A Major Project Presentation
On
Lightweight Image Encryption Approach
Under The Esteemed Guidance Of
Ms. CH. Sushma (Assistant Professor, CSE Department)
By-
Abubakkar Siddique (20WJ1A05R2)
Vinay Kumar (20WJ1A05W6)
Shaik Aftab (21WJ5A0525)
Lightweight Image Encryption
Approach
Overview and Importance of Lightweight
Encryption
● Abstract
● Objective
● Introduction
● Literature survey
● Existing System
● Proposed System
● System Architecture
Abstract
•This paper proposes a lightweight image encryption approach for medical Internet of Things
(MIoT) networks using compressive sensing and a modified seven-dimensional (MSD) hyper
chaotic map.
•Initially, 7D hyper chaotic map is modified to generate more secure and complex secret
keys. SHA-512 is used to create the initial conditions for MSD, which ensures its sensitivity
towards input images.
•Using non subsampled contourlet transform (NSCT), further improvements in the
compressive sensing are achieved, and then the measurement matrices are generated using
the secret keys obtained from MSD.
•Finally, to generate encrypted images, the diffusion and permutation are carried out row and
column-wise on compressed images using secret keys obtained from MSD.
Biomedical Image Encryption
Secure Data for Medical
● Encryption plays crucial role in protecting sensitive medical
imaging data.
● Secure encryption prevents unauthorized access to patient
information.
● Examples include AES, RSA, and DES encryption
algorithms.
● Ensuring data integrity and confidentiality is essential in
healthcare industry.
Content Source Wikipedia
Photo by Pexels
Challenges in Lightweight Image Encryption
Benefits of Lightweight Encryption Limitations of Lightweight Encryption
● Implementing lightweight encryption can
improve data security for biomedical images.
● Lightweight encryption solutions can provide a
balance between security and performance.
● These solutions are cost-effective and can
easily be integrated into existing systems.
● Implementing encryption on biomedical images
can be complex and challenging due to strict
regulatory requirements.
● Ensuring compatibility with existing systems
and devices can be a major hurdle in deploying
lightweight encryption.
● Maintaining the balance between security and
performance can be difficult, leading to
potential vulnerabilities.
Content Source Wikipedia
Overview of File Formats
File formats determine how data is stored and accessed in computing systems.
1
Common file formats include JPEG for images, MP3 for audio, and PDF for documents.
2
Each file format has its own advantages and limitations, impacting compatibility and file
size.
3
Content Source Wikipedia
Existing System
Photo by Pexels Photo by Pexels
Representation
DNA cryptography represents an emerging field
leveraging the immense storage capacity and
inherent information-coding capabilities of DNA
molecules for cryptographic purposes.
Encryption Algorithm Selection
Choose a lightweight encryption algorithm
suitable for biomedical images. Consider factors
such as encryption strength, computational
complexity, and resource constraints.
DNA Cryptography
It works by converting normal information into
DNA code using the four letters A, C, G, and T
which stand for the DNA bases. These bases
represent the 0s and 1s of binary code. So, a
message is turned into a sequence of these
letters and then stored as DNA.
Performance Evaluation
Conduct extensive performance evaluations to
assess the security and efficiency of the
proposed encryption approach. Measure
encryption and decryption speed, memory
footprint, and computational resources required
Proposed System
● The proposed system provides not only low
computational cost but also low power consumption
presented a secret 3-D object sharing scheme to protect
the actual content of an image. The geometrical
distortions were protected through the proposed sharing
mechanism.
● The blocks of the image were scrambled by utilizing
random permutation, rotation, and zigzag patterns. Using
the logistic chaotic map, secret keys were generated that
were used to diffuse scrambled blocks. Akkasaligar et al.
utilized dual hyper chaotic map and (DDNA) to implement
the medical image encryption technique.
SHA-512 Algorithm
● SHA-512, a member of the Secure Hash Algorithm (SHA)
family, stands as a cryptographic hash function designed
to generate a fixed-size, 512-bit (64-byte) hash value
from input data of varying sizes. It employs a complex set
of logical operations involving bit manipulation, modular
arithmetic,and bitwise operations, making it
computationally infeasible to reverse the hash to derive
the original input.
SYSTEM REQUIREMENTS
Photo by Pexels Photo by Pexels
Content Source Wikipedia
SOFTWARE REQUIREMENTS:
BACK END : Python 3.11.4
OPERATING SYSTEM : Windows 7
IDE : Spyder3
HARDWARE REQUIREMENTS:
PROCESSOR : Intel i3 Processor
RAM : 6GB dd ram
HARD DISK : 250 GB
Importance of Encryption
Lightweight Biomedical Images
● Lightweight encryption is crucial for securing sensitive
biomedical images.
● It ensures data privacy and compliance with regulations in
healthcare.
● Encryption algorithms like AES are often used to protect
image data.
● Implementing encryption in medical imaging software
enhances data security.
Content Source Wikipedia
Photo by Pexels
Photo by Pexels Photo by Pexels
Content Source Wikipedia
Conclusion
● In conclusion, developing lightweight encryption approaches for biomedical images
presents a multifaceted challenge that requires careful consideration of security,
efficiency, and practicality. While these approaches offer the potential to protect
sensitive medical data without imposing significant computational overhead, they also
face several challenges
● The trade-off between security and efficiency remains a central concern, as
lightweight encryption algorithms must strike a delicate balance to ensure adequate
protection while operating within the resource constraints of biomedical imaging
systems
● Despite these challenges, the development of lightweight encryption techniques holds
promise for enhancing the security of biomedical imaging systems and protecting
sensitive patient data.

A Major Project Presentation on Lightweight image encryption

  • 1.
    A Major ProjectPresentation On Lightweight Image Encryption Approach Under The Esteemed Guidance Of Ms. CH. Sushma (Assistant Professor, CSE Department) By- Abubakkar Siddique (20WJ1A05R2) Vinay Kumar (20WJ1A05W6) Shaik Aftab (21WJ5A0525)
  • 2.
    Lightweight Image Encryption Approach Overviewand Importance of Lightweight Encryption ● Abstract ● Objective ● Introduction ● Literature survey ● Existing System ● Proposed System ● System Architecture
  • 3.
    Abstract •This paper proposesa lightweight image encryption approach for medical Internet of Things (MIoT) networks using compressive sensing and a modified seven-dimensional (MSD) hyper chaotic map. •Initially, 7D hyper chaotic map is modified to generate more secure and complex secret keys. SHA-512 is used to create the initial conditions for MSD, which ensures its sensitivity towards input images. •Using non subsampled contourlet transform (NSCT), further improvements in the compressive sensing are achieved, and then the measurement matrices are generated using the secret keys obtained from MSD. •Finally, to generate encrypted images, the diffusion and permutation are carried out row and column-wise on compressed images using secret keys obtained from MSD.
  • 4.
    Biomedical Image Encryption SecureData for Medical ● Encryption plays crucial role in protecting sensitive medical imaging data. ● Secure encryption prevents unauthorized access to patient information. ● Examples include AES, RSA, and DES encryption algorithms. ● Ensuring data integrity and confidentiality is essential in healthcare industry. Content Source Wikipedia Photo by Pexels
  • 5.
    Challenges in LightweightImage Encryption Benefits of Lightweight Encryption Limitations of Lightweight Encryption ● Implementing lightweight encryption can improve data security for biomedical images. ● Lightweight encryption solutions can provide a balance between security and performance. ● These solutions are cost-effective and can easily be integrated into existing systems. ● Implementing encryption on biomedical images can be complex and challenging due to strict regulatory requirements. ● Ensuring compatibility with existing systems and devices can be a major hurdle in deploying lightweight encryption. ● Maintaining the balance between security and performance can be difficult, leading to potential vulnerabilities. Content Source Wikipedia
  • 6.
    Overview of FileFormats File formats determine how data is stored and accessed in computing systems. 1 Common file formats include JPEG for images, MP3 for audio, and PDF for documents. 2 Each file format has its own advantages and limitations, impacting compatibility and file size. 3 Content Source Wikipedia
  • 7.
    Existing System Photo byPexels Photo by Pexels Representation DNA cryptography represents an emerging field leveraging the immense storage capacity and inherent information-coding capabilities of DNA molecules for cryptographic purposes. Encryption Algorithm Selection Choose a lightweight encryption algorithm suitable for biomedical images. Consider factors such as encryption strength, computational complexity, and resource constraints. DNA Cryptography It works by converting normal information into DNA code using the four letters A, C, G, and T which stand for the DNA bases. These bases represent the 0s and 1s of binary code. So, a message is turned into a sequence of these letters and then stored as DNA. Performance Evaluation Conduct extensive performance evaluations to assess the security and efficiency of the proposed encryption approach. Measure encryption and decryption speed, memory footprint, and computational resources required
  • 8.
    Proposed System ● Theproposed system provides not only low computational cost but also low power consumption presented a secret 3-D object sharing scheme to protect the actual content of an image. The geometrical distortions were protected through the proposed sharing mechanism. ● The blocks of the image were scrambled by utilizing random permutation, rotation, and zigzag patterns. Using the logistic chaotic map, secret keys were generated that were used to diffuse scrambled blocks. Akkasaligar et al. utilized dual hyper chaotic map and (DDNA) to implement the medical image encryption technique. SHA-512 Algorithm ● SHA-512, a member of the Secure Hash Algorithm (SHA) family, stands as a cryptographic hash function designed to generate a fixed-size, 512-bit (64-byte) hash value from input data of varying sizes. It employs a complex set of logical operations involving bit manipulation, modular arithmetic,and bitwise operations, making it computationally infeasible to reverse the hash to derive the original input.
  • 9.
    SYSTEM REQUIREMENTS Photo byPexels Photo by Pexels Content Source Wikipedia SOFTWARE REQUIREMENTS: BACK END : Python 3.11.4 OPERATING SYSTEM : Windows 7 IDE : Spyder3 HARDWARE REQUIREMENTS: PROCESSOR : Intel i3 Processor RAM : 6GB dd ram HARD DISK : 250 GB
  • 10.
    Importance of Encryption LightweightBiomedical Images ● Lightweight encryption is crucial for securing sensitive biomedical images. ● It ensures data privacy and compliance with regulations in healthcare. ● Encryption algorithms like AES are often used to protect image data. ● Implementing encryption in medical imaging software enhances data security. Content Source Wikipedia Photo by Pexels
  • 11.
    Photo by PexelsPhoto by Pexels Content Source Wikipedia Conclusion ● In conclusion, developing lightweight encryption approaches for biomedical images presents a multifaceted challenge that requires careful consideration of security, efficiency, and practicality. While these approaches offer the potential to protect sensitive medical data without imposing significant computational overhead, they also face several challenges ● The trade-off between security and efficiency remains a central concern, as lightweight encryption algorithms must strike a delicate balance to ensure adequate protection while operating within the resource constraints of biomedical imaging systems ● Despite these challenges, the development of lightweight encryption techniques holds promise for enhancing the security of biomedical imaging systems and protecting sensitive patient data.