Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 18

PIXAR SECURA

(SECURED TRANSMISSION OF IMAGES)

TEAM :

SAI VARUN TEJ SREERAM


ANUSHA PADAMATI
KAVYA
SAILENDRA

OUTLINE

Objectives

Overall Architecture

Abstract

Java Swing

Sub-system and their


Modules

Application Demo

Advantages

References

Methods

Key Generation procedure

System Design
2

CENTRAL MICHIGAN UNIVERSITY


(ITC-510)

OBJECTIVES

To encrypt High Resolution Images.


Encrypt Images faster than other techniques.
Reaching general security goals.

Confidentiality

Integrity

Availability
3

CENTRAL MICHIGAN UNIVERSITY


(ITC-510)

ABSTRACT

The main objective of this project is to make a secure

image data transmission over the network and protecting


the data from the intruders.
To encrypt and decrypt the images using the keys

generated by the RSA algorithm. It enhances the security


of the multimedia data transmission over large networks.

CENTRAL MICHIGAN UNIVERSITY


(ITC-510)

SUB SYSTEM AND THEIR


MODULES

CENTRAL MICHIGAN UNIVERSITY


(ITC-510)

METHODS

ENCRYPTION:
This module encrypts the plain image which

was selected by the sender.


The image is encrypted by merging the public

key value which was provided by the receiver


and then the image will be send to the
receiver.
6

CENTRAL MICHIGAN UNIVERSITY


(ITC-510)

METHODS

DECRYPTION:
The encrypted image is merged with the

private key value to get decrypted image.


Private key value is generated by seconds

value in date function , so it differs for each


and every key generation event.

CENTRAL MICHIGAN UNIVERSITY


(ITC-510)

METHODS

KEY GENERATION:
The receiver generates both public and

private keys.
Public key is visible to both sender and

receiver.
Private key is known only to receiver , which is

generated by RSA algorithm.


8

CENTRAL MICHIGAN UNIVERSITY


(ITC-510)

KEY GENERATION
PROCEDURE (RSA)

Select p, q

p, q values are systems seconds value

Calculate n = p x q

Calculate (n) = (p-1) (q-1)

Get integer e

Calculate d d = e-1 mod (n)

Public key

Private key KR = {d, n}

public key value entered by the receiver

KU = {e, n}

CENTRAL MICHIGAN UNIVERSITY


(ITC-510)

SYSTEM DESIGN

10

CENTRAL MICHIGAN UNIVERSITY


(ITC-510)

OVERALL ARCHITECTURE

11

CENTRAL MICHIGAN UNIVERSITY


(ITC-510)

JAVA SWING

Swing uses ABSTRACT WINDOW TOOLKIT features

to get access to GUI system.


Swing components are light weight.
They are not platform native widgets.

12

CENTRAL MICHIGAN UNIVERSITY


(ITC-510)

IMAGE TO BE SENT

13

CENTRAL MICHIGAN UNIVERSITY


(ITC-510)

ENCRYPTED IMAGE

14

CENTRAL MICHIGAN UNIVERSITY


(ITC-510)

APPLICATION
DEMO

ADVANTAGES

SECURE: Private Key is only known to Receiver.

DYNAMIC KEY GENERATION: Private Key generated


by Systems Seconds Values.

SHUFFLING MATRIX: Original Image is Splitted and


Shifted using the Shuffling Matrix.
16

CENTRAL MICHIGAN UNIVERSITY


(ITC-510)

REFERENCES
[1] J. Yen and J. Guo, A new image encryption system and its

VLSI architecture, in IEEE Workshop on Signal Processing


Systems, 1999, pp. 430437.
[2] R.J.Sutton, "An Introduction to Encryption and Security

Management," Chap.2 in Secure communications:


Applications and Management, pp.38-40, John Wiley & Sons,
Ltd, West Sussex, England.
[3] Q.V. Lawande, B. R. Ivan and S. D. Dhodapkar, Chaos based

cryptography: A new approach to secure communications, BARC


Newsletter, no. 258, Bombay, July 2005
17

CENTRAL MICHIGAN UNIVERSITY


(ITC-510)

THANK YOU.

You might also like