Advanced Image Encryption: Utilizing SHA-256 Empowered ECC and LFT Approach for Enhancing Image Security

Samsani, Surekha and Asi, Deepti (2025) Advanced Image Encryption: Utilizing SHA-256 Empowered ECC and LFT Approach for Enhancing Image Security. International Journal of Innovative Science and Research Technology, 10 (8): 25aug864. pp. 1530-1538. ISSN 2456-2165

Abstract

The proliferation of picture use across several sectors is directly attributable to the exponential growth of digital technology. Confidential data transfer over networks is becoming commonplace. Images privacy so becomes extremely important, and they must be shielded from any illegal user access. In order to provide a highly secure and resilient method of picture encryption, this study introduces a hybrid approach that combines SHA-256 with ECC and LFT. An ECC private key is derived from a SHA-256 hash of the image filename, which seeds pseudo-random generators for all cryptographic elements. The image undergoes LFT-based transformation for nonlinearity, followed by S-box substitution and XOR-based diffusion using ECC-derived values. Essential metadata is stored for accurate decryption and integrity verification. Security is evaluated through metrics like Information Entropy, Correlation Coefficient assessment, PSNR, UACI and NPCR and SAC,BIC confirming that the method significantly strengthens Encryption Against different Attacks.

Documents
2503:15082
[thumbnail of IJISRT25AUG864.pdf]
Preview
IJISRT25AUG864.pdf - Published Version

Download (1MB) | Preview
Information
Library
Metrics

Altmetric Metrics

Dimensions Matrics

Statistics

Downloads

Downloads per month over past year

View Item