TY - GEN
T1 - Systematic Implementation of ECC Curve 25519 for Enhancing the Finger-Print Security
AU - Sreenivasulu, K. N.
AU - Vinay, N. A.
AU - Shwetha, M.
N1 - Publisher Copyright:
© 2025 IEEE.
PY - 2025
Y1 - 2025
N2 - In today's era, scope for maintaining the security, confidentiality, authentication and privacy of digital data has become prominent factors. On this part, Encryption of images has become a critical part of securing data. Existing algorithms, technologies and models have their own limitations in terms of processing time and efficiency. Elliptic Curve Cryptography, a public key cryptography technique has a unique way of keys creation by mathematical equations on elliptic curve that helps in securing the data. This paper focuses on preprocessing techniques that are important for image encryption and decryption using ECC specially using curve 25519 and Ed25519 curves. Major preprocessing steps involved for ECC technique are image representation conversion, generation of keys, key exchange mechanism. Noise reduction, contrast enhancement, image resizing, color correction, segmentation, feature extraction. In this work the effectiveness of preprocessing techniques and results give comparisons of each algorithm in terms of response time.
AB - In today's era, scope for maintaining the security, confidentiality, authentication and privacy of digital data has become prominent factors. On this part, Encryption of images has become a critical part of securing data. Existing algorithms, technologies and models have their own limitations in terms of processing time and efficiency. Elliptic Curve Cryptography, a public key cryptography technique has a unique way of keys creation by mathematical equations on elliptic curve that helps in securing the data. This paper focuses on preprocessing techniques that are important for image encryption and decryption using ECC specially using curve 25519 and Ed25519 curves. Major preprocessing steps involved for ECC technique are image representation conversion, generation of keys, key exchange mechanism. Noise reduction, contrast enhancement, image resizing, color correction, segmentation, feature extraction. In this work the effectiveness of preprocessing techniques and results give comparisons of each algorithm in terms of response time.
UR - https://www.scopus.com/pages/publications/105010224154
UR - https://www.scopus.com/pages/publications/105010224154#tab=citedBy
U2 - 10.1109/INCIP64058.2025.11018965
DO - 10.1109/INCIP64058.2025.11018965
M3 - Conference contribution
AN - SCOPUS:105010224154
T3 - Proceedings - International Conference on Next Generation Communication and Information Processing, INCIP 2025
SP - 639
EP - 644
BT - Proceedings - International Conference on Next Generation Communication and Information Processing, INCIP 2025
A2 - Bukya, Mahipal
A2 - Kumar, Pramod
A2 - Rawat, Sanyog
A2 - Jangid, Mahesh
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2025 International Conference on Next Generation Communication and Information Processing, INCIP 2025
Y2 - 23 January 2025 through 24 January 2025
ER -