IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUEijcisjournal
Due to enormous increase in the usage of computers and mobiles, today’s world is currently flooded with huge volumes of data. This paper is primarily focused on multimedia data and how it can be protected from unwanted attacks. Sharing of multimedia data is easy and very efficient, it has been a customary practice to share multimedia data but there is no proper encryption technique to encrypt multimedia data. Sharing of multimedia data over unprotected networks using DCT algorithm and then applying selective encryption-based algorithm has never been adequately studied. This paper introduces a new selective encryption-based security system which will transfer data with protection even in unauthenticated network. Selective encryption-based security system will also minimize time during encryption process which there by achieves efficiency. The data in the image is transmitted over a network is discriminated using DCT transform and then it will be selectively encrypted using Number Puzzle technique, and thus provides security from unauthorized access. This paper discusses about numeric puzzle-based encryption technique
and how it can achieve security and integrity for multimedia data over traditional encryption technique.
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEIJNSA Journal
In this paper, a new image encryption scheme using a secret key of 144-bits is proposed. In the substitution process of the scheme, image is divided into blocks and subsequently into color components. Each color component is modified by performing bitwise operation which depends on secret key as well as a few most significant bits of its previous and next color component. Three rounds are taken to complete substitution process. To make cipher more robust, a feedback mechanism is also applied by modifying used secret key after encrypting each block. Further, resultant image is partitioned into several key based dynamic sub-images. Each sub-image passes through the scrambling process where pixels of sub-image are reshuffled within itself by using a generated magic square matrix. Five rounds are taken for scrambling process. The propose scheme is simple, fast and sensitive to the secret key. Due to high order of substitution and permutation, common attacks like linear and differential cryptanalysis are infeasible. The experimental results show that the proposed encryption technique is efficient and has high security features.
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
Digital image Encryption techniques play a very important role to prevent image from unauthorized access. There are many types of methods available that can do Image Encryption, and the majority of them are scrambling algorithms based on pixel shuffling, which cannot change the histogram of an image. Hence, their security performances are not good. The encryption method that combines the pixel exchanging and gray level changing can handles reach a good chaotic effect. In this paper we focus on an image encryption technique based on pixel wise shuffling with the help of skew tent map and text based pixel substitution. The PSNR, NPCR and CC obtained by our technique shows that the proposed technique gives better result than the existing techniques.
Color Image Encryption and Decryption Using Multiple Chaotic MapsIJTET Journal
Owing to advances in communication technology, a bulk of visual digital data is being stored and transmitted over the internet now-a-days. Particularly millions and millions of images transfer through the network per day as per the statistics and a result, the security of image data is an important requirement. Image encryption algorithm is used to provide this security. In this paper, an image encryption algorithm based on confusion diffusion architecture that uses dynamic key space is proposed. An internal key generator is used to generate the initial seeds for the overall encryption scheme is proposed. With these initial seeds logistic map generates pseudo random numbers then these numbers are converted into permutation order for permutation. The diffusion bits are generated in parallel using the logistic map and manipulated with pixels confused. The image pixels are iteratively confused and diffused using permutation order and diffusion bits respectively to produce cipher image in minimum number of rounds. This paper proposes a new kind of initial seed generation that utilizes the combo of logistic and tent maps. Even all external seeds are same. The internal seeds will be totally different. This ensures the key sensitivity. The simulation results and analysis confirm that the satisfactory level of security is achieved in three rounds and overall encryption time is saved.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUEijcisjournal
Due to enormous increase in the usage of computers and mobiles, today’s world is currently flooded with huge volumes of data. This paper is primarily focused on multimedia data and how it can be protected from unwanted attacks. Sharing of multimedia data is easy and very efficient, it has been a customary practice to share multimedia data but there is no proper encryption technique to encrypt multimedia data. Sharing of multimedia data over unprotected networks using DCT algorithm and then applying selective encryption-based algorithm has never been adequately studied. This paper introduces a new selective encryption-based security system which will transfer data with protection even in unauthenticated network. Selective encryption-based security system will also minimize time during encryption process which there by achieves efficiency. The data in the image is transmitted over a network is discriminated using DCT transform and then it will be selectively encrypted using Number Puzzle technique, and thus provides security from unauthorized access. This paper discusses about numeric puzzle-based encryption technique
and how it can achieve security and integrity for multimedia data over traditional encryption technique.
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEIJNSA Journal
In this paper, a new image encryption scheme using a secret key of 144-bits is proposed. In the substitution process of the scheme, image is divided into blocks and subsequently into color components. Each color component is modified by performing bitwise operation which depends on secret key as well as a few most significant bits of its previous and next color component. Three rounds are taken to complete substitution process. To make cipher more robust, a feedback mechanism is also applied by modifying used secret key after encrypting each block. Further, resultant image is partitioned into several key based dynamic sub-images. Each sub-image passes through the scrambling process where pixels of sub-image are reshuffled within itself by using a generated magic square matrix. Five rounds are taken for scrambling process. The propose scheme is simple, fast and sensitive to the secret key. Due to high order of substitution and permutation, common attacks like linear and differential cryptanalysis are infeasible. The experimental results show that the proposed encryption technique is efficient and has high security features.
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
Digital image Encryption techniques play a very important role to prevent image from unauthorized access. There are many types of methods available that can do Image Encryption, and the majority of them are scrambling algorithms based on pixel shuffling, which cannot change the histogram of an image. Hence, their security performances are not good. The encryption method that combines the pixel exchanging and gray level changing can handles reach a good chaotic effect. In this paper we focus on an image encryption technique based on pixel wise shuffling with the help of skew tent map and text based pixel substitution. The PSNR, NPCR and CC obtained by our technique shows that the proposed technique gives better result than the existing techniques.
Color Image Encryption and Decryption Using Multiple Chaotic MapsIJTET Journal
Owing to advances in communication technology, a bulk of visual digital data is being stored and transmitted over the internet now-a-days. Particularly millions and millions of images transfer through the network per day as per the statistics and a result, the security of image data is an important requirement. Image encryption algorithm is used to provide this security. In this paper, an image encryption algorithm based on confusion diffusion architecture that uses dynamic key space is proposed. An internal key generator is used to generate the initial seeds for the overall encryption scheme is proposed. With these initial seeds logistic map generates pseudo random numbers then these numbers are converted into permutation order for permutation. The diffusion bits are generated in parallel using the logistic map and manipulated with pixels confused. The image pixels are iteratively confused and diffused using permutation order and diffusion bits respectively to produce cipher image in minimum number of rounds. This paper proposes a new kind of initial seed generation that utilizes the combo of logistic and tent maps. Even all external seeds are same. The internal seeds will be totally different. This ensures the key sensitivity. The simulation results and analysis confirm that the satisfactory level of security is achieved in three rounds and overall encryption time is saved.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
An ideal steganographic scheme in networks using twisted payloadeSAT Journals
Abstract With the rapid development of network technology, information security has become a mounting problem. Steganography involves hiding information in a cover media, in such a way that the cover media is not supposed to have any confidential message for its unintentional addressee In this paper, an ideal steganographic scheme in networks is proposed using twisted payload. The confidential image values are twisted by using scrambling techiques.The Discrete Wavelet Transform (DWT) is applied on cover image and Integer Wavelet Transform (IWT) is applied to the scrambled confidential image. Merge operation is done on both images and Inverse DWT is computed on the same to get the stego image. The information hiding algorithm is the reverse process of the extracting algorithm. After this an ideal steganographic scheme is applied which generates a stego image which is immune against conventional attack and performs good perceptibility compared to other steganographic approaches. Index Terms: Network security, Steganography, Discrete Wavelet Transform, Integer Wavelet Transform, Modified Arnold Transform, Merge Operation, Quality Measures
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNELijcsit
The wide use of digital images and videos in various applications warrant serious attention to the security and privacy issues today. Several encryption techniques have been proposed in recent years as feasible solutions to the protection of digital images and videos. In many applications, such as pay-per-view videos,pay-TV and video on demand, one of the required features is that the quality of the video data be degraded only partially by some encryption technique and the encrypted data must still be partially perceptible. This feature referred to as ‘Perceptual encryption’ is the encryption algorithm that degrades the quality of media content according to security or quality requirements. In this work we propose a simple yet efficient technique for realizing perceptual encryption using geometric objects as kernels based on which the pixels are permuted. Confusion aspect that is required is realized by inserting the kernel on the image and thereby performing transposition of pixels based on the kernel formed out of geometric objects. The various parameters of geometric objects, number of objects and the position of the objects/kernel in the image are used as the key for encryption and later on for decryption. Further a choice of quality of the image required i.e., different levels of degradation is provided by adjusting the above parameters of the objects/kernel.From the results obtained it is evident that the proposed method which is more apt for perceptual encryption can also be used effectively for full image encryption with acceptable level of security.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
Highly secure scalable compression of encrypted imageseSAT Journals
Abstract A highly secure scalable compression method for stream cipher encrypted images is described in this journal. The input image first undergoes encryption and then shuffling. This shuffling in the image pixels enhances the security. For shuffling, Henon map is used. There are two layers for the scalable compression namely base layer and enhancement layer. Base layer bits are produced by coding a series of non-overlapping patches of uniformly down sampled version of encrypted image. In the enhancement layer pixels are selected by random permutation and then coded. From all the available pixel samples an iterative multi scale technique is used to reconstruct the image and finally performs decryption. The proposed method has high security. Key Words: Encryption, Decryption, Shuffling, Scalable compression
Steganography is a technique of concealing the secret information in a digital carrier media, so that only
the authorized recipient can detect the presence of secret information. In this paper, we propose a spatial
domain steganography method for embedding secret information on conditional basis using 1-Bit of Most
Significant Bit (MSB). The cover image is decomposed into blocks of 8*8 matrix size. The first block of
cover image is embedded with 8 bits of upper bound and lower bound values required for retrieving
payload at the destination. The mean of median values and difference between consecutive pixels of each
8*8 block of cover image is determined to embed payload in 3 bits of Least Significant Bit (LSB) and 1 bit
of MSB based on prefixed conditions. It is observed that the capacity and security is improved compared to
the existing methods with reasonable PSNR.
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
Rapid growth of digital communication and multimedia application increases the need of security and it becomes an important issue of communication and storage of multimedia. Image Encryption is one of the techniques that are used to ensure high security. Various fields such as medical science military in which image encryption can be used. Recent cryptography provides necessary techniques for securing information and protective multimedia data. In last some years, encryption technology has been developed quickly and many image encryption methods have been used to protect confidential image data from illegal way in. Within this paper survey of different image encryption techniques have been discussed from which researchers can get an idea for efficient techniques to be used.
Transmission of cryptic text using rotational visual cryptographyeSAT Journals
Abstract Today security is an important thing when we need to transmit data from one location to another safely. In this paper we are proposing an empirical model of secure data transmission technique with a hybrid approach of Cryptography, Stegnography and rotational analysis. In the initial phase, data is encrypted with DES algorithm with the help of Session key which is generated by the Diffie-Hellman Key exchange Algorithm. In the second phase Cipher Data is hidden into the cover image’s LSB to form the stego image, by considering security as the optimal security parameter. In the third phase, the Stego image is rotated with specific angle. At the receiver end, the image is de-rotated and the cipher information from the LSB is retrieved and the cipher information is decrypted with session key. This scheme achieves lossless recovery and is difficult to decrypt by the attackers. Keywords: Cryptography, Stegnography, Visual Cryptography, DES, Diffie-Hellman Algorithm, Session Key
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Moderate quality of voice transmission using 8 bit micro-controller through z...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Load balancing in public cloud combining the concepts of data mining and netw...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
An ideal steganographic scheme in networks using twisted payloadeSAT Journals
Abstract With the rapid development of network technology, information security has become a mounting problem. Steganography involves hiding information in a cover media, in such a way that the cover media is not supposed to have any confidential message for its unintentional addressee In this paper, an ideal steganographic scheme in networks is proposed using twisted payload. The confidential image values are twisted by using scrambling techiques.The Discrete Wavelet Transform (DWT) is applied on cover image and Integer Wavelet Transform (IWT) is applied to the scrambled confidential image. Merge operation is done on both images and Inverse DWT is computed on the same to get the stego image. The information hiding algorithm is the reverse process of the extracting algorithm. After this an ideal steganographic scheme is applied which generates a stego image which is immune against conventional attack and performs good perceptibility compared to other steganographic approaches. Index Terms: Network security, Steganography, Discrete Wavelet Transform, Integer Wavelet Transform, Modified Arnold Transform, Merge Operation, Quality Measures
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNELijcsit
The wide use of digital images and videos in various applications warrant serious attention to the security and privacy issues today. Several encryption techniques have been proposed in recent years as feasible solutions to the protection of digital images and videos. In many applications, such as pay-per-view videos,pay-TV and video on demand, one of the required features is that the quality of the video data be degraded only partially by some encryption technique and the encrypted data must still be partially perceptible. This feature referred to as ‘Perceptual encryption’ is the encryption algorithm that degrades the quality of media content according to security or quality requirements. In this work we propose a simple yet efficient technique for realizing perceptual encryption using geometric objects as kernels based on which the pixels are permuted. Confusion aspect that is required is realized by inserting the kernel on the image and thereby performing transposition of pixels based on the kernel formed out of geometric objects. The various parameters of geometric objects, number of objects and the position of the objects/kernel in the image are used as the key for encryption and later on for decryption. Further a choice of quality of the image required i.e., different levels of degradation is provided by adjusting the above parameters of the objects/kernel.From the results obtained it is evident that the proposed method which is more apt for perceptual encryption can also be used effectively for full image encryption with acceptable level of security.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
Highly secure scalable compression of encrypted imageseSAT Journals
Abstract A highly secure scalable compression method for stream cipher encrypted images is described in this journal. The input image first undergoes encryption and then shuffling. This shuffling in the image pixels enhances the security. For shuffling, Henon map is used. There are two layers for the scalable compression namely base layer and enhancement layer. Base layer bits are produced by coding a series of non-overlapping patches of uniformly down sampled version of encrypted image. In the enhancement layer pixels are selected by random permutation and then coded. From all the available pixel samples an iterative multi scale technique is used to reconstruct the image and finally performs decryption. The proposed method has high security. Key Words: Encryption, Decryption, Shuffling, Scalable compression
Steganography is a technique of concealing the secret information in a digital carrier media, so that only
the authorized recipient can detect the presence of secret information. In this paper, we propose a spatial
domain steganography method for embedding secret information on conditional basis using 1-Bit of Most
Significant Bit (MSB). The cover image is decomposed into blocks of 8*8 matrix size. The first block of
cover image is embedded with 8 bits of upper bound and lower bound values required for retrieving
payload at the destination. The mean of median values and difference between consecutive pixels of each
8*8 block of cover image is determined to embed payload in 3 bits of Least Significant Bit (LSB) and 1 bit
of MSB based on prefixed conditions. It is observed that the capacity and security is improved compared to
the existing methods with reasonable PSNR.
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
Rapid growth of digital communication and multimedia application increases the need of security and it becomes an important issue of communication and storage of multimedia. Image Encryption is one of the techniques that are used to ensure high security. Various fields such as medical science military in which image encryption can be used. Recent cryptography provides necessary techniques for securing information and protective multimedia data. In last some years, encryption technology has been developed quickly and many image encryption methods have been used to protect confidential image data from illegal way in. Within this paper survey of different image encryption techniques have been discussed from which researchers can get an idea for efficient techniques to be used.
Transmission of cryptic text using rotational visual cryptographyeSAT Journals
Abstract Today security is an important thing when we need to transmit data from one location to another safely. In this paper we are proposing an empirical model of secure data transmission technique with a hybrid approach of Cryptography, Stegnography and rotational analysis. In the initial phase, data is encrypted with DES algorithm with the help of Session key which is generated by the Diffie-Hellman Key exchange Algorithm. In the second phase Cipher Data is hidden into the cover image’s LSB to form the stego image, by considering security as the optimal security parameter. In the third phase, the Stego image is rotated with specific angle. At the receiver end, the image is de-rotated and the cipher information from the LSB is retrieved and the cipher information is decrypted with session key. This scheme achieves lossless recovery and is difficult to decrypt by the attackers. Keywords: Cryptography, Stegnography, Visual Cryptography, DES, Diffie-Hellman Algorithm, Session Key
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Moderate quality of voice transmission using 8 bit micro-controller through z...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Load balancing in public cloud combining the concepts of data mining and netw...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Sentence level sentiment polarity calculation for customer reviews by conside...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Analysis of river flow data to develop stage discharge relationshipeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Unified Approach With Neural Network for Authentication, Security and Compres...CSCJournals
The Present demands of scientific and social life forced image processing based applications to have a tremendous growth. This growth at the same time has given numbers of challenges to researcher to meet the desired objectives of either users or from solution perspectives. Among the various challenges, the most dominating areas are: reduction in required memory spaces for storage or taken transmission time from one location to other, protection of image contents to maintain the privacy and to facilitate the mechanism to identify the malicious modification if there is any either in storage or in transmission channel. Even though there are number of methods proposed by various researchers and are existed as solutions, questions are remain open in terms of quality, cost and complexity. In this paper we have proposed the concept based on neural network to achieve the quality of compression, protection and authentication all together using the ability of universal approximation by learning, one way property and one to one mapping characteristics correspondingly. With the proposed methods not only we can authenticate the image but also positions of malicious activity given in the image can be located with high precision. Proposed methods are very efficient in performance as well as carry the features of simplicity and cost effectiveness.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
The security of authentication of internet based
co-banking services should not be susceptible to high risks.
The passwords are highly vulnerable to virus attacks due to
the lack of high end embedding of security methods. In order
for the passwords to be more secure, people are generally
compelled to select jumbled up character based passwords
which are not only less memorable but are also equally prone
to insecurity. Multiple use of distributed shares has been
studied to solve the problem of authentication by algorithms
based on thresholding of pixels in image processing and visual
cryptography concepts where the subset of shares is considered
for the recovery of the original image for authentication using
correlation function[1][2].The main disadvantage in the above
study is the plain storage of shares and also one of the shares
is being supplied to the customer, which will lead to the
possibility of misuse by a third party. This paper proposes a
technique for scrambling of pixels by key based random
permutation (KBRP) within the shares before the
authentication has been attempted. Total number of shares to
be created is dependent on the multiplicity of ownership of
the account. By this method the problem of uncertainty among
the customers with regard to security, storage, retrieval of
holding of half of the shares is minimized.
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...CSCJournals
In this article, the security performance and quality for image encryption and decryption based on filter bank and the combination between XOR and addition modulo 28 have been studied and assessed. The most common security parameters for image encryption and decryption have been employed. The parameters have been used to examine the proposed image encryption scheme with one and two rounds. The parameters include histogram, correlation coefficient, global entropy, block entropy, avalanche effect, number of pixel change rate (NPCR), unified average change intensity (UACI), exhaustive key analysis, and key sensitivity test. The simulation results proved that, the image encryption process passes all these tests. Moreover, it reaches or excels the current state of the arts. So the encrypted image becomes random-like from the statistical point of views after encryption.
Image Encryption Using Differential Evolution Approach in Frequency Domainsipij
This paper presents a new effective method for image encryption which employs magnitude and phase manipulation using Differential Evolution (DE) approach. The novelty of this work lies in deploying the concept of keyed discrete Fourier transform (DFT) followed by DE operations for encryption purpose. To this end, a secret key is shared between both encryption and decryption sides. Firstly two dimensional (2-D) keyed discrete Fourier transform is carried out on the original image to be encrypted. Secondly crossover is performed between two components of the encrypted image, which are selected based on Linear Feedback Shift Register (LFSR) index generator. Similarly, keyed mutation is performed on the real parts of a certain components selected based on LFSR index generator. The LFSR index generator initializes it seed with the shared secret key to ensure the security of the resulting indices. The process shuffles the positions of image pixels. A new image encryption scheme based on the DE approach is developed which is composed with a simple diffusion mechanism. The deciphering process is an invertible process using the same key. The resulting encrypted image is found to be fully distorted, resulting in increasing the robustness of the proposed work. The simulation results validate the proposed image encryption scheme.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Proposed aes for image steganography in different mediaseSAT Journals
Abstract
In this paper, the author presents an enhanced version of modified AES for image-audio steganography technique. The proposed technique improves the security level of encryption and steganography process. Digital image processing is a wide area for research. Images are widely used today. Processing on images means some editing, preprocessing, restoration, compression, steganography and encryption. Steganography is concealing secret information into cover information. Encryption is mainly used for encoding the content of an image into something that cannot be understandable by unauthorized persons. Authorized are those who have the legal access to the content. Nowadays everyone is after information so; it becomes the need today to secure the (confidential) information. The proposed AES technique is an enhancement of modified AES method, which focuses on improving the security of steganography images. Modified AES is described in four steps: first step is key expansion, second is sub bytes modification, third is new shift rows and at last mixing of columns is applied to the matrix. This technique will provide better security and good quality encryption and decryption. Results shows that this method takes less time with the high quality of encrypted image
Keywords – Steganography, Modified Advance Encyption Standard(MAES), Proposed Advance Encyption Standard(PAES),Image Steganography , Image Encryption.
Video Encryption and Decryption with Authentication using Artificial Neural N...IOSR Journals
Abstract :Multimedia data security is becoming important with the continuous increase of digital communications on internet. With the rapid development of various multimedia technologies, more and more multimedia data are generated and transmitted in the medical, commercial, and military fields, which may include some sensitive information which should not be accessed by or can only be partially exposed to the general users. . The encryption algorithms developed to secure text data are not suitable for multimedia application because of the large data size and real time constraint. Therefore, there is a great demand for secured data storage and transmission techniques. Information security has traditionally been ensured with data encryption and authentication techniques. The secrecy of communication is maintained by secret key exchange. In effect the strength of the algorithm depends solely on the length of the key. The presented work aims at secure video transmission using randomness in encryption algorithm, thereby creating more confusion to obtain the original data. The security of the original cipher has been enhanced by addition of impurities to misguide the cryptanalyst. Since the encryption process is one way function, the artificial neural networks are best suited for this purpose as they possess features like high security, no distortion and its ability to perform for non linear input-output characteristics, In the presented work the need for key exchange is also eliminated, which is otherwise a perquisite for most of the algorithms used today. The proposed work finds its application in medical imaging systems, military image database communication and confidential video conferencing, and similar such application. The results are obtained through the use of MATLAB 7.14.0 Keywords: Artificial Neural networks, Back propagation algorithm, video encryption and decryption, cipher and decipher.
Video Encryption and Decryption with Authentication using Artificial Neural N...IOSR Journals
Abstract :Multimedia data security is becoming important with the continuous increase of digital
communications on internet. With the rapid development of various multimedia technologies, more and more
multimedia data are generated and transmitted in the medical, commercial, and military fields, which may
include some sensitive information which should not be accessed by or can only be partially exposed to the
general users. . The encryption algorithms developed to secure text data are not suitable for multimedia
application because of the large data size and real time constraint. Therefore, there is a great demand for
secured data storage and transmission techniques. Information security has traditionally been ensured with
data encryption and authentication techniques. The secrecy of communication is maintained by secret key
exchange. In effect the strength of the algorithm depends solely on the length of the key. The presented work
aims at secure video transmission using randomness in encryption algorithm, thereby creating more confusion
to obtain the original data. The security of the original cipher has been enhanced by addition of impurities to
misguide the cryptanalyst. Since the encryption process is one way function, the artificial neural networks are
best suited for this purpose as they possess features like high security, no distortion and its ability to perform for
non linear input-output characteristics, In the presented work the need for key exchange is also eliminated,
which is otherwise a perquisite for most of the algorithms used today. The proposed work finds its application in
medical imaging systems, military image database communication and confidential video conferencing, and
similar such application. The results are obtained through the use of MATLAB 7.14.0
Keywords: Artificial Neural networks, Back propagation algorithm, video encryption and decryption, cipher
and decipher
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
block diagram and signal flow graph representation
An improved color image encryption algorithm with
1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 333
AN IMPROVED COLOR IMAGE ENCRYPTION ALGORITHM WITH
PIXEL PERMUTATION AND BIT SUBSTITUTION
Lini Abraham1
, Neenu Daniel2
1
M Tech Student, Computer Science and Engineering (CSE), Viswajyothi College of Engineering and Technology,
Vazhakulam, Kerala, India, linirt33@gmail.com
2
Assistant Professor, Computer Science and Engineering (CSE), Viswajyothi College of Engineering and Technology,
Vazhakulam, Kerala, India, neenudaniel@email.com
Abstract
Today the transmission of multimedia data including image and video is growing in telecommunications. Security is one of the
main issues in transferring such sensitive information. Powerful image encryption algorithm is the solution for this problem. This
paper is an implementation of a color image encryption algorithm based on Rubik’s cube technique. The Rubik’s cube technique
is used for pixel permutation and a bit substitution method based on DNA sequences are used to change the value of each pixel on
the image. Then the time-stamp is appended with encrypted image, which can be used to identify the replay attack. For evaluating
the performance of the algorithm a series of tests are performed. These tests include information entropy analysis, correlation
analysis, analysis of NPCR and UACI values etc.
Index Terms: Cryptography, encryption, decryption, timestamp, replay attack, plaintext, cipher-text, algorithm,
chaos.
--------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
Information security plays a significant role in all fields,
especially those related to confidential business or military
affairs. Keeping data from being accessed by unauthorized
users and from being corrupted is called data security.
Encryption is a very important security mechanism. It works
by scrambling the information into unreadable information
and then uses a key to unscramble it for reading. Encryption
on image or video objects has its own requirements due to
the intrinsic characters of images such as bulk data capacity
and high redundancy. Traditional symmetric encryption
algorithms are generally not suitable for image encryption
due to their slow speed in real-time processing and some
other issues such as in handling various data formatting. A
variety of chaos-based digital image encryption algorithms
have been suggested. Usually chaos based encryption
algorithms uses small key spaces. The theory of chaos has
been widely used for image encryption because of its
excellent cryptography characteristics and intrinsic features
of image. Various algorithms provide different degrees of
security and it is based on how hard they are to break. If the
cost required to break an algorithm is greater than the value
of the encrypted data then the algorithm probably
considered to be safe. Modern high quality image encryption
methods have several flaws and are subjected to extensive
attacks by expert cryptanalyst. Thorough study and analysis
between these techniques are needed to measure the
performance and to choose the better one for the intended
application. For certain applications speed of encryption
may be the prime concern and for some other cases the
security will be important.
There are three kinds of encryption techniques namely
substitution, transposition or permutation and techniques
that include both transposition and substitution. Substitution
schemes change the pixel values while permutation schemes
just shuffle the pixel values based on the algorithm. In some
cases both the methods are combined to improve security.
[3] Is an introduction about chaos based image encryption.
Chaos theory has proved to be an excellent alternative to
provide a fast, simple, and reliable image encryption scheme
that has a high enough degree of security. The method in [8]
is chaos based using bit level permutation. Permutation at
the bit level not only changes the position of the pixel but
also alters its value. In [9] a novel image encryption method
based on total shuffling scheme is illustrated. In [10]
combinations of two logistic maps are used for improving
the security of encryption. Encryption in [11] uses multiple
chaotic systems. But each of these methods has some
security issues. The algorithm in [12] combines the diffusion
and confusion operations and uses the spatial-temporal
chaotic system for generating the key. But this is time
consuming. As the key space increases the security of the
algorithm also get improved. Here this proposed scheme is
applied on a chaos based secure image encryption algorithm
based on Rubik’s cube principle in [1]. It is an image
encryption algorithm based on Rubik’s cube principle. From
[2] it is evident that this algorithm performs well as
compared to the technique in [12] in time period and other
results are also comparable.
Differential and cryptographic attacks are major concerns in
data transmission. Even thorough some of the chaos based
image encryption techniques resist these types of attacks to
2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 334
some extent; more protecting solutions are needed for further improvement. Replay attack is one of the major
security outbreaks. It can be defined as a network attack in
which a genuine data transmission is maliciously repeated or
delayed. It can be done by the originator or by an advisory.
The common measures for this type of attacks are session
tokens, one time passwords, combination of nonce and
MAC and timestamps. The content in [4] describes the
replay attack. [5] and [6] proposes some methods to prevent
such attacks. In [7], Denning proposed a method for
preventing replay attack with the help of timestamps. These
methods are usually used for preventing replay attack in
normal data transmission. The proposed system is all about
to prevent the replay attack on digital image transmission
with the help of timestamps. The technique based on grey
scale images is proposed in [14]. In [14] only permutation
mechanism is used for encrypting the grey scale image. But
the proposed system improves the security of that algorithm
by adding a bit substitution technique in [15] for encrypting
color images.
The remaining of this paper is organized as follows. Section
2 describes the proposed system. The overview of the
algorithm is presented and detailed explanation of DNA bit
substitution technique is also given. In section 3 the new
image encryption technique is compared with the Rubik’s
cube technique and the result for the same is also presented.
The results of images with distinct and various sizes are
evaluated and discussed. The last section describes the
conclusions and further discussions.
Fig -1 Overview of the proposed system
2. PROPOSED SYSTEM
The proposed system is an enhancement to the Rubik’s cube
based technique in color image. The overview of the system
is given in Fig -1. First the timestamp is taken and added
with the shared key value. Then two random keys are
generated for permuting the pixel values of the image using
Rubik’s cube principle in [1]. Then a substitution technique
based on DNA sequences are employed which is described
in [15]. Then KBRP (Key Based Random Permutation) [13]
is used to hide the time-stamp in the encrypted image. That
will form the cipher image.
During decryption, first the time-stamp is extracted from the
encrypted image by using the shared secret key. The
difference between the extracted time and the current time is
taken. If that difference is within the threshold then the
decryption is performed otherwise it is rejected. For
performing the decryption, the time-stamp is appended with
the key and the two random numbers are generated. The
decryption is then performed to get the original image.
Before performing these operations the system time should
be synchronized.
Every module except the DNA substitution is already
explained in [14]. In that proposal only permutation of
pixels in the image was used. But if we are adding a
substitution along with that image the security will get
improved. In this paper a bit substitution method based on
DNA sequences is proposed based on [15]. The detailed
explanation about DNA sequence substitution is given
below.
Appending key and timestamp
Key
Generating two random keys for
encryption with the modified key
Encryption of the image using Rubik’s
cube principle and DNA substitution
Hiding the timestamp on the encrypted
image
Extracting the timestamp from
encrypted image and checking replay
attack
Appending key and the timestamp
Decrypting the image using Rubik’s
cube principle and DNA reverse
substitution
Generating two random keys for
decryption with the help of modified
key
Key
3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 335
2.1 Chaotic DNA Substitution
The proposed substitution method is a chaotic DNA
transformation. Here two rules or steps are involved. They
are: -
• Binary coding rule
• Complementary rule
The binary coding rule transforms letters A, C, G and T into
binary codes and vice versa. In this particular method the
following binary encoding is adopted. A=00, C=01, G=10,
T=11. That means A is coded as "00", C as "01" etc. Then
each pixel value in the encryption is transformed to binary
using the DNA encoding.
In complementary rule, each letter x is assigned to a
complement denoted C(x). Here the C(x) represents the
complement of x. For getting a clear picture, consider an
example, for the following complementary transformation:
(AT)(TC)(CG)(GA), the conclusion is that C(A) = T, C(T) =
C, C(C) = G and C(G) = A. There are six allowable
complementary transformations, they are: -
(AT)(TC)(CG)(GA)
(AT)(TG)(GC)(CA)
(AC)(CT)(TG)(GA)
(AC)(CG)(GT)(TA)
(AG)(GT)(TC)(CA)
(AG)(GC)(CT)(TA).
The perturbed chaotic value used to control the substitution
process is transformed to binary format (8 bits). Each pixel
is represented by 8 bits (4 pairs). For example consider the
pixel value "222" which is represented as 11 01 11 10. A
random value is generated for each pixel on the image using
PWLCM (Piecewise Linear Chaotic Map). The equation for
PWLCM is given by: -
Where p is the positive control parameter and the chaotic
values x(i),i = 1,2,...,n, are real values and belong to the
intervals (0, 0.5) and (0, 1) respectively. The initial values p
and x(0) are calculated from the modified key value. The
output from the chaotic map is represented in 8 bits. For
each pixel in the plain image a random value in 8 bits is
generated and the pixel value is represented in 4 pairs as
explained above.
From the random value generated for a pixel, the most
significant 3 bits are used to select one of the six
transformations given above. And that transformation rule is
used for that particular pixel value. The transformation
number can be calculated by the following equation: -
Remaining 5 bits are used to compute the number of
iterations the complementary transformation is to be applied
on each pair of bits. Here the complementary rule is applied
only on 3 pairs, the right most pair is not used because of the
chances of changes during the time-stamp hiding. In other
words the fourth and fifth bits of the random number are
used to generate how many times it(1), the complementary
transformation is applied to the first two bits of the pixel
value in process. The fifth and sixth random bits are used to
determine number of the complementary rounds of it(2) for
the second pair of bits. The sixth and seventh bits are used
for the third pair of the value in process. The extraction of
this number of iterations on 1st
, 2nd
and 3rd
pair of pixel
values are given by: -
For example, consider the previous example "222" as the
pixel value. It can be represented as 11 01 11 10. Now take
the first pair of bits "11". The binary coding rule is given as
A=00, C=01, G=10, T=11. From the generated chaotic value
the most significant 3 bits can be used to find out the
sequence number. Suppose that the sequence number for
that particular pixel is 5. So the 5th complementary rule is
(AG)(GT)(TC)(CA).
If it(1) = 2, then the number of iterations for the first pair is
2. Here the first pair "11" means T from the binary coding
rule. In first iteration C(T) = C( from fifth sequence). The
value of C is "01" as per the binary coding rule. First T
("11") is replaced with C ("01"). In the second iteration
C(C) = A. So "01" is replaced by "00". This is performed for
the remaining two pairs and again they are combined
together to get the cipher value. For each pixel this is
repeated. So for each one the sequence selected and the
number of iterations is different.
3. RESULTS AND DISCUSSIONS
The Fig -2 shows an example for the encryption and
decryption using the proposed method. The test image
selected is AIR plane. The experiments are done on
4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 336
256×256 images with 128 bit key. We can see that the
original and the decrypted images are same and the
encrypted image is random. For performing the analysis the
parameters like NPCR (Number of pixel change
rate), UACI (Unified average changing intensity), entropy,
correlation coefficient and PSNR (Pixel to noise ratio) are
evaluated. The definitions and detailed explanations of these
parameters are given in [16].
Fig -2 Example using improved scheme
Some of the evaluation results for the improved scheme are
given in Table -1. The NPCR is 99.6246 and the UACI is
34.7988 for a 256×256 AIR plane color image. The NPCR
should be high as possible for an enhanced technique. The
UACI should be around 33%. We can see that the
correlation coefficients are also low. The time for encryption
and decryption will vary from system to system. The time
required for overall process is below one minute. The PSNR
value between original and decrypted image is infinity. This
means that the pixel values in original and the encrypted
images are distinct.
Table -1 Results of simulation on color image
Parameter Improved technique
NPCR
99.6246
UACI
34.7988
Entropy
7.9970
Horizontal correlation
-0.0347
Vertical correlation
0.0015
Diagonal correlation
-0.0022
PSNR
Infinity
Now the results by the application of the new scheme in
different 256×256 color images are given in Table -2. Here
the test images are Lena, Baboon and Pepper. As it includes
the effect of the time-stamp which varies by time, a little
variation in the results is possible. It is because of the reason
that on each times the timestamp varies. From the table we
can see optimal results.
Table -2 Results for different images having same size
Parameter AIR
plane
Lena Baboon Pepper
NPCR 99.6038 99.6048 99.6099 99.6068
UACI 34.7276 31.0178 29.1335 31.9751
Entropy 7.9973 7.9975 7.9973 7.9971
Horizontal
correlation
-0.0057 -0.1290 0.0013 -0.0030
Vertical
correlation
0.0037 -0.0026 0.3152 0.7563
Diagonal
correlation
0.1035 0.0041 -0.0016 0.2527
PSNR Infinity Infinity Infinity Infinity
Next the Rubik’s cube technique and the improved scheme
is applied on variable sized test images. The results of this
comparison are plotted as graphs in Fig -3 and Fig -4.
In Fig -3 the NPCR values are compared. Higher NPCR
values are desired for ideal encryption schemes. This will
indicate the percentage of different pixels between two
5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 337
images. The red line shows the improved scheme and the
blue line is the Rubik’s cube based technique.
The Fig -4 shows the comparison of entropy values. It is an
important concept for analyzing an encryption scheme.
Entropy gives an idea about self-information. From the
results it is evident that the improved method is comparable
with the Rubik’s cube technique and provides more security.
Fig -3 Comparison of NPCR values
Fig -4 Comparison of UACI values
CONCLUSIONS
Chaos based encryption algorithms are employed nowadays
because of their better security and performance aspects.
Each of the image encryption techniques has its own
advantages. Identification of the suitable algorithm for a
particular application depends on the prerequisites of that
application. The technique using Rubik’s cube principle has
a large key space and its implementation is quite simple.
Later the security of the Rubik’s cube technique has
improved by adding time-stamp and chaotic DNA
substitution. The time-stamp is appended with the original
key. So the time-stamp is specially added to produce
different cipher texts by applying same key on same plain
text. Also it can be used to check the replay attack. But it is
under the assumption that the system time is synchronized.
In basic Rubik’s cube based approach bit substitution is not
used. So a chaotic bit substitution method based on DNA
sequences is added for improving the security. The
comparison results and assessments have done and
presented. From that the efficiency of the improved
approach is evident. The experimental result shows that the
improved scheme performs well in color images. New
techniques and modifications can be added on to the
proposed system for making excellent multimedia
applications.
REFERENCES
[1] Khaled Loukhaoukha, Jean-Yves Chouinard, and
Abdellah Berdai, “A Secure Image Encryption
Algorithm Based on Rubik’s Cube Principle”,
Department of Electrical and Computer
Engineering, 2011.
[2] Lini Abraham, Neenu Daniel, “Secure image
encryption algorithms: A review”, IJSTR, 2013.
[3] Yaobin Mao and Guanrong Chen, “Chaos-Based
Image Encryption”, in Hand- book of geometric
computing, Springer,2005.
[4] Li Gong and Paul Syverson, “Fail-stop protocols:
An approach to designing secure protocols”, In 5th
International Working Conference on De- pendable
Computing for Critical Applicaitons, pages 44–55,
September 1995.
[5] Sreekanth Malladi, Jim Alves-Foss, Robert B.
Heckendorn, “On Preventing Replay Attacks on
Security Protocols”.
[6] T. Aura “Strategies against replay attacks”, In
Proceedings of the 10th IEEE Computer Society
Foundations Workshop, pages 59 – 68, Rockport,
MA, June 1997. IEEE Computer Society Press.
[7] D. Denning and G. Sacco, “Timestamps in key
distribution protocols”. Communications of the
ACM, 24(8):553–536, August 1981.
[8] Zhi-liang Zhu, Wei Zhang, Kwok-wo Wong, Hai
Yu, “A chaos-based symmetric image encryption
scheme using a bit-level permutation”, Information
Sciences 181 1171–1186 Elsevier, 2010.
[9] G. Zhang and Q. Liu, “A novel image encryption
method based on total shuffling scheme”, Optics
Communications, vol. 284, no. 12, pp. 2775–2780,
2011.
[10]Ismail1, Mohammed Amin, Hossam Diab, “ A
Digital Image Encryption Algorithm Based A
6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 338
Composition Of Two Chaotic Logistic Maps”,
Proc. 27th IEEE Int’l Conf. Signal Processing., pp.
733-739,2011.
[11]H.Alsafasfeh, and, A.A.Arfoa, Image encryption
based on the general approach for multiple
chaotic system, Journal of Signal and Information
Processing 2, 238- 244, 2011.
[12]Yong Wanga, Kwok-Wo Wong, XiaofengLiaoc,
Guanrong Chen, “A new chaos- based fast image
encryption algorithm”, in Applied Soft Computing,
Elsevier, 2011.
[13]Shakir M. Hussain1 and Naim M. Ajlouni, “Key
Based Random Permutation”, Journal of Computer
Science 2 (5): 419-421, 2006.
[14]Lini Abraham, Neenu Daniel, “Enhancing the
Security of Image Encryption Algorithms by
Adding Timestamp”, IJARET, Vol. 1, Issue VIII,
Sep. 2013.
[15]Abir Awad and Ali Miri, “A New Image
Encryption Algorithm Based on a Chaotic DNA
Substitution Method” in , Communications (ICC)
on IEEE, p. 1011-1015, June 2012.
[16]Jawad Ahmad and Fawad Ahmed, “Efficiency
Analysis and Security Evalu- ation of Image
Encryption Schemes”, in International Journal of
Video and Image Processing and Network Security,
IJVIPNS-IJENS, Vol:12 No.04, 2010.