International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 153 - Issue 11 |
Published: Nov 2016 |
Authors: Toradmalle Dhanashree, Sonigara Varsha Rakesh, Singh Kiran Premnath, Kakade Omkar Shashikant, Panigrahy Krishnachandra Gourishankar |
![]() |
Toradmalle Dhanashree, Sonigara Varsha Rakesh, Singh Kiran Premnath, Kakade Omkar Shashikant, Panigrahy Krishnachandra Gourishankar . An Approach for Security of Images over Elliptical Curve Cryptography and Digital Signature. International Journal of Computer Applications. 153, 11 (Nov 2016), 25-27. DOI=10.5120/ijca2016912203
@article{ 10.5120/ijca2016912203, author = { Toradmalle Dhanashree,Sonigara Varsha Rakesh,Singh Kiran Premnath,Kakade Omkar Shashikant,Panigrahy Krishnachandra Gourishankar }, title = { An Approach for Security of Images over Elliptical Curve Cryptography and Digital Signature }, journal = { International Journal of Computer Applications }, year = { 2016 }, volume = { 153 }, number = { 11 }, pages = { 25-27 }, doi = { 10.5120/ijca2016912203 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2016 %A Toradmalle Dhanashree %A Sonigara Varsha Rakesh %A Singh Kiran Premnath %A Kakade Omkar Shashikant %A Panigrahy Krishnachandra Gourishankar %T An Approach for Security of Images over Elliptical Curve Cryptography and Digital Signature%T %J International Journal of Computer Applications %V 153 %N 11 %P 25-27 %R 10.5120/ijca2016912203 %I Foundation of Computer Science (FCS), NY, USA
Nowadays, the need of transferring data over a network has increased. Some of these data is confidential and requires to be transferred securely. The type of data can be a Text, Image or any other multimedia. It is essential to provide security to the data that one wants to share over a network. The goals of security are Confidentiality, Integrity and Authentication. Cryptography plays a major role in providing security to the data. Cryptography is the study of techniques for secure communication in the presence of third parties called adversaries. The most popular asymmetric cryptography techniques are RSA (Rivest-Shamir-Adleman) and ECC (Elliptic Curve Cryptography). RSA is based on Factorization Problem and ECC is based on Elliptic Curve arithmetic and Discrete Logarithm Problem. ECC provides same level of security or comparatively better security with smaller key size (bit lengths) than traditional cryptosystems like RSA, thereby requiring less storage and processing time.