Professional Documents
Culture Documents
Presentation Virpal
Presentation Virpal
Presentation Virpal
Encryption Decryption
Network
Flow Chart Of Proposed Work
Start
Input image
End
Sender Side Algorithm With
Equation
Get image content in img matrix.
Get key k to get dividend and remainder matrix
Calculate dividend and remainder in matrix m1 and m2
respectively
m1=img/k
m2=img mod k
get they keyimg to process
m1mx=m1 xor keyimg
Transfer the matrix mx and m2 to receiver end.
Receiver side algorithm with equation
Get image content in mx and m2 on receiver
Get key k and keyimg
Get m1 by following equation
m1=mx xor keyimg
Calculate restore the original image by
Img=(m1*k)+m
Display image img.
Size of Original File
Image Compressed using
Splitter
GUI Interface for Lossless
Image Compression
Matrix Chart to Compare the Traditional and
Proposed Work
Parameters Traditional Proposed work using Proposed work using
Lossless Image Matrix Splitter
Compression
140
120
100
Values in KB
Traditional
80
Proposed work using Lossless
Image Compression
60 Proposed work using Matrix
Splitter
40
20
0
Actual Size of File Compressed size Uncompressed
Size
Graph Showing Comparison Of
Mean Square Error Of Images
Mean square error
0.007
0.006
0.005
0.004
0.003
Mean square error
0.002
0.001
0
Traditional Proposed work using Proposed work using Matrix
Lossless Image Splitter
Compression
Graph Showing Comparison Of Peak
Signal-to-noise Ratio Of Images
Peak Signal-to-noise ratio
75
74
73
72
71
Peak Signal-to-noise ratio
70
69
68
Traditional Proposed work using Proposed work using
Lossless Image Matrix Splitter
Compression
Graph Showing Comparison Of Time
Consumption During Compression Of
Images
Time consumption during compression
1200
1000
800
Time in Seconds
600
Time consumption during
compression
400
200
0
Traditional Proposed work using Proposed work using
Lossless Image Matrix Splitter
Compression
Comparative Analysis of Packet Dropping in
Traditional and Proposed Work in Tabular Form
No. of Packets dropped Packets dropped
Packets send during Traditional work during Proposed work
100 5 3
200 10 6
300 15 9
400 20 12
500 25 15
600 30 18
700 35 20
800 40 23
900 45 26
1000 50 29
Comparative Analysis Of Packet Dropping
In Traditional And Proposed Work
Graphically
CONCLUSION
In order to secure the graphical contents, the encryption of image has
been made using splitter mechanism. The graphical contents are
retrieved in form of matrix from image.
In the research work, the updated image compression algorithm is
proposed to compress an image. Here jpeg image has been taken and
Matlab script is used on it.
Research has studied effective means by which content of image
could be automatically structured, indexed & retrieved.
Here the comparison of traditional work with Lossless Image
Compression and proposed work using Matrix Splitter has been
made on the base of different factors such as Actual Size of File,
Compressed size, Uncompressed Size, Mean square error, PSNR,
Time consumption during compression, Extension of File etc.
After that the comparative analysis of chances of packet dropping in
traditional and proposed work is made.
FUTURE SCOPE
The research work would provide the study of existing Image
encryption system with their loopholes.
The proposed cryptographic system along with the splitter
would be proven suitable in order to secure graphical contents
during transmission.
The pre processing work would be fast as compare to
traditional techniques.
The research work also provides the comparative analysis
between traditional system & proposed system.
This system may be proven a better mechanism for network
and ecommerce security.
The research would be beneficial to secure the graphical
content during transmission.
REFERENCE
V. Reshma, S. J. Gladwin, and C. Thiruvenkatesan, “Pairing-Free CP-ABE based Cryptography Combined
with Steganography for Multimedia Applications,” 2019 Int. Conf. Commun. Signal Process., pp. 501–505,
2019.
S. A. Thomas, “Halftone Visual Cryptography for Grayscale Images using Error Diffusion and Direct
Binary Search,” 2018 2nd Int. Conf. Trends Electron. Informatics, no. Icoei, pp. 1091–1096, 2018.
I. Jarin, S. A. Fattah, and C. Shahnaz, “Natural and Medical Image Encryption using Self-Adaptive
Permutation and DNA Encoding,” no. 3, pp. 99–102, 2018.
A. Dadheech, J. L. Lagrange, and C. F. Gauss, “Preventing Information Leakage from Encoded Data in
Lattice Based Cryptography,” 2018 Int. Conf. Adv. Comput. Commun. Informatics, pp. 1952–1955, 2018.
S. Jain and A. Khunteta, “Color Image Encryption by Component based Partial Random Phase Encoding,”
2018 Int. Conf. Inven. Res. Comput. Appl., vol. 1, no. ICIRCA, pp. 144–148, 2018
H. R. Pawar, “Classical and Quantum Cryptography for Image Encryption & Decryption,” 2018 Int. Conf.
Res. Intell. Comput. Eng., pp. 1–4, 2018.
B. Akiwate, “A Dynamic DNA for Key-based Cryptography,” 2018 Int. Conf. Comput. Tech. Electron. Mech.
Syst., pp. 223–227, 2018.
M. K. Abdmouleh, A. Khalfallah, and M. S. Bouhlel, “A Novel Selective Encryption DWT-based Algorithm
for Medical Images,” 2017.
R. Das, “Cumulative Image Encryption Approach based on User Defined Operation , Character
Repositioning , Text Key and Image Key Encryption Technique and Secret Sharing Scheme,” 2017 IEEE Int.
Conf. Power, Control. Signals Instrum. Eng., pp. 748–753, 2017
P. S. Lakshmi and G. Murali, “Comparison of Classical and Quantum Cryptography using QKD Simulator,”
2017 Int. Conf. Energy, Commun. Data Anal. Soft Comput., pp. 3543–3547, 2017
Continued….
M. Moizuddin and J. Winston, “A Comprehensive Survey : Quantum Cryptography,” pp. 2–6, 2017.
A. Chatterjee, J. Dhanotia, V. Bhatia, S. Rana, and S. Prakash, “Optical Image Encryption using Fringe
Projection Profilometry , Fourier Fringe Analysis , and RSA Algorithm,” 2017.
N. Chaudhari, “Images Using Visual Cryptography and Digital Watermarking,” pp. 0–3, 2017.
H. Ojrulwkp et al., “,psohphqwdwlrq ri (iilflhqw 0hwkrg ri 56$ .h\ 3dlu *hqhudwlrq $ojrulwkp,” pp. 72–73,
2017.
Prerna , Parul Agarwal (2017) “Cryptography Based Security for Cloud Computing System” ,Volume 8, No.
5, May-June 2017 International Journal of Advanced Research in Computer Science.
Dr. Sandeep Tayal, Dr. Nipin Gupta, Dr. Pankaj Gupta (2017) “A Review paper on Network Security and
Cryptography” , Volume 10, Number 5 (2017) Research India Publications,
Sarita Kumari (2017) “A research Paper on Cryptography Encryption and Compression Techniques” ,
International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 6 Issue 4 April 2017,
P. Jonathon Phillips, Hyeonjoon Moon “The FERET Evaluation Methodologyfor Face-Recognition
Algorithms”, 4th IEEE Transactions on Pattern Analysis and Machine Intelligence ( Volume: 22 , Issue: 10 ,
Oct 2000 ).
Belen Rıos-Sanchez, Miguel Viana-Matesanz, Carmen Sanchez-Avila,"A comparative study of palmprint
feature extraction methods for contact-less biometrics under different environmental conditions" 2017
International Carnahan Conference on Security Technology (ICCST).
THANK- YOU