SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 268
A New Algorithm for Digital Colour Image Encryption and Decryption
Sayan Rakshit1
1 M.Tech Student, Department of Mathematics, Indian Institute of Technology Kharagpur, Kharagpur, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract— Modern era is thriving too fast because of the
blessings of digital technology. Due to digital technology,
application of multimedia objects, such as digital image and
digital communication has gained lots of attention. It is very
important to protect our image data from an unauthorized
access. In this paper, a new efficient colour image encryption
and decryption technique has been proposed. The proposed
encryption technique is based on image pixel shuffling and
Logistic map. The pixel shuffling is done by two steps, divide
the image into some smaller equal blocks and give a rotation
of 90 degree to each and every block and then apply the pre
generated shuffling pattern to this block scrambled image. To
give more strength of the encryption technique, nature of
Logistic Map has been used. With the initial pair of values of
Logistic Map, creates a scrambled image and XOR it with the
actual pixel shuffled image. Steganography technique is also
being used to send the dimension of the original image. The
shuffling pattern and initial pair of values have to keep
secrete, these are consider as symmetric key. Decryption
technique is the reverse process of encryption technique.
Key Words: RGB Colour Image, Cryptography, Encryption,
Decryption, Logistic map, Steganography.
1.INTRODUCTION
Day by day the more and morepeoplearegettinginvolved
with digital technology. The more people will comethemore
security issue will arise. The solution of the security issue is
cryptography. Cryptography is a technique which is being
used to hide and protect information from unauthorised
access. Use of cryptography is not new, about 2000bc it was
first introduced but the rapid use of it can be seen in this
digital era. Nowadays the traditional cryptosystemsarevery
much successful to protect our text message but when it
comes to protect image data it fails in some extent in terms
of speed. It is because an image data contains much more
information than a text.
A digital image is made of some pixels. In an image
neighbouring pixels are very much correlated. So
displacements of neighbouring pixels make an image
unrecognisable. This phenomenon of digital image can be
used to encryption and decryption process.
In this paper symmetric key cryptosystem has been used
to encrypt an image. Random permutation of a string of
consecutive natural numbers and Logistic Map has used to
generate required symmetric keys.
The main aim of this research is toscramblethepixelsand
then change the certain amount of values of the pixels to
achieve a strong encrypted image. With the same key the
decryption process has to be done without loss of any image
quality.
2. PRELIMINARY
2.1 Steganography
Steganographyisaprocessbywhichsomesecretinformation
can be concealed into a carrier file. The main difference
between cryptography and steganography is that,
cryptography sends the encrypted message, which may
protect to unauthorised access but it is unable to prevent the
fact that, something has beensentisknowntoeveryone.Here
steganography wins the race.
There are some techniques available at present, among
them Least Significant Bit technique is one of the simplest
techniques.
Least Significant Bit Steganography:Forthistechnique
we need one carrier file and the secret information. Carrier
file can be any type of digital signal, such as digital image. As
least significant bit of a pixel value contains very small
amount information, so changing of the least significant bit
cannot change significant amount of image. In this technique
first the secret information has to convert into 8-bit binary
string and then replace each bit intotheleastsignificantbitof
each pixel value. Now the image becomes a stegno-image. To
extract the information fromthe stegno-image,itisneededto
collect the least significant bit of each pixel value andconvert
them to the readable information.
2.2 Logistic map
Logistic map is a chaotic map and the formula is Xn+1 = Xn *
r *(1 + Xn) where r ∊ [0; 4] and Xn ∊ [0; 1]. Here r is called
logistic parameter. When r ∊ [3:569946; 4], logistic map
works in a chaotic state, and produces non-periodic
sequence.
Initially it is necessary to give iteration number, initial value
of X0 and the value of r.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 269
Fig-1 the above picture shows the bifurcation diagram of
the Logistic Map.
3. PROPOSED ALGORITHM
The proposed algorithm consists of three parts, key
generation, encryptionanddecryption.Asthealgorithmuses
symmetric key, so need to generate key first before start to
encryption process.
3.1 Key Generation
The proposed algorithm needs two key, (i) Generate
shuffling pattern (ii) Chaotic image using Logistic Map
i. Generate shuffling pattern: Take a one-dimensional
array of numbers from 1 to p (p=m*n, where p, m, n all
are positive integer) and do a random permutation.
Resize the one-dimensional array into a two-
dimensional array of size m*n, where m and n are
number of rows and columns respectively. Keep this
two-dimensional array in secret.
ii. Generate Chaotic image: To generate a chaotic image,
need to generate three RGB channel separately.Firstfor
Red channel take initial value of r and x0 of Logistic Map
and generate p (same p=m*n as shuffling pattern)
points(x) and multiply each point(x) with 1000.
Calculate q = (x*1000) mod 255 and take the integer
part of q and store them in a one-dimensional array.
Resize this one-dimensional array with the same two
dimension of shuffling pattern. Like this way with
different initial values of r and x0 have to prepare
another two channel, green and blue. Let’s suppose for
Red, Green and Blue the initial pair of values are (r1, x0),
(r2, y0) and (r3, z0) respectively. These pairs have to
keep secret. Combine the three different channels and
get the chaotic RGB image.
3.2 Encryption Process
Encryption process includes smaller blocks scrambling,
stegnotography, pixels scrambling and pixel valuechanging.
1. Take a colour image and divide this image with four
equal blocks and rotate each of the block 90degreeanti-
clock wise. Again take each of the block separately and
divide each of the blocks into four sub equal blocks and
rotate each of the sub-block 90 degree anti-clock wise.
Again take each of the sub-block and do the same as
before blocks. At the end there are 64 smaller blocks.
2. Write the dimension of the colour image, start with “(”
and close with “)” into the block scrambled image from
step 1 using Least significant bit steganotography
technique. The “)” here indicates theendofthemessage.
3. If the size of the colour image is less than the size of the
secret scrambling pattern, then pad rest of the rowsand
columns with the random values from 0 to 255andgeta
padded image of same size of scrambling pattern.
4. At this stage scramble the position of each pixel
according to scrambling pattern and get a fully
scrambled image.
5. XOR the scrambled image with the chaotic image and
finally encrypted image is ready.
3.3 Decryption Process
Decryption process is reverse process of encryption.
1. Take the encrypted image and XOR with the chaotic
image.
2. Use secret scrambling pattern to descramble the
scrambled image and get the block scrambled padded
image.
3. Extract the dimension of the actual image by the
extracting method of Least significant bit
steganotography technique.
4. Crop the block scrambled image according to the
dimension from the padded image.
5. Take a colour image and divide this image with four
equal blocks and rotate each of the block 90 degree,
clock wise. Again take each of the block separately and
divide each of the blocks into four sub equal blocks and
rotate each of the sub-block 90 degree, clock wise.Again
take each of the sub-block and do the same as before
blocks. Re-combine all the 64 sub-blocks and get the
original decrypted image.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 270
3. EXPERIMENTAL RESULT
 Encryption
1. Take a 225*225 Lena image and apply step 1
Fig-2,
Lena Image > 1st Rotation >2nd Rotation >3rd Rotation
2. Write “(ROW225COL225)” into the block scrambled
image using steganography.
3. Apply step 3 on the stegno image.
Fig-3, Padded Image
4. Scramble the pixels position as step 4.
Fig-3, Pixel Scramble Image
5. By the initial pairs (3.63,0.5), (3.73, 0.57) and
(3.78,0.67) of Logistic Map for generating Red, Green
and Blue channel respectively, make a chaotic image
and XOR it with the pixel scramble image and get the
final encrypted image.
Fig-4, Encrypted Image
3. ANALYSIS OF EXPERIMENTAL RESULT
For this experiment the Matlab 11 has been used. The
proposed algorithm has implemented on some24-bitcolour
images. One such image is 225*225 Lena image whichcanbe
shown in Fig-2. Here size of the secret scrambling pattern
matrix is 256*256. So need to pad the Lena image to make it
as the same size of scrambling pattern matrix, can be shown
in Fig-3. Then the Fig-4 and Fig-6 show the pixel scrambling
image and encrypted image respectively. The histogram of
the three different channels (Red, Green, Blue) of original
Lena image and the final encrypted image (Fig-5) are shown
below.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 271
Fig-6
Fig-7
Fig-8
From the above Fig-6, Fig-7 and Fig-8, it is clear that the
colour distribution of encrypted imageisverymuchdifferent
of the original Lena image. It is because most of the pixel
values of Lena image have changed duringtheXORoperation
with the chaotic image. The histogram of encrypted image
shows uniform distribution of colours which will resist any
statistical analysis.
3. CONCLUSIONS
The proposed algorithm gives us an effective way to
encrypt and decrypt a colour image. Any size of an image
which is less than the size of the key scrambling pattern can
be sent with the same key. We no need to change our secret
key every time for different sized image. The proposed
algorithm shuffles the pixels position and then changes the
pixel values, which strengthen the encryption quite well.
ACKNOWLEDGEMENT
I am grateful to everyone who has supported me, directly or
indirectly.
REFERENCES
[1] Asia Mahdi Naser Alzubaidi, Color Image Encryption
and Decryption using Pixel Shuffling with Henon
Chaotic System, IJERT, Vol. 3, Issue 3, March – 2014.
[2] Panduranga H.T, Naveen Kumar S.K, Hybrid approach
for Image Encryption Using SCAN Patterns and Carrier
Images, IJCSE, Vol. 02, No. 02, 2010, 297-300.
[3] Amitava Nag, Jyoti Prakash Singh, Srabani Khan,
Saswati Ghosh, Sushanta Biswas, D. Sarkar, Partha
Pratim Sarkar, Image Encryption Using Affine
Transform and XOR Operation, International
Conference on Signal Processing, Communication,
Computing and Networking Technologies(ICSCCN
2011), 2011.
[4] C.Wei-bin, Z. Xin, Image encryption algorithm basedon
Henon chaotic system , Image Analysis and Signal
Processing IEEE xplore,pages 94 - 97,11-12April 2009.
[5] Hossam Eldin H. Ahmed, AymanH.AbdEl-aziem,Image
Encryption Using Development of Chaotic
Logistic Map Based on Feedback StreamCipher,Recent
Advances In Telecommunications, Informatics And
Educational Technologies.
[6] S.S.Maniccam, N.G. Bourbakis, Lossless image
compression and encryption using SCAN, Pattern
Recognition 34(2001),1229-1245.
[7] G.A.Sathishkumar, Dr.K.Bhoopathy bagan, Dr.N.
Sriraam, IJNSA, Vol.3, No.2, March 2011.
[8] J. Cheng, J.1. Guo, A new chaotic key-based design for
image encryption and decryption, The 2000 IEEE
International Symposiumon CircuitsandSystems,vol4,
no. 4, pp. 49 - 52, May. 2000.
[9] Chen GR, Mao YB, A Symmetric Image Encryption
Scheme Based on 3D Chaotic Cat Maps, Chaos, Solitons
& Fractals 2004, vol 21, pp 749–61, 2004.
[10] Apeksha Waghmare, Abhishek Bhagat,Abhishek Surve,
Sanuj Kalgutkar, Chaos Based Image Encryption and
Decryption, IJARCCE , Vol. 5, Issue 4, April 2016 .

More Related Content

What's hot

A Novel for Finding Missing Piece in the Borderless Square Jigsaw Puzzle
A Novel for Finding Missing Piece in the Borderless Square Jigsaw PuzzleA Novel for Finding Missing Piece in the Borderless Square Jigsaw Puzzle
A Novel for Finding Missing Piece in the Borderless Square Jigsaw Puzzle
IJCSIS Research Publications
 
Vol 14 No 1 - July 2014
Vol 14 No 1 - July 2014Vol 14 No 1 - July 2014
Vol 14 No 1 - July 2014
ijcsbi
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
eSAT Publishing House
 
Performance Anaysis for Imaging System
Performance Anaysis for Imaging SystemPerformance Anaysis for Imaging System
Performance Anaysis for Imaging System
Vrushali Lanjewar
 
A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and...
A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and...A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and...
A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and...
iosrjce
 
A New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionA New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash Function
IRJET Journal
 
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET Journal
 
Steganography - Anup Palarapwar
Steganography - Anup PalarapwarSteganography - Anup Palarapwar
Steganography - Anup Palarapwar
ANUP PALARAPWAR
 
Ijcatr04041020
Ijcatr04041020Ijcatr04041020
Ijcatr04041020
Editor IJCATR
 
ALGORITHM FOR IMAGE MIXING AND ENCRYPTION
ALGORITHM FOR IMAGE MIXING AND ENCRYPTIONALGORITHM FOR IMAGE MIXING AND ENCRYPTION
ALGORITHM FOR IMAGE MIXING AND ENCRYPTION
ijma
 
Comparison of thresholding methods
Comparison of thresholding methodsComparison of thresholding methods
Comparison of thresholding methods
Vrushali Lanjewar
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarking
ijctet
 
Paper id 25201475
Paper id 25201475Paper id 25201475
Paper id 25201475
IJRAT
 
"Randomized Visual Cryptography scheme for color images”
"Randomized Visual Cryptography scheme for color images”"Randomized Visual Cryptography scheme for color images”
"Randomized Visual Cryptography scheme for color images”
iosrjce
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in image
ijctet
 

What's hot (15)

A Novel for Finding Missing Piece in the Borderless Square Jigsaw Puzzle
A Novel for Finding Missing Piece in the Borderless Square Jigsaw PuzzleA Novel for Finding Missing Piece in the Borderless Square Jigsaw Puzzle
A Novel for Finding Missing Piece in the Borderless Square Jigsaw Puzzle
 
Vol 14 No 1 - July 2014
Vol 14 No 1 - July 2014Vol 14 No 1 - July 2014
Vol 14 No 1 - July 2014
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
 
Performance Anaysis for Imaging System
Performance Anaysis for Imaging SystemPerformance Anaysis for Imaging System
Performance Anaysis for Imaging System
 
A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and...
A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and...A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and...
A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and...
 
A New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionA New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash Function
 
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
 
Steganography - Anup Palarapwar
Steganography - Anup PalarapwarSteganography - Anup Palarapwar
Steganography - Anup Palarapwar
 
Ijcatr04041020
Ijcatr04041020Ijcatr04041020
Ijcatr04041020
 
ALGORITHM FOR IMAGE MIXING AND ENCRYPTION
ALGORITHM FOR IMAGE MIXING AND ENCRYPTIONALGORITHM FOR IMAGE MIXING AND ENCRYPTION
ALGORITHM FOR IMAGE MIXING AND ENCRYPTION
 
Comparison of thresholding methods
Comparison of thresholding methodsComparison of thresholding methods
Comparison of thresholding methods
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarking
 
Paper id 25201475
Paper id 25201475Paper id 25201475
Paper id 25201475
 
"Randomized Visual Cryptography scheme for color images”
"Randomized Visual Cryptography scheme for color images”"Randomized Visual Cryptography scheme for color images”
"Randomized Visual Cryptography scheme for color images”
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in image
 

Similar to A New Algorithm for Digital Colour Image Encryption and Decryption

Secret-Fragment Visible Mosaic Images by Genetic Algorithm
Secret-Fragment Visible Mosaic Images by Genetic AlgorithmSecret-Fragment Visible Mosaic Images by Genetic Algorithm
Secret-Fragment Visible Mosaic Images by Genetic Algorithm
IRJET Journal
 
A Cryptographic Key Generation Using 2D Graphics pixel Shuffling
A Cryptographic Key Generation Using 2D Graphics pixel ShufflingA Cryptographic Key Generation Using 2D Graphics pixel Shuffling
A Cryptographic Key Generation Using 2D Graphics pixel Shuffling
IJMTST Journal
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
IRJET Journal
 
Encryption of Decomposed Image by using ASCII Code based Carrier Signal
Encryption of Decomposed Image by using ASCII Code based Carrier SignalEncryption of Decomposed Image by using ASCII Code based Carrier Signal
Encryption of Decomposed Image by using ASCII Code based Carrier Signal
IRJET Journal
 
B017640811
B017640811B017640811
B017640811
IOSR Journals
 
Lossless Encryption using BITPLANE and EDGEMAP Crypt Algorithms
Lossless Encryption using BITPLANE and EDGEMAP Crypt AlgorithmsLossless Encryption using BITPLANE and EDGEMAP Crypt Algorithms
Lossless Encryption using BITPLANE and EDGEMAP Crypt Algorithms
IRJET Journal
 
Implementation for Data Hiding using Visual Cryptography
Implementation for Data Hiding using Visual Cryptography           Implementation for Data Hiding using Visual Cryptography
Implementation for Data Hiding using Visual Cryptography
IRJET Journal
 
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET Journal
 
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
Editor IJMTER
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
Rashmi Tank
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
editor1knowledgecuddle
 
IRJET- Encryption based Approach to Find Fake Uploaders in Social Media
IRJET- Encryption based Approach to Find Fake Uploaders in Social MediaIRJET- Encryption based Approach to Find Fake Uploaders in Social Media
IRJET- Encryption based Approach to Find Fake Uploaders in Social Media
IRJET Journal
 
Encrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image SlicingEncrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image Slicing
IRJET Journal
 
Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229
Editor IJARCET
 
IRJET - Steganography based on Discrete Wavelet Transform
IRJET -  	  Steganography based on Discrete Wavelet TransformIRJET -  	  Steganography based on Discrete Wavelet Transform
IRJET - Steganography based on Discrete Wavelet Transform
IRJET Journal
 
A New hybrid method in watermarking using DCT and AES
A New hybrid method in watermarking using DCT and AESA New hybrid method in watermarking using DCT and AES
A New hybrid method in watermarking using DCT and AES
IJERD Editor
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
IOSR Journals
 
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET Journal
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
ijcseit
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
ijcseit
 

Similar to A New Algorithm for Digital Colour Image Encryption and Decryption (20)

Secret-Fragment Visible Mosaic Images by Genetic Algorithm
Secret-Fragment Visible Mosaic Images by Genetic AlgorithmSecret-Fragment Visible Mosaic Images by Genetic Algorithm
Secret-Fragment Visible Mosaic Images by Genetic Algorithm
 
A Cryptographic Key Generation Using 2D Graphics pixel Shuffling
A Cryptographic Key Generation Using 2D Graphics pixel ShufflingA Cryptographic Key Generation Using 2D Graphics pixel Shuffling
A Cryptographic Key Generation Using 2D Graphics pixel Shuffling
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
Encryption of Decomposed Image by using ASCII Code based Carrier Signal
Encryption of Decomposed Image by using ASCII Code based Carrier SignalEncryption of Decomposed Image by using ASCII Code based Carrier Signal
Encryption of Decomposed Image by using ASCII Code based Carrier Signal
 
B017640811
B017640811B017640811
B017640811
 
Lossless Encryption using BITPLANE and EDGEMAP Crypt Algorithms
Lossless Encryption using BITPLANE and EDGEMAP Crypt AlgorithmsLossless Encryption using BITPLANE and EDGEMAP Crypt Algorithms
Lossless Encryption using BITPLANE and EDGEMAP Crypt Algorithms
 
Implementation for Data Hiding using Visual Cryptography
Implementation for Data Hiding using Visual Cryptography           Implementation for Data Hiding using Visual Cryptography
Implementation for Data Hiding using Visual Cryptography
 
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
 
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
 
IRJET- Encryption based Approach to Find Fake Uploaders in Social Media
IRJET- Encryption based Approach to Find Fake Uploaders in Social MediaIRJET- Encryption based Approach to Find Fake Uploaders in Social Media
IRJET- Encryption based Approach to Find Fake Uploaders in Social Media
 
Encrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image SlicingEncrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image Slicing
 
Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229
 
IRJET - Steganography based on Discrete Wavelet Transform
IRJET -  	  Steganography based on Discrete Wavelet TransformIRJET -  	  Steganography based on Discrete Wavelet Transform
IRJET - Steganography based on Discrete Wavelet Transform
 
A New hybrid method in watermarking using DCT and AES
A New hybrid method in watermarking using DCT and AESA New hybrid method in watermarking using DCT and AES
A New hybrid method in watermarking using DCT and AES
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
 
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptxSENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
b0754201
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
ElakkiaU
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
Roger Rozario
 
This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...
DharmaBanothu
 
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
OKORIE1
 
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls ChennaiCall Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
paraasingh12 #V08
 
Butterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdfButterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdf
Lubi Valves
 
AI in customer support Use cases solutions development and implementation.pdf
AI in customer support Use cases solutions development and implementation.pdfAI in customer support Use cases solutions development and implementation.pdf
AI in customer support Use cases solutions development and implementation.pdf
mahaffeycheryld
 
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdfSri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
Balvir Singh
 
Introduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.pptIntroduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.ppt
Dwarkadas J Sanghvi College of Engineering
 
Accident detection system project report.pdf
Accident detection system project report.pdfAccident detection system project report.pdf
Accident detection system project report.pdf
Kamal Acharya
 
Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...
pvpriya2
 
openshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoinopenshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoin
snaprevwdev
 
Supermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdfSupermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdf
Kamal Acharya
 
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
ijseajournal
 
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICSUNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
vmspraneeth
 
FULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back EndFULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back End
PreethaV16
 
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Transcat
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
upoux
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
21UME003TUSHARDEB
 

Recently uploaded (20)

SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptxSENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
 
This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...
 
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
 
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls ChennaiCall Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
 
Butterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdfButterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdf
 
AI in customer support Use cases solutions development and implementation.pdf
AI in customer support Use cases solutions development and implementation.pdfAI in customer support Use cases solutions development and implementation.pdf
AI in customer support Use cases solutions development and implementation.pdf
 
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdfSri Guru Hargobind Ji - Bandi Chor Guru.pdf
Sri Guru Hargobind Ji - Bandi Chor Guru.pdf
 
Introduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.pptIntroduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.ppt
 
Accident detection system project report.pdf
Accident detection system project report.pdfAccident detection system project report.pdf
Accident detection system project report.pdf
 
Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...
 
openshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoinopenshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoin
 
Supermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdfSupermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdf
 
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
 
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICSUNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
 
FULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back EndFULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back End
 
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
 

A New Algorithm for Digital Colour Image Encryption and Decryption

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 268 A New Algorithm for Digital Colour Image Encryption and Decryption Sayan Rakshit1 1 M.Tech Student, Department of Mathematics, Indian Institute of Technology Kharagpur, Kharagpur, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract— Modern era is thriving too fast because of the blessings of digital technology. Due to digital technology, application of multimedia objects, such as digital image and digital communication has gained lots of attention. It is very important to protect our image data from an unauthorized access. In this paper, a new efficient colour image encryption and decryption technique has been proposed. The proposed encryption technique is based on image pixel shuffling and Logistic map. The pixel shuffling is done by two steps, divide the image into some smaller equal blocks and give a rotation of 90 degree to each and every block and then apply the pre generated shuffling pattern to this block scrambled image. To give more strength of the encryption technique, nature of Logistic Map has been used. With the initial pair of values of Logistic Map, creates a scrambled image and XOR it with the actual pixel shuffled image. Steganography technique is also being used to send the dimension of the original image. The shuffling pattern and initial pair of values have to keep secrete, these are consider as symmetric key. Decryption technique is the reverse process of encryption technique. Key Words: RGB Colour Image, Cryptography, Encryption, Decryption, Logistic map, Steganography. 1.INTRODUCTION Day by day the more and morepeoplearegettinginvolved with digital technology. The more people will comethemore security issue will arise. The solution of the security issue is cryptography. Cryptography is a technique which is being used to hide and protect information from unauthorised access. Use of cryptography is not new, about 2000bc it was first introduced but the rapid use of it can be seen in this digital era. Nowadays the traditional cryptosystemsarevery much successful to protect our text message but when it comes to protect image data it fails in some extent in terms of speed. It is because an image data contains much more information than a text. A digital image is made of some pixels. In an image neighbouring pixels are very much correlated. So displacements of neighbouring pixels make an image unrecognisable. This phenomenon of digital image can be used to encryption and decryption process. In this paper symmetric key cryptosystem has been used to encrypt an image. Random permutation of a string of consecutive natural numbers and Logistic Map has used to generate required symmetric keys. The main aim of this research is toscramblethepixelsand then change the certain amount of values of the pixels to achieve a strong encrypted image. With the same key the decryption process has to be done without loss of any image quality. 2. PRELIMINARY 2.1 Steganography Steganographyisaprocessbywhichsomesecretinformation can be concealed into a carrier file. The main difference between cryptography and steganography is that, cryptography sends the encrypted message, which may protect to unauthorised access but it is unable to prevent the fact that, something has beensentisknowntoeveryone.Here steganography wins the race. There are some techniques available at present, among them Least Significant Bit technique is one of the simplest techniques. Least Significant Bit Steganography:Forthistechnique we need one carrier file and the secret information. Carrier file can be any type of digital signal, such as digital image. As least significant bit of a pixel value contains very small amount information, so changing of the least significant bit cannot change significant amount of image. In this technique first the secret information has to convert into 8-bit binary string and then replace each bit intotheleastsignificantbitof each pixel value. Now the image becomes a stegno-image. To extract the information fromthe stegno-image,itisneededto collect the least significant bit of each pixel value andconvert them to the readable information. 2.2 Logistic map Logistic map is a chaotic map and the formula is Xn+1 = Xn * r *(1 + Xn) where r ∊ [0; 4] and Xn ∊ [0; 1]. Here r is called logistic parameter. When r ∊ [3:569946; 4], logistic map works in a chaotic state, and produces non-periodic sequence. Initially it is necessary to give iteration number, initial value of X0 and the value of r.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 269 Fig-1 the above picture shows the bifurcation diagram of the Logistic Map. 3. PROPOSED ALGORITHM The proposed algorithm consists of three parts, key generation, encryptionanddecryption.Asthealgorithmuses symmetric key, so need to generate key first before start to encryption process. 3.1 Key Generation The proposed algorithm needs two key, (i) Generate shuffling pattern (ii) Chaotic image using Logistic Map i. Generate shuffling pattern: Take a one-dimensional array of numbers from 1 to p (p=m*n, where p, m, n all are positive integer) and do a random permutation. Resize the one-dimensional array into a two- dimensional array of size m*n, where m and n are number of rows and columns respectively. Keep this two-dimensional array in secret. ii. Generate Chaotic image: To generate a chaotic image, need to generate three RGB channel separately.Firstfor Red channel take initial value of r and x0 of Logistic Map and generate p (same p=m*n as shuffling pattern) points(x) and multiply each point(x) with 1000. Calculate q = (x*1000) mod 255 and take the integer part of q and store them in a one-dimensional array. Resize this one-dimensional array with the same two dimension of shuffling pattern. Like this way with different initial values of r and x0 have to prepare another two channel, green and blue. Let’s suppose for Red, Green and Blue the initial pair of values are (r1, x0), (r2, y0) and (r3, z0) respectively. These pairs have to keep secret. Combine the three different channels and get the chaotic RGB image. 3.2 Encryption Process Encryption process includes smaller blocks scrambling, stegnotography, pixels scrambling and pixel valuechanging. 1. Take a colour image and divide this image with four equal blocks and rotate each of the block 90degreeanti- clock wise. Again take each of the block separately and divide each of the blocks into four sub equal blocks and rotate each of the sub-block 90 degree anti-clock wise. Again take each of the sub-block and do the same as before blocks. At the end there are 64 smaller blocks. 2. Write the dimension of the colour image, start with “(” and close with “)” into the block scrambled image from step 1 using Least significant bit steganotography technique. The “)” here indicates theendofthemessage. 3. If the size of the colour image is less than the size of the secret scrambling pattern, then pad rest of the rowsand columns with the random values from 0 to 255andgeta padded image of same size of scrambling pattern. 4. At this stage scramble the position of each pixel according to scrambling pattern and get a fully scrambled image. 5. XOR the scrambled image with the chaotic image and finally encrypted image is ready. 3.3 Decryption Process Decryption process is reverse process of encryption. 1. Take the encrypted image and XOR with the chaotic image. 2. Use secret scrambling pattern to descramble the scrambled image and get the block scrambled padded image. 3. Extract the dimension of the actual image by the extracting method of Least significant bit steganotography technique. 4. Crop the block scrambled image according to the dimension from the padded image. 5. Take a colour image and divide this image with four equal blocks and rotate each of the block 90 degree, clock wise. Again take each of the block separately and divide each of the blocks into four sub equal blocks and rotate each of the sub-block 90 degree, clock wise.Again take each of the sub-block and do the same as before blocks. Re-combine all the 64 sub-blocks and get the original decrypted image.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 270 3. EXPERIMENTAL RESULT  Encryption 1. Take a 225*225 Lena image and apply step 1 Fig-2, Lena Image > 1st Rotation >2nd Rotation >3rd Rotation 2. Write “(ROW225COL225)” into the block scrambled image using steganography. 3. Apply step 3 on the stegno image. Fig-3, Padded Image 4. Scramble the pixels position as step 4. Fig-3, Pixel Scramble Image 5. By the initial pairs (3.63,0.5), (3.73, 0.57) and (3.78,0.67) of Logistic Map for generating Red, Green and Blue channel respectively, make a chaotic image and XOR it with the pixel scramble image and get the final encrypted image. Fig-4, Encrypted Image 3. ANALYSIS OF EXPERIMENTAL RESULT For this experiment the Matlab 11 has been used. The proposed algorithm has implemented on some24-bitcolour images. One such image is 225*225 Lena image whichcanbe shown in Fig-2. Here size of the secret scrambling pattern matrix is 256*256. So need to pad the Lena image to make it as the same size of scrambling pattern matrix, can be shown in Fig-3. Then the Fig-4 and Fig-6 show the pixel scrambling image and encrypted image respectively. The histogram of the three different channels (Red, Green, Blue) of original Lena image and the final encrypted image (Fig-5) are shown below.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 271 Fig-6 Fig-7 Fig-8 From the above Fig-6, Fig-7 and Fig-8, it is clear that the colour distribution of encrypted imageisverymuchdifferent of the original Lena image. It is because most of the pixel values of Lena image have changed duringtheXORoperation with the chaotic image. The histogram of encrypted image shows uniform distribution of colours which will resist any statistical analysis. 3. CONCLUSIONS The proposed algorithm gives us an effective way to encrypt and decrypt a colour image. Any size of an image which is less than the size of the key scrambling pattern can be sent with the same key. We no need to change our secret key every time for different sized image. The proposed algorithm shuffles the pixels position and then changes the pixel values, which strengthen the encryption quite well. ACKNOWLEDGEMENT I am grateful to everyone who has supported me, directly or indirectly. REFERENCES [1] Asia Mahdi Naser Alzubaidi, Color Image Encryption and Decryption using Pixel Shuffling with Henon Chaotic System, IJERT, Vol. 3, Issue 3, March – 2014. [2] Panduranga H.T, Naveen Kumar S.K, Hybrid approach for Image Encryption Using SCAN Patterns and Carrier Images, IJCSE, Vol. 02, No. 02, 2010, 297-300. [3] Amitava Nag, Jyoti Prakash Singh, Srabani Khan, Saswati Ghosh, Sushanta Biswas, D. Sarkar, Partha Pratim Sarkar, Image Encryption Using Affine Transform and XOR Operation, International Conference on Signal Processing, Communication, Computing and Networking Technologies(ICSCCN 2011), 2011. [4] C.Wei-bin, Z. Xin, Image encryption algorithm basedon Henon chaotic system , Image Analysis and Signal Processing IEEE xplore,pages 94 - 97,11-12April 2009. [5] Hossam Eldin H. Ahmed, AymanH.AbdEl-aziem,Image Encryption Using Development of Chaotic Logistic Map Based on Feedback StreamCipher,Recent Advances In Telecommunications, Informatics And Educational Technologies. [6] S.S.Maniccam, N.G. Bourbakis, Lossless image compression and encryption using SCAN, Pattern Recognition 34(2001),1229-1245. [7] G.A.Sathishkumar, Dr.K.Bhoopathy bagan, Dr.N. Sriraam, IJNSA, Vol.3, No.2, March 2011. [8] J. Cheng, J.1. Guo, A new chaotic key-based design for image encryption and decryption, The 2000 IEEE International Symposiumon CircuitsandSystems,vol4, no. 4, pp. 49 - 52, May. 2000. [9] Chen GR, Mao YB, A Symmetric Image Encryption Scheme Based on 3D Chaotic Cat Maps, Chaos, Solitons & Fractals 2004, vol 21, pp 749–61, 2004. [10] Apeksha Waghmare, Abhishek Bhagat,Abhishek Surve, Sanuj Kalgutkar, Chaos Based Image Encryption and Decryption, IJARCCE , Vol. 5, Issue 4, April 2016 .