SlideShare a Scribd company logo
1 of 13
Classify the advanced encryption standard-
butterfly effect in protecting image of copyright
piracy
Presented By
Team members :
● Shiva Surya Vasan S
● Ranjith B S
● Subha V
● Rasiga J
Cryptography and Network
Security
Abstract
● This study is analyzed using the five metrics namely the visual analysis, file size,
luminosity histogram, comparison by pixel, and hamming distance.
● The zero results in the hamming distance indicate that there is no changes in the
image from the original until it is being encrypted and decrypted.
● In the histogram analysis, it yields a match or the same result from the original,
encrypted and decrypted file which interprets that the image did not changed. From
these results, AES-BE encryption techniques can be used for copyright protection of
the image.
AES Butterfly Effect
● There are challenges to address regarding security in ensuring individual piracy
that should be protected while making the data accessible to all [12]. With that, the
security tool for addressing this issue is through encryption [11]. A new AES-BE is
developed to improve the security in encrypting and decrypting the data of AES
algorithm in protecting image on copyright piracy.
● The experimentation of the study will be tested using file size, luminosity
histogram, pixel and hamming distance.
● The new AES-BE algorithm is a modified AES algorithm integrating the Butterfly
Effect nonlinear differential equation.
● Method for creating and managing the key in AES where its focus is on integrating the
enhanced AES and specifying the secret keys taken from the quantum key
● It resulted that the AES model outperforms RSA and DES algorithms where the
computation time experimentation showed DES takes lesser time of encrypting data
and AES consumes the least use of the memory capacity. RSA takes longer in
encrypting the data and in the use of memory.
The Proposed Image Copyright Protection Technique
The encryption process is done after completely reading the EXIF of digital image. The
processes of the encryption are as follows:
1. Upload original image.
2. Get the EXIF of the original image.
3. Encrypt the EXIF of the original image using AES-BE which resulted to cipher EXIF.
4. Delete the original EXIF and append the cipher EXIF which results to an encrypted
EXIF image.
For the decryption process of EXIF digital image which is shown
in the schematic Figure 3 follows the given steps:
1. Upload encrypted EXIF image.
2. Get cipher EXIF.
3. Decrypt the cipher EXIF using AES-BE which results to an EXIF file.
4. Restore EXIF and remove cipher EXIF which results to a decrypted EXIF image.
Result and Discussion
● The simulation results of the new AES-BE is conducted by comparing the original
image, image after encryption and decryption.
● The security metrics used in analyzing and evaluating
Visual Analysis
● A color image and a depth of color (pixels) has a different layout to the EXIF data in
an image. A color image and a color depth of the primary data located within the
digital image while being in the EXIF header of the image.
File Size
Table 1 presents the result of the file
size analysis where ten (10) files are
used as example to compare the file
size of the original, encrypted and
decrypted files.
Luminosity Histogram
● Each image has a color composition like gray, red and blue in each pixel.
● The composition of colors is what fills the color values in a single pixel digital image.
● A color change that occurs in one pixel will affect the value of the image histogram.
● In the process of encryption-decryption of digital image EXIF file, the histogram
analysis is needed to know the differences in terms of pixels.
Comparison By Pixel
● Table 3 presents the results on image
comparison by pixel for original image
and encrypted EXIF image
● While Table 4 presents the image
comparison by pixel result between
original image and decrypted EXIF
image. There are 10 sets of data as
examples that shows the file name
and file type, the dimension, and the
comparison results.
Hamming Distance
● He hamming distance between original EXIF image and encrypted EXIF image and
original EXIF image and decrypted EXIF image.
● The results all appears a zero result in all images which produce a very good security
of the images.
● It means that the result of all images from the original to encrypted then decrypted
image produce the same picture result.
Conclusion
● After the simulation and testing results of the new algorithm using the five metrics,
the EXIF data obtained results that is secure by means of cryptography and
steganography algorithm named AES-BE and is appended into the file image.
● This proves there is a change in the primary data encryption and decryption process.
The zero results in the hamming distance indicate that there is no changes in the
image from the original until is being encrypted and decrypted.

More Related Content

Similar to Classify the advanced encryption standard-butterfly effect in protecting image of copyright piracy.pptx

A NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNEL
A NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNELA NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNEL
A NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNEL
ijcsit
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
ZiadAlqady
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
ZiadAlqady
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
ZiadAlqady
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
ZiadAlqady
 
IJAER Publishes
IJAER PublishesIJAER Publishes
IJAER Publishes
AmAl C
 

Similar to Classify the advanced encryption standard-butterfly effect in protecting image of copyright piracy.pptx (20)

steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...
 
G044082934
G044082934G044082934
G044082934
 
Encryption of Decomposed Image by using ASCII Code based Carrier Signal
Encryption of Decomposed Image by using ASCII Code based Carrier SignalEncryption of Decomposed Image by using ASCII Code based Carrier Signal
Encryption of Decomposed Image by using ASCII Code based Carrier Signal
 
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
 
Steganoid - A tool for steganography
Steganoid - A tool for steganographySteganoid - A tool for steganography
Steganoid - A tool for steganography
 
Audio video steganography using forensic techniquefor data security
Audio video steganography using forensic techniquefor data securityAudio video steganography using forensic techniquefor data security
Audio video steganography using forensic techniquefor data security
 
A NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNEL
A NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNELA NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNEL
A NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNEL
 
Lossless Encryption using BITPLANE and EDGEMAP Crypt Algorithms
Lossless Encryption using BITPLANE and EDGEMAP Crypt AlgorithmsLossless Encryption using BITPLANE and EDGEMAP Crypt Algorithms
Lossless Encryption using BITPLANE and EDGEMAP Crypt Algorithms
 
A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and...
A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and...A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and...
A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and...
 
B017640811
B017640811B017640811
B017640811
 
A Cryptographic Key Generation Using 2D Graphics pixel Shuffling
A Cryptographic Key Generation Using 2D Graphics pixel ShufflingA Cryptographic Key Generation Using 2D Graphics pixel Shuffling
A Cryptographic Key Generation Using 2D Graphics pixel Shuffling
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
 
IRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure TransmissionIRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure Transmission
 
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyAn Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta Steganography
 
IJAER Publishes
IJAER PublishesIJAER Publishes
IJAER Publishes
 

More from KannanN45 (7)

CNS_Team_5.pptx
CNS_Team_5.pptxCNS_Team_5.pptx
CNS_Team_5.pptx
 
CNS team 6.pptx
CNS team 6.pptxCNS team 6.pptx
CNS team 6.pptx
 
CNS Case study.pptx
CNS Case study.pptxCNS Case study.pptx
CNS Case study.pptx
 
CNS ASSIGNMENT 2 TEAM 1.pptx
CNS ASSIGNMENT 2 TEAM 1.pptxCNS ASSIGNMENT 2 TEAM 1.pptx
CNS ASSIGNMENT 2 TEAM 1.pptx
 
data.pptx
data.pptxdata.pptx
data.pptx
 
UNIT-1 22-23.pptx
UNIT-1 22-23.pptxUNIT-1 22-23.pptx
UNIT-1 22-23.pptx
 
IT DEPT 1.8.23.pptx
IT DEPT 1.8.23.pptxIT DEPT 1.8.23.pptx
IT DEPT 1.8.23.pptx
 

Recently uploaded

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 

Recently uploaded (20)

fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 

Classify the advanced encryption standard-butterfly effect in protecting image of copyright piracy.pptx

  • 1. Classify the advanced encryption standard- butterfly effect in protecting image of copyright piracy Presented By Team members : ● Shiva Surya Vasan S ● Ranjith B S ● Subha V ● Rasiga J Cryptography and Network Security
  • 2. Abstract ● This study is analyzed using the five metrics namely the visual analysis, file size, luminosity histogram, comparison by pixel, and hamming distance. ● The zero results in the hamming distance indicate that there is no changes in the image from the original until it is being encrypted and decrypted. ● In the histogram analysis, it yields a match or the same result from the original, encrypted and decrypted file which interprets that the image did not changed. From these results, AES-BE encryption techniques can be used for copyright protection of the image.
  • 3. AES Butterfly Effect ● There are challenges to address regarding security in ensuring individual piracy that should be protected while making the data accessible to all [12]. With that, the security tool for addressing this issue is through encryption [11]. A new AES-BE is developed to improve the security in encrypting and decrypting the data of AES algorithm in protecting image on copyright piracy. ● The experimentation of the study will be tested using file size, luminosity histogram, pixel and hamming distance.
  • 4. ● The new AES-BE algorithm is a modified AES algorithm integrating the Butterfly Effect nonlinear differential equation. ● Method for creating and managing the key in AES where its focus is on integrating the enhanced AES and specifying the secret keys taken from the quantum key ● It resulted that the AES model outperforms RSA and DES algorithms where the computation time experimentation showed DES takes lesser time of encrypting data and AES consumes the least use of the memory capacity. RSA takes longer in encrypting the data and in the use of memory.
  • 5. The Proposed Image Copyright Protection Technique The encryption process is done after completely reading the EXIF of digital image. The processes of the encryption are as follows: 1. Upload original image. 2. Get the EXIF of the original image. 3. Encrypt the EXIF of the original image using AES-BE which resulted to cipher EXIF. 4. Delete the original EXIF and append the cipher EXIF which results to an encrypted EXIF image.
  • 6. For the decryption process of EXIF digital image which is shown in the schematic Figure 3 follows the given steps: 1. Upload encrypted EXIF image. 2. Get cipher EXIF. 3. Decrypt the cipher EXIF using AES-BE which results to an EXIF file. 4. Restore EXIF and remove cipher EXIF which results to a decrypted EXIF image.
  • 7. Result and Discussion ● The simulation results of the new AES-BE is conducted by comparing the original image, image after encryption and decryption. ● The security metrics used in analyzing and evaluating Visual Analysis ● A color image and a depth of color (pixels) has a different layout to the EXIF data in an image. A color image and a color depth of the primary data located within the digital image while being in the EXIF header of the image.
  • 8. File Size Table 1 presents the result of the file size analysis where ten (10) files are used as example to compare the file size of the original, encrypted and decrypted files.
  • 9. Luminosity Histogram ● Each image has a color composition like gray, red and blue in each pixel. ● The composition of colors is what fills the color values in a single pixel digital image. ● A color change that occurs in one pixel will affect the value of the image histogram. ● In the process of encryption-decryption of digital image EXIF file, the histogram analysis is needed to know the differences in terms of pixels.
  • 10. Comparison By Pixel ● Table 3 presents the results on image comparison by pixel for original image and encrypted EXIF image
  • 11. ● While Table 4 presents the image comparison by pixel result between original image and decrypted EXIF image. There are 10 sets of data as examples that shows the file name and file type, the dimension, and the comparison results.
  • 12. Hamming Distance ● He hamming distance between original EXIF image and encrypted EXIF image and original EXIF image and decrypted EXIF image. ● The results all appears a zero result in all images which produce a very good security of the images. ● It means that the result of all images from the original to encrypted then decrypted image produce the same picture result.
  • 13. Conclusion ● After the simulation and testing results of the new algorithm using the five metrics, the EXIF data obtained results that is secure by means of cryptography and steganography algorithm named AES-BE and is appended into the file image. ● This proves there is a change in the primary data encryption and decryption process. The zero results in the hamming distance indicate that there is no changes in the image from the original until is being encrypted and decrypted.