocks possible. Example and illustration of these architecture implemented were presented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory

    Google Scholar 

  2. Chillali S, Oughdir L (2019) A diagram of confidentiality of information during a traffic offence. AIP Conf Proc 2074:020028

    Article  Google Scholar 

  3. Zeriouh M, Chillali A, Boua A (2019) Cryptography based on the matrices. Bol Soc Paran Mat 37(3):75–83

    Article  MathSciNet  Google Scholar 

  4. Boulbot A, Chillali A, Mouhib A (2020) Elliptic curves over the ring R. Bol Soc Paran Mat 38(3):193–201

    Article  MathSciNet  Google Scholar 

  5. Hua ZY, Zhou YC, Pun CM, Chen CLP (2015) 2D sine logistic modulation map for image encryption. Inf Sci 297:80–94

    Google Scholar 

  6. Zhang Y (2018) The unified image encryption algorithm based on chaos and cubic. S-Box Inf Sci 450:361–377

    Article  MathSciNet  Google Scholar 

  7. Zhang L, Zhang F (2009) A new certificate less aggregate signature scheme. Comput Commun 32(6):1079–1085

    Article  MathSciNet  Google Scholar 

  8. Xiong H, Guan Z, Chen Z, Li F (2014) An efficient certificate less aggregate signature with constant pairing computation. Inform Sci 219:225–235

    Article  Google Scholar 

  9. He D, Chen J, Zhang R (2012) An efficient and provably-secure certificate less signature scheme without bilinear pairings. Int J Commun Syst 25:1432–1442

    Article  Google Scholar 

  10. Karati A, Islam SKH, Biswas GP (2018) A pairing-free and provably secure certificate less signature scheme. Inf Sci 450:378–391 (2018)

    Google Scholar 

  11. Essaid M, Akharraz I, Saaidi A, Mouhib A (2019) Image encryption scheme based on a new secure variant of Hill cipher and 1D chaotic maps. J Inf Secur Appl 47:173–187

    Google Scholar 

Download references

Acknowledgments

The authors thank the reviewers and everyone who contributed to this work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sara Chillali .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chillali, S., Oughdir, L. (2021). ECC Image Encryption Using Matlab Simulink Blockset. In: Motahhir, S., Bossoufi, B. (eds) Digital Technologies and Applications. ICDTA 2021. Lecture Notes in Networks and Systems, vol 211. Springer, Cham. https://doi.org/10.1007/978-3-030-73882-2_76

Download citation

Publish with us

Policies and ethics