preview

Essay On Cryptography

Better Essays

5.1 Introduction: Two set of text images and one true sample image is taken for cryptography. In this proposed work these three images are encrypted into various shares through MATLAB, so that after compiling specific number of share the original image is visible. After encryption the performance analysis is done with the help of PSNR and MSE values. 5.2 Main Input Images In the current work various set of text images are used for crypto analysis. The sample image 1 and sample image 2 are the synthetically generated images for our own study. The Reference image 1 and the Reference image 2 are the image taken from the work done by base papers. And for the complex parametric evaluation a true colour image is also used for efficiency …show more content…

In Figure 5.4(a) alphabet A from the original sample image is converted into cyan by subtracting green and blue pixel from the original 256 pixel. (a) (b) (c) Figure 5.4: Image 1 CMY and Haftone Conversion (a) (b) (c) Figure 5.5: Image 2 CMY and Haftone Conversion Similarly in figure 5.4(b) alphabet B is converted into magenta by subtracting red and blue pixel from the original 256 pixel whereas yellow is observed in alphabet C due to the subtraction of red and green pixels shown in figure 5.4(c) 5.5 RESULTANT SHARES & FUZZY ANALYSIS In this section the shares are generated using the standard Floyd Steinberg half tone method [5] on the image taken after merging the CMY components. Results of the Encryption of original sample image 1 are resulted into four shares which is share 1, share 2, share 3 and share 4.shown in Figure 5.6. Share 1 Share 2 Share 3 Share 4 Figure 5.6: Shares for different input sample images 1 Share 1 Share 2 Share 3 Share 4 Figure

Get Access