Presentation Virpal

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 27

Advanced Cryptographic System

With Splitter To Secure Graphical


Contents During Transmission
CRYPTOGRAPHY
 Cryptography has been described which is an interdisciplinary
subject, drawing from several fields. Before the time of
computers, it was closely related to linguistics.
 Nowadays the emphasis has shifted, and cryptography makes
extensive use of technical areas of mathematics, especially
those areas collectively known as discrete mathematics.
 After that the basics of cryptography has been described. This
includes topics from number theory, information theory,
computational complexity, statistics and combinatory.
 In computer science, digital image processing is the use of
computer algorithms to perform image processing on digital
images. There are two type of image compression loosy and
loseless image compression which are also explained here
TERMS USED IN CRYPTOGRAPHY
 Plaintext
Data that can be read and understood without any special measures is called plaintext or clear text.
The method of disguising plaintext in such a way as to hide its substance is called encryption.
 Ciphertext
Encrypting plaintext results in unreadable gibberish called cipher text. One use encryption to
ensure that information is hidden from anyone for whom it is not intended, even those who can
see the encrypted data. The process of reverting cipher text to its original plaintext is called
decryption.
 Encryption
The method of disguising plaintext in such a way as to hide its substance is called encryption.
Data that can be read and understood without any special measures is called plaintext or clear
text.
 Decryption
Decryption is generally the reverse process of encryption. It is the process of decoding the data
which has been encrypted into a secret format. An authorized user can only decrypt data
because decryption requires a secret key or password.
 Keys
A secret like a password used to encrypt and decrypt information. There are a few different types
of keys used in cryptography
Symmetric and Asymmetric
Algorithms
 Symmetrical Encryption
Symmetrical encryption is also known as public key cryptography,
which is a relatively new method, compared to symmetric
encryption. Asymmetric encryption uses two keys to encrypt a plain
text. Secret keys are exchanged over the Internet or a large network.
It ensures that malicious persons do not misuse the keys.
 Asymmetrical Encryption
Asymmetric encryption is mostly used in day-to-day communication
channels, especially over the Internet. This is the simplest kind of
encryption that involves only one secret key to cipher and decipher
information. Symmetrical encryption is an old and best-known
technique. It uses a secret key that can either be a number, a word or
a string of random letters.
LITERATURE REVIEW
 There are several research work has been provided that is related to the different security technique has been
reviewed here.

 V. Reshma et al (2019) studied Pairing-Free CP-ABE based Cryptography Combined with Steganography
for Multimedia Applications.
 S. A. Thomas et al (2018) provided Halftone Visual Cryptography for Grayscale Images using Error
Diffusion and Direct Binary Search. Using Error diffusion or Direct binary search a secret message of a
grayscale can be encoded into shares. Simulation results show several illustrative examples with its
parameters. [2]
 I. Jarin et al (2018) researched Natural and Medical Image Encryption using Self-Adaptive Permutation and
DNA Encoding.
 A. Dadheech et al (2018) provided Preventing Information Leakage from Encoded Data in Lattice Based
Cryptography. Phong Nguyen, in his paper
 S. Jain et al (2018) studied Color Image Encryption by Component based Partial Random Phase Encoding.
This paper is proposing an encryption and decryption idea on colour image by using component based
Partial Random Phase Encoding (PRPE) and Fractional Fourier Transformation
 . R. Pawar et al (2018) researched Classical and Quantum Cryptography for Image Encryption &
Decryption.
 B. Akiwate et al (2018) studied A Dynamic DNA for Key-based Cryptography. But over the time, the
traditional cryptographic approaches are been replaced with more effective cryptographic systems such as
Quantum Cryptography, Biometric Cryptography, Geographical Cryptography and DNA Cryptography.
 M. K. Abdmouleh et al (2017) made the A Novel Selective Encryption DWT-based Algorithm for Medical
Images.
Continued…
 R. Das et al (2017) provided Cumulative Image Encryption Approach based on User
Defined Operation , Character Repositioning , Text Key and Image Key Encryption
Technique and Secret Sharing Scheme.
 P. S. Lakshmi et al (2017) studied Comparison of Classical and Quantum
Cryptography using QKD Simulator.
 M. Moizuddin et al (2017) made the A Comprehensive Survey: Quantum
Cryptography. Quantum cryptography is considered to be a future replica of
classical cryptography.
 A. Chatterjee, J. Dhanotiaet al (2017) provide the “Optical Image Encryption using
Fringe Projection Profilometry , Fourier Fringe Analysis , and RSA Algorithm.
Optical image encryption is one of the most promising technologies being
investigated in the field of data communication and information technology.
 N. Chaudhari, et al (2017) studied Images Using Visual Cryptography and Digital
Watermarking. In this paper analysis of different algorithms are performed which
generates meaningful shares
 H. Ojrulwkp et al., et al (2017) provide the Implementation of efficient method of
RSA key-pair generation algorithm.
OBJECTIVES OF WORK
 To study the existing Image encryption system & to identify
the loopholes.
 To propose better Image integrated encryption mechanism.
 To analyze the performance of Image integrated encryption
mechanism based proposed system.
 To develop an interactive Graphical user interface for proposed
system in Matlab.
 To perform comparative analysis of traditional system and
proposed system.
 To draw conclusion according to readings & discussing scope
of research on security system at end.
MATLAB
 In this dissertation work MATLAB has been taken as simulation tool. MATLAB is
known as language of technical computing. This is considered as a high-stage
language. In Matlab, there are interactive environment. MATLAB enable us to get
the computationally missions quicker as compared to other programming languages
like PASCAL, C, COBOL, C++ and FORTRAN. Several programming languages
are there which performs one task at a time. But, MATLAB is able to run the whole
matrices at a time very vastly as well as very easily.
Proposed Basic Model
In Cryptography, decryption technique has been used at receiver hand. It has been used
in order to get actual message from Cipher Text. In this process,
Decryption algorithm and a key are required. The decryption process requires two
things- a Decryption algorithm and a key. A Decryption algorithm indicates
the technique that has been used in Decryption.

Shared Secret Key

Plain Text Plain Text

Encryption Decryption
Network
Flow Chart Of Proposed Work
Start

Input image

Read matrix img from image

Divide img by key and get m1

Get remainder by dividing img by key to m2

Calculate mx by xoring m1 with keyimg

Transfer the data

End
Sender Side Algorithm With
Equation
 Get image content in img matrix.
 Get key k to get dividend and remainder matrix
 Calculate dividend and remainder in matrix m1 and m2
respectively
 m1=img/k
 m2=img mod k
 get they keyimg to process
 m1mx=m1 xor keyimg
 Transfer the matrix mx and m2 to receiver end.
Receiver side algorithm with equation
 Get image content in mx and m2 on receiver
 Get key k and keyimg
 Get m1 by following equation
 m1=mx xor keyimg
 Calculate restore the original image by
 Img=(m1*k)+m
 Display image img.
Size of Original File
Image Compressed using
Splitter
GUI Interface for Lossless
Image Compression
Matrix Chart to Compare the Traditional and
Proposed Work
Parameters Traditional Proposed work using Proposed work using
Lossless Image Matrix Splitter
Compression

Actual Size of File 135KB 135KB 135KB

Compressed size 68.9KB 97.6KB 58.7KB

Uncompressed Size 71.8KB 53.8KB 59.7KB

Mean square error 0.0063 0.00246 (average) 0.00263 (average)

PSNR 70.2002 74.3182 (average) 73.9843 (average)

Time consumption during 997.125608 seconds 15.457998 seconds 1.024675 seconds


compression
Extension of File .jpg,.png,.tif,.gif .jpg,.png,.tif,.gif .jpg,.png,.tif,.gif
Graph Showing Comparison In
Image Size
160

140

120

100
Values in KB

Traditional

80
Proposed work using Lossless
Image Compression
60 Proposed work using Matrix
Splitter
40

20

0
Actual Size of File Compressed size Uncompressed
Size
Graph Showing Comparison Of
Mean Square Error Of Images
Mean square error
0.007

0.006

0.005

0.004

0.003
Mean square error
0.002

0.001

0
Traditional Proposed work using Proposed work using Matrix
Lossless Image Splitter
Compression
Graph Showing Comparison Of Peak
Signal-to-noise Ratio Of Images
Peak Signal-to-noise ratio
75

74

73

72

71
Peak Signal-to-noise ratio

70

69

68
Traditional Proposed work using Proposed work using
Lossless Image Matrix Splitter
Compression
Graph Showing Comparison Of Time
Consumption During Compression Of
Images
Time consumption during compression
1200

1000

800
Time in Seconds

600
Time consumption during
compression
400

200

0
Traditional Proposed work using Proposed work using
Lossless Image Matrix Splitter
Compression
Comparative Analysis of Packet Dropping in
Traditional and Proposed Work in Tabular Form
No. of Packets dropped Packets dropped
Packets send during Traditional work during Proposed work

100 5 3
200 10 6
300 15 9
400 20 12
500 25 15
600 30 18
700 35 20
800 40 23
900 45 26
1000 50 29
Comparative Analysis Of Packet Dropping
In Traditional And Proposed Work
Graphically
CONCLUSION
 In order to secure the graphical contents, the encryption of image has
been made using splitter mechanism. The graphical contents are
retrieved in form of matrix from image.
 In the research work, the updated image compression algorithm is
proposed to compress an image. Here jpeg image has been taken and
Matlab script is used on it.
 Research has studied effective means by which content of image
could be automatically structured, indexed & retrieved.
 Here the comparison of traditional work with Lossless Image
Compression and proposed work using Matrix Splitter has been
made on the base of different factors such as Actual Size of File,
Compressed size, Uncompressed Size, Mean square error, PSNR,
Time consumption during compression, Extension of File etc.
 After that the comparative analysis of chances of packet dropping in
traditional and proposed work is made.
FUTURE SCOPE
 The research work would provide the study of existing Image
encryption system with their loopholes.
 The proposed cryptographic system along with the splitter
would be proven suitable in order to secure graphical contents
during transmission.
 The pre processing work would be fast as compare to
traditional techniques.
 The research work also provides the comparative analysis
between traditional system & proposed system.
 This system may be proven a better mechanism for network
and ecommerce security.
 The research would be beneficial to secure the graphical
content during transmission.
REFERENCE
 V. Reshma, S. J. Gladwin, and C. Thiruvenkatesan, “Pairing-Free CP-ABE based Cryptography Combined
with Steganography for Multimedia Applications,” 2019 Int. Conf. Commun. Signal Process., pp. 501–505,
2019.
 S. A. Thomas, “Halftone Visual Cryptography for Grayscale Images using Error Diffusion and Direct
Binary Search,” 2018 2nd Int. Conf. Trends Electron. Informatics, no. Icoei, pp. 1091–1096, 2018.
 I. Jarin, S. A. Fattah, and C. Shahnaz, “Natural and Medical Image Encryption using Self-Adaptive
Permutation and DNA Encoding,” no. 3, pp. 99–102, 2018.
 A. Dadheech, J. L. Lagrange, and C. F. Gauss, “Preventing Information Leakage from Encoded Data in
Lattice Based Cryptography,” 2018 Int. Conf. Adv. Comput. Commun. Informatics, pp. 1952–1955, 2018.
 S. Jain and A. Khunteta, “Color Image Encryption by Component based Partial Random Phase Encoding,”
2018 Int. Conf. Inven. Res. Comput. Appl., vol. 1, no. ICIRCA, pp. 144–148, 2018
 H. R. Pawar, “Classical and Quantum Cryptography for Image Encryption & Decryption,” 2018 Int. Conf.
Res. Intell. Comput. Eng., pp. 1–4, 2018.
 B. Akiwate, “A Dynamic DNA for Key-based Cryptography,” 2018 Int. Conf. Comput. Tech. Electron. Mech.
Syst., pp. 223–227, 2018.
 M. K. Abdmouleh, A. Khalfallah, and M. S. Bouhlel, “A Novel Selective Encryption DWT-based Algorithm
for Medical Images,” 2017.
 R. Das, “Cumulative Image Encryption Approach based on User Defined Operation , Character
Repositioning , Text Key and Image Key Encryption Technique and Secret Sharing Scheme,” 2017 IEEE Int.
Conf. Power, Control. Signals Instrum. Eng., pp. 748–753, 2017
 P. S. Lakshmi and G. Murali, “Comparison of Classical and Quantum Cryptography using QKD Simulator,”
2017 Int. Conf. Energy, Commun. Data Anal. Soft Comput., pp. 3543–3547, 2017
Continued….
 M. Moizuddin and J. Winston, “A Comprehensive Survey : Quantum Cryptography,” pp. 2–6, 2017.
 A. Chatterjee, J. Dhanotia, V. Bhatia, S. Rana, and S. Prakash, “Optical Image Encryption using Fringe
Projection Profilometry , Fourier Fringe Analysis , and RSA Algorithm,” 2017.
 N. Chaudhari, “Images Using Visual Cryptography and Digital Watermarking,” pp. 0–3, 2017.
 H. Ojrulwkp et al., “,psohphqwdwlrq ri (iilflhqw 0hwkrg ri 56$ .h\ 3dlu *hqhudwlrq $ojrulwkp,” pp. 72–73,
2017.
 Prerna , Parul Agarwal (2017) “Cryptography Based Security for Cloud Computing System” ,Volume 8, No.
5, May-June 2017 International Journal of Advanced Research in Computer Science.
 Dr. Sandeep Tayal, Dr. Nipin Gupta, Dr. Pankaj Gupta (2017) “A Review paper on Network Security and
Cryptography” , Volume 10, Number 5 (2017) Research India Publications,
 Sarita Kumari (2017) “A research Paper on Cryptography Encryption and Compression Techniques” ,
International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 6 Issue 4 April 2017,
 P. Jonathon Phillips, Hyeonjoon Moon “The FERET Evaluation Methodologyfor Face-Recognition
Algorithms”, 4th IEEE Transactions on Pattern Analysis and Machine Intelligence ( Volume: 22 , Issue: 10 ,
Oct 2000 ).
 Belen Rıos-Sanchez, Miguel Viana-Matesanz, Carmen Sanchez-Avila,"A comparative study of palmprint
feature extraction methods for contact-less biometrics under different environmental conditions" 2017
International Carnahan Conference on Security Technology (ICCST).
THANK- YOU

You might also like