Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 21

Confidential Image Using Cryptography

Submitted By: Harsh Kumar Gupta


Registration No.: 21MCA1005
Guide Name: Dr. S. Renuka Devi
Guide Approval
Outline of the presentation

 Problem statement
 Outline of the proposed solution/model with a neat block diagram
 Brief description of the modules of the proposed solution/model
Problem Statement
 With the advancement in technology, threats has increased. Image is an important data type
which is often used in banking system, protection and security system.

 Image need to be secured due to the confidential data they contain from numerous threats
and attacks.

 As information technology becomes more widespread, security has become much more
important.

 Since, Digital images have become an foremost medium for communications, researchers
have developed a variety of technologies to keep images safe.
Image Encryption and Decryption

 Image encryption and decryption is a technique which help to provide security to our digital or visual
informal.

 It is a process to encrypt the image by converting into bits and then decrypt the bits into visual image
by public or private key.

 It helps to block the holes and provide security from third party to read the data.
Proposed Model

Image encryption scheme based on a hybrid model of


DNA computing, chaotic systems and hash functions.
The Block diagram of the encryption
process
The Block diagram of the decryption
process
Sample Data
Brief description of the Proposed Model

Image encryption scheme based on a hybrid model


of DNA computing, chaotic systems and hash
functions.
 Generating the secret key, the initial values of chaotic systems and the key DNA image
 DNA encoding of the plain image
 DNA level permutation
 DNA level diffusion
 DNA decoding of the diffused DNA image
 The decryption algorithm
 Key Security Analysis
Implementation Part

The Hybrid algorithm that are implemented in the


project work are:
DNA computing
Chaotic systems
Hash functions
DNA Computing

 DNA represents the genetic blueprint of living creatures


 DNA a unique Computational Element
 Extremely dense information storage
 Enormous parallelism
 Extraordinary energy efficiency
Chaotic systems

It is a mathematical function that exhibit chaos


behaviours and characteristic

 Chaos behaviours
 Determinism- A system that predetermined by the initial values
 Long Term Prediction
Hash Function

 A hash function takes a group of characters (called a key) and maps it to a value of a certain length
(called a hash value or hash).
 Efficience of Opération
 Hash Function used:
 MD5
 SHA256
Library Used

The image processing Library to implement


project :
 Imshow : to show image as output
 imhist : To plot histogram
 Randsample: Statistics and Machine Learning Toolbox
Code Output
Code Output
Code Output
Code Output
Code Output
THANK YOU

You might also like