5.1 Introduction: Two set of text images and one true sample image is taken for cryptography. In this proposed work these three images are encrypted into various shares through MATLAB, so that after compiling specific number of share the original image is visible. After encryption the performance analysis is done with the help of PSNR and MSE values. 5.2 Main Input Images In the current work various set of text images are used for crypto analysis. The sample image 1 and sample image 2 are the synthetically generated images for our own study. The Reference image 1 and the Reference image 2 are the image taken from the work done by base papers. And for the complex parametric evaluation a true colour image is also used for efficiency …show more content…
In Figure 5.4(a) alphabet A from the original sample image is converted into cyan by subtracting green and blue pixel from the original 256 pixel. (a) (b) (c) Figure 5.4: Image 1 CMY and Haftone Conversion (a) (b) (c) Figure 5.5: Image 2 CMY and Haftone Conversion Similarly in figure 5.4(b) alphabet B is converted into magenta by subtracting red and blue pixel from the original 256 pixel whereas yellow is observed in alphabet C due to the subtraction of red and green pixels shown in figure 5.4(c) 5.5 RESULTANT SHARES & FUZZY ANALYSIS In this section the shares are generated using the standard Floyd Steinberg half tone method [5] on the image taken after merging the CMY components. Results of the Encryption of original sample image 1 are resulted into four shares which is share 1, share 2, share 3 and share 4.shown in Figure 5.6. Share 1 Share 2 Share 3 Share 4 Figure 5.6: Shares for different input sample images 1 Share 1 Share 2 Share 3 Share 4 Figure
being attacked, encrypt it with a secret key to obtain an encrypted bit stream . For that AES encryption is used. After AES encryption, will embed at the fourth bit position of . Some related information about the mosaic image generation process into the mosaic image for use in the secret image recovery process are also embed at the last fourth bit position of . Such information, described as a bit stream I like M, includes the following data items: 1) encryption key; and 2) total length of before encryption. After all this process Target image with mosaic image, residual value and all information that required to recover original image are transmitted to receiver
Information security is a major concept in today’s industrial and computer era, so security must be higher to protect the confidential data. Information security plays major role in computer and network security with the use of different cryptography algorithms that includes the encryption and decryption of data with the uses of the algorithm and the key. By means of text or numerical key for the encryption can be dangerous because with the several hack attacks that a key can be broken. So I have proposed a new mechanism that will replace the text key with the image pixels and can gain high security which cannot be easy to break without prior knowledge.
There are many aspects to security and applications, from secure commerce and payment to private communications and protecting passwords. Cryptography, is the practice and study in securing communication between parties in the presence of potential adversaries (Yousuf, N.D.). This report focuses on modern methods of cryptography its operation, strengths and weaknesses, its application techniques in computing and some other aspects where cryptography deemed essential as discussed in this report.
The core idea of this image encryption scheme (Tiegang Gao et al.,2007) is based on total shuffling matrix using the Logistic map, and the substitution of the shuffled image with a keystream
These methods hide messages in significant areas of the cover-image, which make them more robust to attack and difficult to detect. Transformations can be applied over the entire image, to block through out the image, or other variants.
CRYPTOGRAPHY is the most important part to secure any business by securing the communication range. In this project important topics of cryptography that should be known in general is discussed . How decoding and encoding in done with the help of cryptography to secure any communication. How it helps to maintain authenticity of any industry or company. Cryptography helps in making transactions by keeping data secure. It also protect passwords, ATM pins etc. from hackers. Cryptography maintains aspects which is authenticated like Confidentiality, authenticity & integrity. In this project it is described how cryptography converts the essential data in coded form and how it is changed using terms encryption and decryption. In this undertaking distinctive keys utilized for encryption and unscrambling is examined like cryptography mystery key and open key. In this a short portrayal of encryption is given which is the starting venture in cryptography. Encryption takes an arrangement of calculations, or scientific articulations, to scramble information from its unique organization into one undecipherable. Purpose of cryptography is discussed in the project. How secret codes were used in ancient period is briefly described. Now key is used in cryptography how key convert the data from one format to another is discussed. There are three keys in cryptography public, private and shared keys. A brief discussion about how these
Abstract. The growth of internet coupled with the rise in networked infrastructure has resulted in exponential increase in the multimedia content being shared over the communication networks. The advancement in technology has resulted in increase in multimedia piracy. This is due to the fact that it is very easy to copy, duplicate and distributes multimedia content using current day technology. In such a scenario Digital Rights Management is one of the prominent issues to be dealt with and tremendous work is going on in this direction round the globe. Digital watermarking and fingerprinting have emerged as fundamental technologies to cater to DRM issues. These technologies have been found to be of prominent use in content authentication, copy protection, copyright control, broadcast monitoring and forensic applications. Various requirements of a digital watermarking system include Imperceptibility, Robustness, Security, Payload and Computational complexity. The main requirement of real time DRM systems is lesser computational complexity and high robustness. This chapter proposes and analyses a robust and computational efficient Image watermarking technique in spatial domain based on Inter Block Pixel Difference (IBPD). The cover image is divided into 8×8 non overlapping blocks and difference between intensities of two pixels of adjacent blocks at predefined positions is calculated. Depending upon the watermark bit to be embedded; both the pixels are modified to bring the
Digital pictures are exchanged above assorted kinds of networks. It is frequently real that a colossal portion of this data is whichever confidential or private. Encryption is the favored method for protecting the sent data. There are assorted encryption arrangements to encrypt and decrypt picture data, though, it can be clashed that there is no solitary encryption algorithm that gratifies the disparate picture types.
In today’s world when whole world become digitized there is need not only to store and transmit data but security is also main concern i.e. transmission of data with high security. In earlier time there ware attempts to hide a message in trusted media so as to deliver it across the enemy territory[1]. In the modern time of digital communication, several methods are used for hiding information in any medium. There are many method one of such technique is steganography[2] in which digital images are used as a medium for hiding secret message or information in the form of various format such as digital images, video or audio file text file. The main goal of steganography is to increase communication security by inserting secret message into the digital image by modifying the pixels of the image which are not very essential. Another most reliable method of information security is cryptography The steganography is differ from cryptography in the way that cryptography main aim is to keeping the contents of a information secret, while steganography main focuses on keeping the existence of a information secret. The science of protecting information which is mainly in the form of plain text, by transforming it (encrypting it) into an unreadable format, which is known as cipher text. Cryptography is the study of changing information from its normal, comprehensible format into an incomprehensible format, rendering it unreadable without secret knowing secret information and is mainly
The reason this scheme was considered remarkable was due to the fact that the secret message could be decoded directly by the human visual system; hence it can be called the visual cryptography scheme. The Decoding process involves printing the shares onto transparencies and superimposing them, the shares of a qualified set will reveal the secret image without any cryptographic computation. In this paper we analyze the basic model of visual cryptography for black and white images and the k out of n scheme. The basic scheme of visual cryptography is called the (2, 2) model otherwise known as the 2 out of 2 model. This model involves using 2 shares; a printed page of cipher text and a printed page of transparency (which serves as the secret key). Both layers appear indistinguishable from random noise. The clear text is revealed by superimposing both shares [2]. The basic model can be extended into the k out of n secret sharing problem which states; given a written message, we can generate n transparencies (shares) such that the original message is visible if any k (or more) are stacked together, but totally invisible if fewer than k transparencies are stacked together. A Visual Cryptographic Scheme is mainly applied to a binary image, which contains a collection of black and white pixels. Each pixel is handled separately and is encoded into p black and white sub pixels, which are printed in close proximity to each other so that the human
Secret sharing is a scheme that permits a secret message to be shared among a set P of n participants. The secret is shared in such a way that only qualified subsets of P can recover the secret, any nonqualified subset has no information on the secret. We take into consideration, the problem of encrypting pictures and printed texts such that it is perfectly secure without the hassle of using cryptographic computations. In 1979, Shamir [7] and Blakley [8] introduced the concept of a threshold scheme. A (k, n) threshold scheme is a method whereby n pieces of information of a secret key k, called shares are distributed among n participants so that the k cannot be re constructed from the knowledge of fewer than k shares. In 1995 Naor and Shamir [1] proposed a new type of cryptographic scheme, which could encode and decode secret images without any cryptographic computations. The reason this scheme was considered remarkable was that the secret message
The main goal of using the Image encryption is to avoid drawing attention to the transmission of hidden information. Storing the critical data in its original format is subjective to many risks. The embedding algorithm is used to embed the secret information in the image selected. Hashing is used to secure the sensitive information.
A remarkable feature of this technique is the high robustness to any kind of distortion, since both image areas are distorted in a similar way, which means that the watermark recovery by autocorrelation still works [23].
’int’. Also, the pixel values were normalized to the range 0 and 1, and one hot encode the
The method of feature extraction is based on the spatial distribution of the black and white pixels in the image space. We are assuming that the difference of distribution of pixels for each digit are sufficient enough to classify them.