SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3012
CRYPTANALYSIS OF A TEXT ENCRYPTION SCHEME BASED ON BIT
PLANE EXTRACTION
THAMIZHARASI.K1, SANTHOSH.M2
1Assistant Professor, Department of CSE, Jeppiaar SRR Engineering College, Padur, Chennai.
2Final Year Student, Department of CSE, Jeppiaar SRR Engineering College, Padur, Chennai.
---------------------------------------------------------------------***----------------------------------------------------------------------
ABSTRACT: As of late, a picture encryption conspire joining
with bit-plane extraction. The plan separates paired piece
planes from the plain-picture and performs bit level stageand
disarray, which are constrained by a pseudo-irregular
arrangement and an arbitrary picture produced by the
Logistic guide, individually. As thelinesandsectionsofthefour
LSBPs are permuted with a similar pseudo-arbitrarygrouping
and the encryption procedure doesn't include the factual
attributes of the plain-picture, rightnowbuildupadevicethat
can scramble/decode content utilizing picture bit plane
extraction. The exploratory reenactment results showed that
the improved plan is great as far as different cryptographic
measurements.
KEYWORDS: Cocreation, customer integration, customer
orientation, literature review, new product development.
I. INTRODUCTION
An essential thought behind actualizing venture
Steganography with Cryptography utilizing MATLAB and
However, the two fundamental terms related with this idea
are Cryptography and Steganography. Cryptography is the
specialty of securing data by scrambling it into a
configuration which can't be perused effectivelyandiscalled
as figure content. This figure content or mystery message
must be perused by the individuals who have a mystery key
can interpret (or decode) the message into plain content.
Steganography is the specialty of concealing the data which
is to be conveyed in other data. Most generally utilized
document design for correspondence is Digital Imagedueits
recurrence on the Internet. For concealing mystery data in
pictures, there exists a huge assortment of steganography
strategies some are more unpredictable than others and
every one of them have separate solid and feeble focuses.
Various applications have various prerequisites of the
steganography system utilized. For instance, a few
applications may require outright imperceptibility of the
mystery data, while othersrequirea biggermysterymessage
to be covered up. Right now is been indicated how a content
archive can be covered up in a picture record and
furthermore how a picture can be covered up in another
picture. This application will be first of its sort to be
actualized on cloud and the info will be through android
Application where in the pictures from the android
telephone will make a trip to the cloudservewhereMATLAB
will process the pictures and result are returned back to
android telephone. Steganography can bearrangedintofour
sorts. Right now steganography a limited quantity of excess
information, in this mannertheyaremostordinarilyutilized.
• Audio/Video steganography: They are exceptionally mind
boggling being used. Picture Steganography: It is famously
utilized steganography for concealing information since it
gives a protected and basic approach to send the data over
the web. Pictures are routinely utilized inassortedzones,for
example, clinical, military, science, designing, publicizing,
instruction just as preparing. With the expanding utilization
of advanced systems for transmitting and putting away
pictures, the essential issue of ensuring the secrecy,
uprightness just as the realness of pictures has become a
significant concern.
II. LITERATURE SURVEY
Image encryption based on Independent Component
Analysis and Arnold’s Cat Map Nidaa Abdul Mohsin
Abbas University of Babylon, CollegeofIT,IraqReceived
27 May 2015; revised 3 October 2015; accepted 16
October 2015.
DESCRIPTION:
Security of the interactive media information including
picture and video is one of the fundamental prerequisites for
the broadcast communications and PC systems. Right now,
new effective picture encryption system is introduced. It
depends on altering the blending grid in Independent
Component Analysis (ICA) utilizing the disorderly Arnold's
Cat Map (ACM) for encryption. To start with, the blending
network is produced from the ACM by embedsquarepicture
of any measurement. Second, the blending procedure is
executed utilizing the blending lattice and the picture
sources the outcome is the encryption pictures that rely
upon the quantity of sources. Third, pictures unscrambled
utilizing ICA calculations. We utilize the Joint Approximate
Diagonalization of Eigen-grids (JADE) calculation as a
contextual investigation.
A Joint Watermarking System for Verifying the
Reliability of Medical Images: Dalel Bouslimi, Member,
IEEE, Gouenou Coatrieux, Member, IEEE, Michel Cozic,
and Christian Roux, Fellow, IEEE., VOL. 16, NO. 5,
SEPTEMBER 2012.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3013
DESCRIPTION:
Right now, propose a joint encryption/watermarking
framework to ensure clinical pictures. This framework
depends on a methodology which joins a substitutive
watermarking calculation, the quantization record balance,
with an encryption calculation: a stream figure calculation
(e.g., the RC4) or a square figure calculation (e.g., the AES in
figure square tying (CBC) method of activity). Our goal is to
offer access to the results of the picture respectability and of
its birthplace despite the fact that the picture is put away
encoded. On the off chance that watermarking and
encryption are led together at the assurance arrange,
watermark extraction and decoding can be applied
autonomously. The security examinationofourplanand test
results accomplished on 8-piece profundity ultrasound
pictures just as on 16-piece encoded positron discharge
tomography pictures show the capacity of our framework to
safely make accessible security properties in both spatial
and scrambled areas while limitingpicturetwisting.Besides,
by utilizing the AES square figure in CBCmode,theproposed
framework is agreeable with or straightforward to the
DICOM standard.
Digital image watermarking: its formal model,
fundamental properties and possible attacks: Hussain
Nyeem1*, Wageeh Boles2 and Colin Boyd2,3., Nyeem et
al. EURASIP Journal on Advances in Signal Processing
2014, 2014:135.
DESCRIPTION:
While formal definitions and security proofs are dug in
specific fields like cryptographyandsteganography,they are
not as clear in cutting edge watermarking research. An
efficient improvement of watermarking plans is charming,
anyway at present,theirprogressioniscommonlyeasygoing,
extraordinarily delegated, and disposes of the all out
affirmation of use circumstances. This preparation not
simply agitates the choice and usage of a sensible
arrangement for a watermarking application, yet what's
more prompts chitchat about the top tier for different
watermarking applications. With a view to the intentional
headway of watermarking plans, we present a regular
nonexclusive model for automated picture watermarking.
Contemplating potential wellsprings of data,yields,andpart
works, the basic improvement of a crucial watermarking
model is become further to join the use of keys. In view of
our proposed model, basic watermarking properties are
portrayed and their essentialness exemplified for different
picture applications. We similarly portray a great deal of
potential attacks using our model showingdifferentwinning
circumstances depending uponthefoelimits.Itis envisioned
that with a fitting idea of watermarking properties and
enemy exercises in different picture applications, use of the
proposed model would allow a united treatment of just for
all expectations and purposes huge varieties of
watermarking plans.
Hiding in encrypted images: a three securitydatahiding
methodologies: Shabir A. Parah1 · Javaid A. Sheikh1 ·
Umer I. Assad2 · Ghulam M. Bhat1., Received: 19 August
2014 / Revised: 13 August 2015 / Accepted: 27 August
2015.
DESCRIPTION:
This paper presents another crypto space information
concealing method dependent on Intermediate Significant
Bit Plane Embedding (ISBPE). Thespreadpictureisencoded;
the data to be made sure about is mixed, and afterward
inserted in the Intermediate Significant Bit (ISB) planes of
scrambled spread picture, at the areas controlled by a
Pseudorandom Address Vector (PAV). The pseudorandom
implanting of the mixed information in the ISB planes of
scrambled picture brings about a three level security of the
information to be made sure about. The ISBPE implanting
brings about a significant bit of leeway that the proposed
plot turns out to be totally strong to usually utilized assault
of Least Significant Bit (LSB) expulsion/substitution. A tale
idea of inserting an extremely little size delicate watermark
notwithstanding the mystery data has been utilized which
encourages early alter location. This element could spare
pivotal processor time in basic circumstances of national
security issues/fighting and so forth. Trial results show that
the proposed plot is increasingly powerful to different sign
preparing assaults like Joint Picture Expert Group pressure,
Additive White Gaussian Noise and 'salt and pepper'
commotion when contrasted with regular LSB based
inserting strategies. Correlation results with some notable
procedures show that other than givinghighlevel ofsecurity
and strength to different malevolent assaults the prop osed
strategy is fit for inserting a genuinely huge measure of
mystery information in the host picture while keeping up a
decent stego-picture quality.
III. EXSISTING SYSTEM
Discrete Cosine Transform Discrete Cosine Transform is
identified with DFT as it were that it changes a period space
signal into its recurrence parts. The DCT anyway just uses
the genuine pieces of the DFT coefficients.Asfarasproperty,
the DCT has a solid vitality compactionpropertyandthevast
majority of the sign data will in general be moved ina couple
of low-recurrence segments of the DCT. The JPEG pressure
system uses this property to separate and expel immaterial
high recurrence segments in pictures.
IV. PROPOSED SYSTEM
This paper analyzed the security performance of an image
text encryption scheme based on bit-plane extraction and
multiple chaotic maps. Based on the identified security
defects, we proposed efficient know-plaintext and chosen-
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3014
plaintext attacks for recovering some information of the
original plain image.
V. MODULE DESCRIPTION
1. PREPROCESSING
2. BIT PLANE EXTRACTION
3. ENCRYPTION
4. DECRYPTION
DESCRIPTION:
PREPROCESSING
Let the client select from a rundown of all the demo pictures
that transport with the Image Processing Toolbox. Pictureis
fundamentally mix of individual pixel (dabs) data. At the
point when we compose that picture is of 620 X 480 sizes, it
implies that picture has 620 pixels level way and 480 pixels
vertical way. Thus, by and large there are 620 X 480 pixels
and every pixel contains some data about picture.
BIT PLANE EXTRACTION
Dim scale picture are essentially those picture which we
state high contrast picture. Every pixel of dark scale picture
has a worth lies in the middle of 0 – 255 which chooses at
which position, the picture will be dark and at which
position, it will be white. On the off chance that pixel esteem
is 0, it implies that pixel shading will be completely dark and
on the off chance that pixel esteem is 255, at that point that
pixel will be completely white and pixel having middleofthe
road worth will have shades of high contrast. We are given a
Gray scale Image. Since pixel estimation ofdark scalepicture
lies between 0 - 255, so its data is contained utilizing8piece.
Along these lines, we can separate that picture into 8 planes
(8 Binary Image). Double picture are those pictures whose
pixel worth can be either 0 or 1. Along these lines, our
undertaking is to separate each piece planes of unique
picture to make 8 parallel pictures Let specific pixel of dim
scale picture has esteem 212. Along these lines, its double
worth will be 11010100. In this way, its first piece is 0,
second is 0, third is 1, 4rth is 0, fifth is 1, sixth is 0, seventh is
1, eighth is 1. Right now, will take this 8 piece everything
being equal and will draw 8 parallel pictures. We need to do
this to all the pixels and create new pictures.
METHOD EXPLANATION
 Least Significant Bit-planes (LSBP)
 Most Significant Bit planes(MSBP)
An 8-bit plain-image, which is denoted by I , canbeextracted
as eight binary bit-planes I1; I2;-----; I8, and each binary bit
plane contains one bit information of the image. Binary
matrixes I1, I2, I3, and I4 represent the least significant bits
planes (LSBPs). In contrast, matrixes I5, I6, I7, and I8
represent the MSBPs . Every bit plane is different in terms of
the amount of contained visual information. The quantity of
visual information contained in the binary bit planes is
incremented from I1 to I8 in order. The smallest amount of
information of the plain-image is presented in the bit plane
LSB1, while the largest amount of visual information is
contained in MSB8.
ENCRYPTION
Encryption is a procedure which changes the first data into
an unrecognizable structure. This newtypeofthemessage is
altogether not quite the same as thefirstmessage.Thatis the
reason a programmer can't peruse the information as
senders utilize an encryption calculation. Encryption is
generally done utilizing keycalculations.Hereweencodethe
content in to the picture with the assistance of bit plane
extraction and create the emit key.
DECRYPTION
Unscrambling is a procedure of changing over
encoded/scrambled information in a structure that is lucid
and comprehended by a human or a PC. This technique we
performed by un-encoding the by utilizing keys used to
scramble the first information.
VI. SYSTEM ARCHITECTURE
Framework design is the theoretical model that
characterizes the structure, conduct, and more perspectives
on a framework. A design depiction is a conventional
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3015
portrayal and portrayal of a framework, sortedoutsuchthat
supports thinking about the structures and practices of the
framework. A framework engineering can comprise of
framework segments and the sub-frameworks created, that
will cooperate to actualize the general framework.
VII. RESULTS
VIII. CONCLUSION
This paper analyzed the security performance of a text
encryption scheme based on bit-plane extraction. Based on
the identified security defects, we proposed efficient know-
plaintext and chosen-plaintext attacks for recovering some
information of the original plain text. Adopting a statistical
value of the plain-image in the diffusion phase; building a
relation mechanism between each positionoftheLSBsplane
with the corresponding position in the MSBs planetoreduce
the correlation among neighboring pixels of the plain-text.
IX. REFERENCES
[1] Image encryption based on Independent Component
Analysis and Arnold’s Cat Map Nidaa AbdulMohsin Abbas
University of Babylon, College of IT, Iraq Received 27 May
2015; revised 3 October 2015; accepted 16 October 2015.
[2] A Joint Encryption/Watermarking System for Verifying
the Reliability of Medical Images Dalel Bouslimi, Member,
IEEE, Gouenou Coatrieux, Member, IEEE, Michel Cozic, and
Christian Roux, Fellow, IEEE., VOL. 16, NO. 5, SEPTEMBER
2012.
[3] Digital image watermarking: its formal model,
fundamental properties and possible attacks Hussain
Nyeem1*, Wageeh Boles2 and Colin Boyd2,3., Nyeem et al.
EURASIP Journal on Advances in Signal Processing 2014,
2014:135.
[4] Hiding in encrypted images: a three tier security data
hiding technique Shabir A. Parah1 · Javaid A. Sheikh1 · Umer
I. Assad2 · Ghulam M. Bhat1., Received: 19 August 2014 /
Revised: 13 August 2015 / Accepted: 27 August 2015.
[5] H.-C. Lin, C.-N. Yang, C.-S. Laih, and H.-T. Lin, ``Natural
language letter based visual cryptography scheme,'' J. Vis.
Commun. Image Represent., vol. 24, no. 3, pp. 318331, 2013.
[6] S. A. Sattar, S. Haque, M. K. Pathan, and Q. Gee,
``Implementation challenges for Nastaliq character
recognition,'' in Proc. Int. Multi Topic Conf. Berlin, Germany:
Springer, 2008, pp. 279285.
[7] R. G. Sharma, ``Visual cryptographictechniquesforsecret
image shar- ing: A review,'' Inf. Secur. J., Global Perspective,
vol. 27, nos. 56, pp. 241259, Jan. 2019. doi:
10.1080/19393555.2019.1567872.
[8] J. Nantel and E. Glaser, ``The impact of language and
culture on per- ceived website usability,'' J. Eng. Technol.
Manage., vol. 25, nos. 12, pp. 112122, 2008.
[9] K. Katzner, The Languages of the World. Evanston, IL,
USA: Routledge, 2002. [Online]. Available:
https://www.questia.com/ library/108070247/the-
languages-of-the-world.
[10] J. Ramya and B. Parvathavarthini,``Anextensive review
on visual cryptog- raphy schemes,''inProc.Int.Conf.Control,
Instrum., Commun. Comput. Technol., Kanyakumari, India,
Jul. 2014, pp. 223228.

More Related Content

What's hot

76201950
7620195076201950
76201950IJRAT
 
NEURAL NETWORKS FOR HIGH PERFORMANCE TIME-DELAY ESTIMATION AND ACOUSTIC SOURC...
NEURAL NETWORKS FOR HIGH PERFORMANCE TIME-DELAY ESTIMATION AND ACOUSTIC SOURC...NEURAL NETWORKS FOR HIGH PERFORMANCE TIME-DELAY ESTIMATION AND ACOUSTIC SOURC...
NEURAL NETWORKS FOR HIGH PERFORMANCE TIME-DELAY ESTIMATION AND ACOUSTIC SOURC...csandit
 
IRJET- A Survey on Medical Image Interpretation for Predicting Pneumonia
IRJET- A Survey on Medical Image Interpretation for Predicting PneumoniaIRJET- A Survey on Medical Image Interpretation for Predicting Pneumonia
IRJET- A Survey on Medical Image Interpretation for Predicting PneumoniaIRJET Journal
 
Human Motion Detection in Video Surveillance using Computer Vision Technique
Human Motion Detection in Video Surveillance using Computer Vision TechniqueHuman Motion Detection in Video Surveillance using Computer Vision Technique
Human Motion Detection in Video Surveillance using Computer Vision TechniqueIRJET Journal
 
Deep Learning for Structure-from-Motion (SfM)
Deep Learning for Structure-from-Motion (SfM)Deep Learning for Structure-from-Motion (SfM)
Deep Learning for Structure-from-Motion (SfM)PetteriTeikariPhD
 
A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN
A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN
A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN csandit
 
Shallow introduction for Deep Learning Retinal Image Analysis
Shallow introduction for Deep Learning Retinal Image AnalysisShallow introduction for Deep Learning Retinal Image Analysis
Shallow introduction for Deep Learning Retinal Image AnalysisPetteriTeikariPhD
 
Minimum image disortion of reversible data hiding
Minimum image disortion of reversible data hidingMinimum image disortion of reversible data hiding
Minimum image disortion of reversible data hidingIRJET Journal
 
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...IRJET Journal
 
Foreground algorithms for detection and extraction of an object in multimedia...
Foreground algorithms for detection and extraction of an object in multimedia...Foreground algorithms for detection and extraction of an object in multimedia...
Foreground algorithms for detection and extraction of an object in multimedia...IJECEIAES
 
Application To Monitor And Manage People In Crowded Places Using Neural Networks
Application To Monitor And Manage People In Crowded Places Using Neural NetworksApplication To Monitor And Manage People In Crowded Places Using Neural Networks
Application To Monitor And Manage People In Crowded Places Using Neural NetworksIJSRED
 
Indoor Point Cloud Processing - Deep learning for semantic segmentation of in...
Indoor Point Cloud Processing - Deep learning for semantic segmentation of in...Indoor Point Cloud Processing - Deep learning for semantic segmentation of in...
Indoor Point Cloud Processing - Deep learning for semantic segmentation of in...CubiCasa
 
Dataset creation for Deep Learning-based Geometric Computer Vision problems
Dataset creation for Deep Learning-based Geometric Computer Vision problemsDataset creation for Deep Learning-based Geometric Computer Vision problems
Dataset creation for Deep Learning-based Geometric Computer Vision problemsPetteriTeikariPhD
 
Personalized outfit recommendation with learnable anchors
Personalized outfit recommendation with learnable anchorsPersonalized outfit recommendation with learnable anchors
Personalized outfit recommendation with learnable anchorsharmonylab
 
OCT Monte Carlo & Deep Learning
OCT Monte Carlo & Deep LearningOCT Monte Carlo & Deep Learning
OCT Monte Carlo & Deep LearningPetteriTeikariPhD
 
Inspection of Suspicious Human Activity in the Crowd Sourced Areas Captured i...
Inspection of Suspicious Human Activity in the Crowd Sourced Areas Captured i...Inspection of Suspicious Human Activity in the Crowd Sourced Areas Captured i...
Inspection of Suspicious Human Activity in the Crowd Sourced Areas Captured i...IRJET Journal
 

What's hot (18)

76201950
7620195076201950
76201950
 
NEURAL NETWORKS FOR HIGH PERFORMANCE TIME-DELAY ESTIMATION AND ACOUSTIC SOURC...
NEURAL NETWORKS FOR HIGH PERFORMANCE TIME-DELAY ESTIMATION AND ACOUSTIC SOURC...NEURAL NETWORKS FOR HIGH PERFORMANCE TIME-DELAY ESTIMATION AND ACOUSTIC SOURC...
NEURAL NETWORKS FOR HIGH PERFORMANCE TIME-DELAY ESTIMATION AND ACOUSTIC SOURC...
 
IRJET- A Survey on Medical Image Interpretation for Predicting Pneumonia
IRJET- A Survey on Medical Image Interpretation for Predicting PneumoniaIRJET- A Survey on Medical Image Interpretation for Predicting Pneumonia
IRJET- A Survey on Medical Image Interpretation for Predicting Pneumonia
 
Human Motion Detection in Video Surveillance using Computer Vision Technique
Human Motion Detection in Video Surveillance using Computer Vision TechniqueHuman Motion Detection in Video Surveillance using Computer Vision Technique
Human Motion Detection in Video Surveillance using Computer Vision Technique
 
Geometric Deep Learning
Geometric Deep Learning Geometric Deep Learning
Geometric Deep Learning
 
Deep Learning for Structure-from-Motion (SfM)
Deep Learning for Structure-from-Motion (SfM)Deep Learning for Structure-from-Motion (SfM)
Deep Learning for Structure-from-Motion (SfM)
 
A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN
A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN
A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN
 
Shallow introduction for Deep Learning Retinal Image Analysis
Shallow introduction for Deep Learning Retinal Image AnalysisShallow introduction for Deep Learning Retinal Image Analysis
Shallow introduction for Deep Learning Retinal Image Analysis
 
PointNet
PointNetPointNet
PointNet
 
Minimum image disortion of reversible data hiding
Minimum image disortion of reversible data hidingMinimum image disortion of reversible data hiding
Minimum image disortion of reversible data hiding
 
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
 
Foreground algorithms for detection and extraction of an object in multimedia...
Foreground algorithms for detection and extraction of an object in multimedia...Foreground algorithms for detection and extraction of an object in multimedia...
Foreground algorithms for detection and extraction of an object in multimedia...
 
Application To Monitor And Manage People In Crowded Places Using Neural Networks
Application To Monitor And Manage People In Crowded Places Using Neural NetworksApplication To Monitor And Manage People In Crowded Places Using Neural Networks
Application To Monitor And Manage People In Crowded Places Using Neural Networks
 
Indoor Point Cloud Processing - Deep learning for semantic segmentation of in...
Indoor Point Cloud Processing - Deep learning for semantic segmentation of in...Indoor Point Cloud Processing - Deep learning for semantic segmentation of in...
Indoor Point Cloud Processing - Deep learning for semantic segmentation of in...
 
Dataset creation for Deep Learning-based Geometric Computer Vision problems
Dataset creation for Deep Learning-based Geometric Computer Vision problemsDataset creation for Deep Learning-based Geometric Computer Vision problems
Dataset creation for Deep Learning-based Geometric Computer Vision problems
 
Personalized outfit recommendation with learnable anchors
Personalized outfit recommendation with learnable anchorsPersonalized outfit recommendation with learnable anchors
Personalized outfit recommendation with learnable anchors
 
OCT Monte Carlo & Deep Learning
OCT Monte Carlo & Deep LearningOCT Monte Carlo & Deep Learning
OCT Monte Carlo & Deep Learning
 
Inspection of Suspicious Human Activity in the Crowd Sourced Areas Captured i...
Inspection of Suspicious Human Activity in the Crowd Sourced Areas Captured i...Inspection of Suspicious Human Activity in the Crowd Sourced Areas Captured i...
Inspection of Suspicious Human Activity in the Crowd Sourced Areas Captured i...
 

Similar to IRJET - Cryptanalysis of a Text Encryption Scheme based on Bit Plane Extraction

IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...IRJET Journal
 
IRJET- A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...
IRJET-  	  A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...IRJET-  	  A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...
IRJET- A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...IRJET Journal
 
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvqIjri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvqIjripublishers Ijri
 
Weapon Detection using Artificial Intelligence and Deep Learning for Security...
Weapon Detection using Artificial Intelligence and Deep Learning for Security...Weapon Detection using Artificial Intelligence and Deep Learning for Security...
Weapon Detection using Artificial Intelligence and Deep Learning for Security...IRJET Journal
 
Digital watermarking by utilizing the properties of selforganization map bas...
Digital watermarking by utilizing the properties of selforganization map bas...Digital watermarking by utilizing the properties of selforganization map bas...
Digital watermarking by utilizing the properties of selforganization map bas...IJECEIAES
 
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...IAEME Publication
 
Chaos Based Image Encryption Techniques: A Review
Chaos Based Image Encryption Techniques: A ReviewChaos Based Image Encryption Techniques: A Review
Chaos Based Image Encryption Techniques: A ReviewIRJET Journal
 
IRJET - Information Hiding in H.264/AVC using Digital Watermarking
IRJET -  	  Information Hiding in H.264/AVC using Digital WatermarkingIRJET -  	  Information Hiding in H.264/AVC using Digital Watermarking
IRJET - Information Hiding in H.264/AVC using Digital WatermarkingIRJET Journal
 
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUEACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUEIRJET Journal
 
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...IJNSA Journal
 
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image SecurityIRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image SecurityIRJET Journal
 
IRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
IRJET- An Overview of Hiding Information in H.264/Avc Compressed VideoIRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
IRJET- An Overview of Hiding Information in H.264/Avc Compressed VideoIRJET Journal
 
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...IRJET Journal
 
CROP PROTECTION AGAINST BIRDS USING DEEP LEARNING AND IOT
CROP PROTECTION AGAINST BIRDS USING DEEP LEARNING AND IOTCROP PROTECTION AGAINST BIRDS USING DEEP LEARNING AND IOT
CROP PROTECTION AGAINST BIRDS USING DEEP LEARNING AND IOTIRJET Journal
 
IRJET- A Review Paper on Chaotic Map Image Encryption Techniques
IRJET-  	  A Review Paper on Chaotic Map Image Encryption TechniquesIRJET-  	  A Review Paper on Chaotic Map Image Encryption Techniques
IRJET- A Review Paper on Chaotic Map Image Encryption TechniquesIRJET Journal
 
An improved robust and secured image steganographic scheme
An improved robust and secured image steganographic schemeAn improved robust and secured image steganographic scheme
An improved robust and secured image steganographic schemeiaemedu
 
Deep Learning based Multi-class Brain Tumor Classification
Deep Learning based Multi-class Brain Tumor ClassificationDeep Learning based Multi-class Brain Tumor Classification
Deep Learning based Multi-class Brain Tumor ClassificationIRJET Journal
 
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...ijma
 
IRJET- Rice QA using Deep Learning
IRJET- Rice QA using Deep LearningIRJET- Rice QA using Deep Learning
IRJET- Rice QA using Deep LearningIRJET Journal
 

Similar to IRJET - Cryptanalysis of a Text Encryption Scheme based on Bit Plane Extraction (20)

IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
 
IRJET- A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...
IRJET-  	  A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...IRJET-  	  A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...
IRJET- A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...
 
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvqIjri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
 
Weapon Detection using Artificial Intelligence and Deep Learning for Security...
Weapon Detection using Artificial Intelligence and Deep Learning for Security...Weapon Detection using Artificial Intelligence and Deep Learning for Security...
Weapon Detection using Artificial Intelligence and Deep Learning for Security...
 
Digital watermarking by utilizing the properties of selforganization map bas...
Digital watermarking by utilizing the properties of selforganization map bas...Digital watermarking by utilizing the properties of selforganization map bas...
Digital watermarking by utilizing the properties of selforganization map bas...
 
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
 
Chaos Based Image Encryption Techniques: A Review
Chaos Based Image Encryption Techniques: A ReviewChaos Based Image Encryption Techniques: A Review
Chaos Based Image Encryption Techniques: A Review
 
IRJET - Information Hiding in H.264/AVC using Digital Watermarking
IRJET -  	  Information Hiding in H.264/AVC using Digital WatermarkingIRJET -  	  Information Hiding in H.264/AVC using Digital Watermarking
IRJET - Information Hiding in H.264/AVC using Digital Watermarking
 
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUEACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
 
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
 
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image SecurityIRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
 
IRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
IRJET- An Overview of Hiding Information in H.264/Avc Compressed VideoIRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
IRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
 
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
 
CROP PROTECTION AGAINST BIRDS USING DEEP LEARNING AND IOT
CROP PROTECTION AGAINST BIRDS USING DEEP LEARNING AND IOTCROP PROTECTION AGAINST BIRDS USING DEEP LEARNING AND IOT
CROP PROTECTION AGAINST BIRDS USING DEEP LEARNING AND IOT
 
IRJET- A Review Paper on Chaotic Map Image Encryption Techniques
IRJET-  	  A Review Paper on Chaotic Map Image Encryption TechniquesIRJET-  	  A Review Paper on Chaotic Map Image Encryption Techniques
IRJET- A Review Paper on Chaotic Map Image Encryption Techniques
 
An improved robust and secured image steganographic scheme
An improved robust and secured image steganographic schemeAn improved robust and secured image steganographic scheme
An improved robust and secured image steganographic scheme
 
Deep Learning based Multi-class Brain Tumor Classification
Deep Learning based Multi-class Brain Tumor ClassificationDeep Learning based Multi-class Brain Tumor Classification
Deep Learning based Multi-class Brain Tumor Classification
 
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
 
IRJET- Rice QA using Deep Learning
IRJET- Rice QA using Deep LearningIRJET- Rice QA using Deep Learning
IRJET- Rice QA using Deep Learning
 
A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...
A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...
A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Recently uploaded (20)

Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 

IRJET - Cryptanalysis of a Text Encryption Scheme based on Bit Plane Extraction

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3012 CRYPTANALYSIS OF A TEXT ENCRYPTION SCHEME BASED ON BIT PLANE EXTRACTION THAMIZHARASI.K1, SANTHOSH.M2 1Assistant Professor, Department of CSE, Jeppiaar SRR Engineering College, Padur, Chennai. 2Final Year Student, Department of CSE, Jeppiaar SRR Engineering College, Padur, Chennai. ---------------------------------------------------------------------***---------------------------------------------------------------------- ABSTRACT: As of late, a picture encryption conspire joining with bit-plane extraction. The plan separates paired piece planes from the plain-picture and performs bit level stageand disarray, which are constrained by a pseudo-irregular arrangement and an arbitrary picture produced by the Logistic guide, individually. As thelinesandsectionsofthefour LSBPs are permuted with a similar pseudo-arbitrarygrouping and the encryption procedure doesn't include the factual attributes of the plain-picture, rightnowbuildupadevicethat can scramble/decode content utilizing picture bit plane extraction. The exploratory reenactment results showed that the improved plan is great as far as different cryptographic measurements. KEYWORDS: Cocreation, customer integration, customer orientation, literature review, new product development. I. INTRODUCTION An essential thought behind actualizing venture Steganography with Cryptography utilizing MATLAB and However, the two fundamental terms related with this idea are Cryptography and Steganography. Cryptography is the specialty of securing data by scrambling it into a configuration which can't be perused effectivelyandiscalled as figure content. This figure content or mystery message must be perused by the individuals who have a mystery key can interpret (or decode) the message into plain content. Steganography is the specialty of concealing the data which is to be conveyed in other data. Most generally utilized document design for correspondence is Digital Imagedueits recurrence on the Internet. For concealing mystery data in pictures, there exists a huge assortment of steganography strategies some are more unpredictable than others and every one of them have separate solid and feeble focuses. Various applications have various prerequisites of the steganography system utilized. For instance, a few applications may require outright imperceptibility of the mystery data, while othersrequirea biggermysterymessage to be covered up. Right now is been indicated how a content archive can be covered up in a picture record and furthermore how a picture can be covered up in another picture. This application will be first of its sort to be actualized on cloud and the info will be through android Application where in the pictures from the android telephone will make a trip to the cloudservewhereMATLAB will process the pictures and result are returned back to android telephone. Steganography can bearrangedintofour sorts. Right now steganography a limited quantity of excess information, in this mannertheyaremostordinarilyutilized. • Audio/Video steganography: They are exceptionally mind boggling being used. Picture Steganography: It is famously utilized steganography for concealing information since it gives a protected and basic approach to send the data over the web. Pictures are routinely utilized inassortedzones,for example, clinical, military, science, designing, publicizing, instruction just as preparing. With the expanding utilization of advanced systems for transmitting and putting away pictures, the essential issue of ensuring the secrecy, uprightness just as the realness of pictures has become a significant concern. II. LITERATURE SURVEY Image encryption based on Independent Component Analysis and Arnold’s Cat Map Nidaa Abdul Mohsin Abbas University of Babylon, CollegeofIT,IraqReceived 27 May 2015; revised 3 October 2015; accepted 16 October 2015. DESCRIPTION: Security of the interactive media information including picture and video is one of the fundamental prerequisites for the broadcast communications and PC systems. Right now, new effective picture encryption system is introduced. It depends on altering the blending grid in Independent Component Analysis (ICA) utilizing the disorderly Arnold's Cat Map (ACM) for encryption. To start with, the blending network is produced from the ACM by embedsquarepicture of any measurement. Second, the blending procedure is executed utilizing the blending lattice and the picture sources the outcome is the encryption pictures that rely upon the quantity of sources. Third, pictures unscrambled utilizing ICA calculations. We utilize the Joint Approximate Diagonalization of Eigen-grids (JADE) calculation as a contextual investigation. A Joint Watermarking System for Verifying the Reliability of Medical Images: Dalel Bouslimi, Member, IEEE, Gouenou Coatrieux, Member, IEEE, Michel Cozic, and Christian Roux, Fellow, IEEE., VOL. 16, NO. 5, SEPTEMBER 2012.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3013 DESCRIPTION: Right now, propose a joint encryption/watermarking framework to ensure clinical pictures. This framework depends on a methodology which joins a substitutive watermarking calculation, the quantization record balance, with an encryption calculation: a stream figure calculation (e.g., the RC4) or a square figure calculation (e.g., the AES in figure square tying (CBC) method of activity). Our goal is to offer access to the results of the picture respectability and of its birthplace despite the fact that the picture is put away encoded. On the off chance that watermarking and encryption are led together at the assurance arrange, watermark extraction and decoding can be applied autonomously. The security examinationofourplanand test results accomplished on 8-piece profundity ultrasound pictures just as on 16-piece encoded positron discharge tomography pictures show the capacity of our framework to safely make accessible security properties in both spatial and scrambled areas while limitingpicturetwisting.Besides, by utilizing the AES square figure in CBCmode,theproposed framework is agreeable with or straightforward to the DICOM standard. Digital image watermarking: its formal model, fundamental properties and possible attacks: Hussain Nyeem1*, Wageeh Boles2 and Colin Boyd2,3., Nyeem et al. EURASIP Journal on Advances in Signal Processing 2014, 2014:135. DESCRIPTION: While formal definitions and security proofs are dug in specific fields like cryptographyandsteganography,they are not as clear in cutting edge watermarking research. An efficient improvement of watermarking plans is charming, anyway at present,theirprogressioniscommonlyeasygoing, extraordinarily delegated, and disposes of the all out affirmation of use circumstances. This preparation not simply agitates the choice and usage of a sensible arrangement for a watermarking application, yet what's more prompts chitchat about the top tier for different watermarking applications. With a view to the intentional headway of watermarking plans, we present a regular nonexclusive model for automated picture watermarking. Contemplating potential wellsprings of data,yields,andpart works, the basic improvement of a crucial watermarking model is become further to join the use of keys. In view of our proposed model, basic watermarking properties are portrayed and their essentialness exemplified for different picture applications. We similarly portray a great deal of potential attacks using our model showingdifferentwinning circumstances depending uponthefoelimits.Itis envisioned that with a fitting idea of watermarking properties and enemy exercises in different picture applications, use of the proposed model would allow a united treatment of just for all expectations and purposes huge varieties of watermarking plans. Hiding in encrypted images: a three securitydatahiding methodologies: Shabir A. Parah1 · Javaid A. Sheikh1 · Umer I. Assad2 · Ghulam M. Bhat1., Received: 19 August 2014 / Revised: 13 August 2015 / Accepted: 27 August 2015. DESCRIPTION: This paper presents another crypto space information concealing method dependent on Intermediate Significant Bit Plane Embedding (ISBPE). Thespreadpictureisencoded; the data to be made sure about is mixed, and afterward inserted in the Intermediate Significant Bit (ISB) planes of scrambled spread picture, at the areas controlled by a Pseudorandom Address Vector (PAV). The pseudorandom implanting of the mixed information in the ISB planes of scrambled picture brings about a three level security of the information to be made sure about. The ISBPE implanting brings about a significant bit of leeway that the proposed plot turns out to be totally strong to usually utilized assault of Least Significant Bit (LSB) expulsion/substitution. A tale idea of inserting an extremely little size delicate watermark notwithstanding the mystery data has been utilized which encourages early alter location. This element could spare pivotal processor time in basic circumstances of national security issues/fighting and so forth. Trial results show that the proposed plot is increasingly powerful to different sign preparing assaults like Joint Picture Expert Group pressure, Additive White Gaussian Noise and 'salt and pepper' commotion when contrasted with regular LSB based inserting strategies. Correlation results with some notable procedures show that other than givinghighlevel ofsecurity and strength to different malevolent assaults the prop osed strategy is fit for inserting a genuinely huge measure of mystery information in the host picture while keeping up a decent stego-picture quality. III. EXSISTING SYSTEM Discrete Cosine Transform Discrete Cosine Transform is identified with DFT as it were that it changes a period space signal into its recurrence parts. The DCT anyway just uses the genuine pieces of the DFT coefficients.Asfarasproperty, the DCT has a solid vitality compactionpropertyandthevast majority of the sign data will in general be moved ina couple of low-recurrence segments of the DCT. The JPEG pressure system uses this property to separate and expel immaterial high recurrence segments in pictures. IV. PROPOSED SYSTEM This paper analyzed the security performance of an image text encryption scheme based on bit-plane extraction and multiple chaotic maps. Based on the identified security defects, we proposed efficient know-plaintext and chosen-
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3014 plaintext attacks for recovering some information of the original plain image. V. MODULE DESCRIPTION 1. PREPROCESSING 2. BIT PLANE EXTRACTION 3. ENCRYPTION 4. DECRYPTION DESCRIPTION: PREPROCESSING Let the client select from a rundown of all the demo pictures that transport with the Image Processing Toolbox. Pictureis fundamentally mix of individual pixel (dabs) data. At the point when we compose that picture is of 620 X 480 sizes, it implies that picture has 620 pixels level way and 480 pixels vertical way. Thus, by and large there are 620 X 480 pixels and every pixel contains some data about picture. BIT PLANE EXTRACTION Dim scale picture are essentially those picture which we state high contrast picture. Every pixel of dark scale picture has a worth lies in the middle of 0 – 255 which chooses at which position, the picture will be dark and at which position, it will be white. On the off chance that pixel esteem is 0, it implies that pixel shading will be completely dark and on the off chance that pixel esteem is 255, at that point that pixel will be completely white and pixel having middleofthe road worth will have shades of high contrast. We are given a Gray scale Image. Since pixel estimation ofdark scalepicture lies between 0 - 255, so its data is contained utilizing8piece. Along these lines, we can separate that picture into 8 planes (8 Binary Image). Double picture are those pictures whose pixel worth can be either 0 or 1. Along these lines, our undertaking is to separate each piece planes of unique picture to make 8 parallel pictures Let specific pixel of dim scale picture has esteem 212. Along these lines, its double worth will be 11010100. In this way, its first piece is 0, second is 0, third is 1, 4rth is 0, fifth is 1, sixth is 0, seventh is 1, eighth is 1. Right now, will take this 8 piece everything being equal and will draw 8 parallel pictures. We need to do this to all the pixels and create new pictures. METHOD EXPLANATION  Least Significant Bit-planes (LSBP)  Most Significant Bit planes(MSBP) An 8-bit plain-image, which is denoted by I , canbeextracted as eight binary bit-planes I1; I2;-----; I8, and each binary bit plane contains one bit information of the image. Binary matrixes I1, I2, I3, and I4 represent the least significant bits planes (LSBPs). In contrast, matrixes I5, I6, I7, and I8 represent the MSBPs . Every bit plane is different in terms of the amount of contained visual information. The quantity of visual information contained in the binary bit planes is incremented from I1 to I8 in order. The smallest amount of information of the plain-image is presented in the bit plane LSB1, while the largest amount of visual information is contained in MSB8. ENCRYPTION Encryption is a procedure which changes the first data into an unrecognizable structure. This newtypeofthemessage is altogether not quite the same as thefirstmessage.Thatis the reason a programmer can't peruse the information as senders utilize an encryption calculation. Encryption is generally done utilizing keycalculations.Hereweencodethe content in to the picture with the assistance of bit plane extraction and create the emit key. DECRYPTION Unscrambling is a procedure of changing over encoded/scrambled information in a structure that is lucid and comprehended by a human or a PC. This technique we performed by un-encoding the by utilizing keys used to scramble the first information. VI. SYSTEM ARCHITECTURE Framework design is the theoretical model that characterizes the structure, conduct, and more perspectives on a framework. A design depiction is a conventional
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3015 portrayal and portrayal of a framework, sortedoutsuchthat supports thinking about the structures and practices of the framework. A framework engineering can comprise of framework segments and the sub-frameworks created, that will cooperate to actualize the general framework. VII. RESULTS VIII. CONCLUSION This paper analyzed the security performance of a text encryption scheme based on bit-plane extraction. Based on the identified security defects, we proposed efficient know- plaintext and chosen-plaintext attacks for recovering some information of the original plain text. Adopting a statistical value of the plain-image in the diffusion phase; building a relation mechanism between each positionoftheLSBsplane with the corresponding position in the MSBs planetoreduce the correlation among neighboring pixels of the plain-text. IX. REFERENCES [1] Image encryption based on Independent Component Analysis and Arnold’s Cat Map Nidaa AbdulMohsin Abbas University of Babylon, College of IT, Iraq Received 27 May 2015; revised 3 October 2015; accepted 16 October 2015. [2] A Joint Encryption/Watermarking System for Verifying the Reliability of Medical Images Dalel Bouslimi, Member, IEEE, Gouenou Coatrieux, Member, IEEE, Michel Cozic, and Christian Roux, Fellow, IEEE., VOL. 16, NO. 5, SEPTEMBER 2012. [3] Digital image watermarking: its formal model, fundamental properties and possible attacks Hussain Nyeem1*, Wageeh Boles2 and Colin Boyd2,3., Nyeem et al. EURASIP Journal on Advances in Signal Processing 2014, 2014:135. [4] Hiding in encrypted images: a three tier security data hiding technique Shabir A. Parah1 · Javaid A. Sheikh1 · Umer I. Assad2 · Ghulam M. Bhat1., Received: 19 August 2014 / Revised: 13 August 2015 / Accepted: 27 August 2015. [5] H.-C. Lin, C.-N. Yang, C.-S. Laih, and H.-T. Lin, ``Natural language letter based visual cryptography scheme,'' J. Vis. Commun. Image Represent., vol. 24, no. 3, pp. 318331, 2013. [6] S. A. Sattar, S. Haque, M. K. Pathan, and Q. Gee, ``Implementation challenges for Nastaliq character recognition,'' in Proc. Int. Multi Topic Conf. Berlin, Germany: Springer, 2008, pp. 279285. [7] R. G. Sharma, ``Visual cryptographictechniquesforsecret image shar- ing: A review,'' Inf. Secur. J., Global Perspective, vol. 27, nos. 56, pp. 241259, Jan. 2019. doi: 10.1080/19393555.2019.1567872. [8] J. Nantel and E. Glaser, ``The impact of language and culture on per- ceived website usability,'' J. Eng. Technol. Manage., vol. 25, nos. 12, pp. 112122, 2008. [9] K. Katzner, The Languages of the World. Evanston, IL, USA: Routledge, 2002. [Online]. Available: https://www.questia.com/ library/108070247/the- languages-of-the-world. [10] J. Ramya and B. Parvathavarthini,``Anextensive review on visual cryptog- raphy schemes,''inProc.Int.Conf.Control, Instrum., Commun. Comput. Technol., Kanyakumari, India, Jul. 2014, pp. 223228.