Classify the advanced encryption standard-butterfly effect in protecting image of copyright piracy.pptx
1. Classify the advanced encryption standard-
butterfly effect in protecting image of copyright
piracy
Presented By
Team members :
● Shiva Surya Vasan S
● Ranjith B S
● Subha V
● Rasiga J
Cryptography and Network
Security
2. Abstract
● This study is analyzed using the five metrics namely the visual analysis, file size,
luminosity histogram, comparison by pixel, and hamming distance.
● The zero results in the hamming distance indicate that there is no changes in the
image from the original until it is being encrypted and decrypted.
● In the histogram analysis, it yields a match or the same result from the original,
encrypted and decrypted file which interprets that the image did not changed. From
these results, AES-BE encryption techniques can be used for copyright protection of
the image.
3. AES Butterfly Effect
● There are challenges to address regarding security in ensuring individual piracy
that should be protected while making the data accessible to all [12]. With that, the
security tool for addressing this issue is through encryption [11]. A new AES-BE is
developed to improve the security in encrypting and decrypting the data of AES
algorithm in protecting image on copyright piracy.
● The experimentation of the study will be tested using file size, luminosity
histogram, pixel and hamming distance.
4. ● The new AES-BE algorithm is a modified AES algorithm integrating the Butterfly
Effect nonlinear differential equation.
● Method for creating and managing the key in AES where its focus is on integrating the
enhanced AES and specifying the secret keys taken from the quantum key
● It resulted that the AES model outperforms RSA and DES algorithms where the
computation time experimentation showed DES takes lesser time of encrypting data
and AES consumes the least use of the memory capacity. RSA takes longer in
encrypting the data and in the use of memory.
5. The Proposed Image Copyright Protection Technique
The encryption process is done after completely reading the EXIF of digital image. The
processes of the encryption are as follows:
1. Upload original image.
2. Get the EXIF of the original image.
3. Encrypt the EXIF of the original image using AES-BE which resulted to cipher EXIF.
4. Delete the original EXIF and append the cipher EXIF which results to an encrypted
EXIF image.
6. For the decryption process of EXIF digital image which is shown
in the schematic Figure 3 follows the given steps:
1. Upload encrypted EXIF image.
2. Get cipher EXIF.
3. Decrypt the cipher EXIF using AES-BE which results to an EXIF file.
4. Restore EXIF and remove cipher EXIF which results to a decrypted EXIF image.
7. Result and Discussion
● The simulation results of the new AES-BE is conducted by comparing the original
image, image after encryption and decryption.
● The security metrics used in analyzing and evaluating
Visual Analysis
● A color image and a depth of color (pixels) has a different layout to the EXIF data in
an image. A color image and a color depth of the primary data located within the
digital image while being in the EXIF header of the image.
8. File Size
Table 1 presents the result of the file
size analysis where ten (10) files are
used as example to compare the file
size of the original, encrypted and
decrypted files.
9. Luminosity Histogram
● Each image has a color composition like gray, red and blue in each pixel.
● The composition of colors is what fills the color values in a single pixel digital image.
● A color change that occurs in one pixel will affect the value of the image histogram.
● In the process of encryption-decryption of digital image EXIF file, the histogram
analysis is needed to know the differences in terms of pixels.
10. Comparison By Pixel
● Table 3 presents the results on image
comparison by pixel for original image
and encrypted EXIF image
11. ● While Table 4 presents the image
comparison by pixel result between
original image and decrypted EXIF
image. There are 10 sets of data as
examples that shows the file name
and file type, the dimension, and the
comparison results.
12. Hamming Distance
● He hamming distance between original EXIF image and encrypted EXIF image and
original EXIF image and decrypted EXIF image.
● The results all appears a zero result in all images which produce a very good security
of the images.
● It means that the result of all images from the original to encrypted then decrypted
image produce the same picture result.
13. Conclusion
● After the simulation and testing results of the new algorithm using the five metrics,
the EXIF data obtained results that is secure by means of cryptography and
steganography algorithm named AES-BE and is appended into the file image.
● This proves there is a change in the primary data encryption and decryption process.
The zero results in the hamming distance indicate that there is no changes in the
image from the original until is being encrypted and decrypted.