IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Cryptography is the combination of Mathematics and Computer science. Cryptography is used for encryption and decryption of data using mathematics. Cryptography transit the information in an illegible manner such that only intended recipient will be able to decrypt the information
Rejuvenate Pointcut: A Tool for Pointcut Expression Recovery in Evolving Aspe...Raffi Khatchadourian
Invited tool demonstration at the 8th International Conference on Aspect-Oriented Software Development (AOSD '09), Charlottesville, VA, USA, March 2-6, 2009.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Low Power FPGA Based Elliptical Curve CryptographyIOSR Journals
Cryptography is the study of techniques for ensuring the secrecy and authentication of the
information. The development of public-key cryptography is the greatest and perhaps the only true revolution in
the entire history of cryptography. Elliptic Curve Cryptography is one of the public-key cryptosystem showing
up in standardization efforts, including the IEEE P1363 Standard. The principal attraction of elliptic curve
cryptography compared to RSA is that it offers equal security for a smaller key-size, thereby reducing the
processing overhead. As a Public-Key Cryptosystem, ECC has many advantages such as fast speed, high
security and short key. It is suitable for the hardware of implementation, so ECC has been more and more
focused in recent years. The hardware implementation of ECC on FPGA uses the arithmetic unit that has small
area, small storage unit and fast speed, and it is an extremely suitable system which has limited computation
ability and storage space.[1][2] The modular arithmetic division operations are carried out using conditional
successive subtractions, thereby reducing the area. The system is implemented on Vertex-Pro XCV1000 FPGA
Cryptography is the combination of Mathematics and Computer science. Cryptography is used for encryption and decryption of data using mathematics. Cryptography transit the information in an illegible manner such that only intended recipient will be able to decrypt the information
Rejuvenate Pointcut: A Tool for Pointcut Expression Recovery in Evolving Aspe...Raffi Khatchadourian
Invited tool demonstration at the 8th International Conference on Aspect-Oriented Software Development (AOSD '09), Charlottesville, VA, USA, March 2-6, 2009.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Low Power FPGA Based Elliptical Curve CryptographyIOSR Journals
Cryptography is the study of techniques for ensuring the secrecy and authentication of the
information. The development of public-key cryptography is the greatest and perhaps the only true revolution in
the entire history of cryptography. Elliptic Curve Cryptography is one of the public-key cryptosystem showing
up in standardization efforts, including the IEEE P1363 Standard. The principal attraction of elliptic curve
cryptography compared to RSA is that it offers equal security for a smaller key-size, thereby reducing the
processing overhead. As a Public-Key Cryptosystem, ECC has many advantages such as fast speed, high
security and short key. It is suitable for the hardware of implementation, so ECC has been more and more
focused in recent years. The hardware implementation of ECC on FPGA uses the arithmetic unit that has small
area, small storage unit and fast speed, and it is an extremely suitable system which has limited computation
ability and storage space.[1][2] The modular arithmetic division operations are carried out using conditional
successive subtractions, thereby reducing the area. The system is implemented on Vertex-Pro XCV1000 FPGA
International Journal of Computational Engineering Research(IJCER) ijceronline
nternational Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
This project involves Hardware Implementation of TIAOXIN-346, a design submitted in CAESAR in relation to Authenticated Encryption Scheme. This design includes AES for Encryption and Decryption purpose. Presently working on Side Channel Attacks to test the design's security. Complete documentation is on the profile.
Data Security Using Elliptic Curve CryptographyIJCERT
Cryptography technique is used to provide data security. In existing cryptography technique the key generation takes place randomly. Key generation require shared key. If shared key is access by unauthorized user then security becomes disoriented. Hence existing problems are alleviated to give more security to data. In proposed system a algorithm called as Elliptic Curve Cryptography is used. The ECC generates the key by using the point on the curve. The ECC is used for generating the key by using point on the curve and encryption and decryption operation takes place through curve. In the proposed system the encryption and key generation process takes place rapidly.
The Goal and The Journey - Turning back on one year of C++14 MigrationJoel Falcou
C++14 has been announced as the next best thing since sliced bread in terms of simplicity, performance and overall elegance of c++ code. This talk is the story of why and how we decided to migrate one of our old 'modern C++' software library -- BSP++, a C++ implementation of the BSP parallel programming model -- to C++14.
More than just a recollection of 'use this' or 'do that' mottos, this talk will try to ponder on :
why one should consider migrating to C++14 now
which features actually helped and which one did not
the traps and pitfalls compilers tried to pull on us
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Improved security system using steganography and elliptic curve crypto...atanuanwesha
The main objectives of the project is to make the data safe and secure and transmit the data in such a way that it is not possible for anyone to detect the data . Steganography is concealing the secret message in non secret image. Whereas Encryption is converting data into code to prevent unauthorized access .Steganography as well as cryptography has its own disadvantage. Our objective is to implement both the procedures to enforce tight security and to prevent evesdropping etc.
In this presentation we consider several main methods for contruction regular QC-LDPC codes using algebraic approach. Consider existance of non broken by circulant permutation matrix cycles (short balanced cycles). Using Vontobel approach illustrate way to estimate girth bound and it influence on error-floor properties of QC-LDPC codes
Energy-Efficient LDPC Decoder using DVFS for binary sourcesIDES Editor
This paper deals with reduction of the transmission
power usage in the wireless sensor networks. A system with
FEC can provide an objective reliability using less power
than a system without FEC. We propose to study LDPC
codes to provide reliable communication while saving power
in the sensor networks. As shown later, LDPC codes are more
energy efficient than those that use BCH codes. Another
method to reduce the transmission cost is to compress the
correlated data among a number of sensor nodes before
transmission. A suitable source encoder that removes the
redundant information bits can save the transmission power.
Such a system requires distributed source coding. We propose
to apply LDPC codes for both distributed source coding and
source-channel coding to obtain a two-fold energy savings.
Source and channel coding with LDPC for two correlated nodes
under AWGN channel is implemented in this paper. In this
iterative decoding algorithm is used for decoding the data, and
it’s efficiency is compared with the new decoding algorithm
called layered decoding algorithm which based on offset min
sum algorithm. The usage of layered decoding algorithm and
Adaptive LDPC decoding for AWGN channel reduces the
decoding complexity and its number of iterations. So the power
will be saved, and it can be implemented in hardware.
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Computational Engineering Research(IJCER) ijceronline
nternational Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
This project involves Hardware Implementation of TIAOXIN-346, a design submitted in CAESAR in relation to Authenticated Encryption Scheme. This design includes AES for Encryption and Decryption purpose. Presently working on Side Channel Attacks to test the design's security. Complete documentation is on the profile.
Data Security Using Elliptic Curve CryptographyIJCERT
Cryptography technique is used to provide data security. In existing cryptography technique the key generation takes place randomly. Key generation require shared key. If shared key is access by unauthorized user then security becomes disoriented. Hence existing problems are alleviated to give more security to data. In proposed system a algorithm called as Elliptic Curve Cryptography is used. The ECC generates the key by using the point on the curve. The ECC is used for generating the key by using point on the curve and encryption and decryption operation takes place through curve. In the proposed system the encryption and key generation process takes place rapidly.
The Goal and The Journey - Turning back on one year of C++14 MigrationJoel Falcou
C++14 has been announced as the next best thing since sliced bread in terms of simplicity, performance and overall elegance of c++ code. This talk is the story of why and how we decided to migrate one of our old 'modern C++' software library -- BSP++, a C++ implementation of the BSP parallel programming model -- to C++14.
More than just a recollection of 'use this' or 'do that' mottos, this talk will try to ponder on :
why one should consider migrating to C++14 now
which features actually helped and which one did not
the traps and pitfalls compilers tried to pull on us
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Improved security system using steganography and elliptic curve crypto...atanuanwesha
The main objectives of the project is to make the data safe and secure and transmit the data in such a way that it is not possible for anyone to detect the data . Steganography is concealing the secret message in non secret image. Whereas Encryption is converting data into code to prevent unauthorized access .Steganography as well as cryptography has its own disadvantage. Our objective is to implement both the procedures to enforce tight security and to prevent evesdropping etc.
In this presentation we consider several main methods for contruction regular QC-LDPC codes using algebraic approach. Consider existance of non broken by circulant permutation matrix cycles (short balanced cycles). Using Vontobel approach illustrate way to estimate girth bound and it influence on error-floor properties of QC-LDPC codes
Energy-Efficient LDPC Decoder using DVFS for binary sourcesIDES Editor
This paper deals with reduction of the transmission
power usage in the wireless sensor networks. A system with
FEC can provide an objective reliability using less power
than a system without FEC. We propose to study LDPC
codes to provide reliable communication while saving power
in the sensor networks. As shown later, LDPC codes are more
energy efficient than those that use BCH codes. Another
method to reduce the transmission cost is to compress the
correlated data among a number of sensor nodes before
transmission. A suitable source encoder that removes the
redundant information bits can save the transmission power.
Such a system requires distributed source coding. We propose
to apply LDPC codes for both distributed source coding and
source-channel coding to obtain a two-fold energy savings.
Source and channel coding with LDPC for two correlated nodes
under AWGN channel is implemented in this paper. In this
iterative decoding algorithm is used for decoding the data, and
it’s efficiency is compared with the new decoding algorithm
called layered decoding algorithm which based on offset min
sum algorithm. The usage of layered decoding algorithm and
Adaptive LDPC decoding for AWGN channel reduces the
decoding complexity and its number of iterations. So the power
will be saved, and it can be implemented in hardware.
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...Madhumita Tamhane
In contrast to block codes, Convolution coding scheme has an information frame together with previous m information frames encoded into a single code word frame, hence coupling successive code word frames. Convolution codes are most important Tree codes that satisfy certain additional linearity and time invariance properties. Decoding procedure is mainly devoted to correcting errors in first frame. The effect of these information symbols on subsequent code word frames can be computed and subtracted from subsequent code word frames. Hence in spite of infinitely long code words, computations can be arranged so that the effect of earlier frames, properly decoded, on the current frame is zero.
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...IDES Editor
In this paper, we have combined the Robust
Cryptosystem for Non-invertible matrices based on Hill Cipher
technique with steganography method in order to securely
transmit text message. The steganography method used is LSB
insertion technique. The encryption and steganography
methods are used subsequently along with two randomization
technique: one of XOR the encrypted text and another of
randomized LSB insertion in any cover image. These two layers
of shuffling of text at different stages of encryption and
steganography provide two extra layers of security and make
the system robust against cryptanalytic attacks.
Digital Watermarking through Embedding of Encrypted and Arithmetically Compre...IJNSA Journal
In this paper, we have encrypted a text to an array of data bits through arithmetic coding technique. For this, we have assigned a unique range for both, a number of characters and groups using those. Using unique range we may assign range only 10 characters. If we want to encrypt a large number of characters, then every character has to assign a range with their group range of hundred, thousand and so on. Long textual message which have to encrypt, is subdivided into a number of groups with few characters. Then the group of characters is encrypted into floating point numbers concurrently to their group range by using arithmetic coding, where they are automatically compressed. Depending on key, the data bits from text are placed to some suitable nonlinear pixel and bit positions about the image. In the proposed technique, the key length and the number of characters for any encryption process is both variable
International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Low Power FPGA Based Elliptical Curve CryptographyIOSR Journals
Abstract: Cryptography is the study of techniques for ensuring the secrecy and authentication of the information. The development of public-key cryptography is the greatest and perhaps the only true revolution in the entire history of cryptography. Elliptic Curve Cryptography is one of the public-key cryptosystem showing up in standardization efforts, including the IEEE P1363 Standard. The principal attraction of elliptic curve cryptography compared to RSA is that it offers equal security for a smaller key-size, thereby reducing the processing overhead. As a Public-Key Cryptosystem, ECC has many advantages such as fast speed, high security and short key. It is suitable for the hardware of implementation, so ECC has been more and more focused in recent years. The hardware implementation of ECC on FPGA uses the arithmetic unit that has small area, small storage unit and fast speed, and it is an extremely suitable system which has limited computation ability and storage space.[1][2] The modular arithmetic division operations are carried out using conditional successive subtractions, thereby reducing the area. The system is implemented on Vertex-Pro XCV1000 FPGA. Index Terms – VHDL, FSM, FPGA, Elliptic Curve Cryptography.
On Fixed Point error analysis of FFT algorithmIDES Editor
In this correspondence the analysis of overall
quantization loss for the Fast Fourier Transform (FFT)
algorithms is extended to the case where the twiddle factor
word length is different from the register word length. First,
a statistical noise model to predict the Quantization error
after the multiplication of two quantized signals, of different
precision, is presented. This model is then applied to FFT
algorithms. Simulation results, that corroborate the
theoretical analysis, are then presented.
Image encryption using elliptical curve cryptosytem with hill cipherkarthik kedarisetti
IMAGE ENCRYPTION-BTECH FINAL YEAR PROJECT ZEROTH REVIEW.
Image encryption is rapidly increased recently by the increasing use of the internet and communication
media. Sharing important images over unsecured channels is liable for attacking and stealing. Encryption
techniques are the suitable methods to protect images from attacks. Hill cipher algorithm is one of the
symmetric techniques, it has a simple structure and fast computations, but weak security because sender
and receiver need to use and share the same private key within a non-secure channels. A new image
encryption technique that combines Elliptic Curve Cryptosystem with Hill Cipher (ECCHC) has been proposed
in this paper to convert Hill cipher from symmetric technique to asymmetric one and increase its
security and efficiency and resist the hackers. Self-invertible key matrix is used to generate encryption
and decryption secret key. So, no need to find the inverse key matrix in the decryption process. A secret
key matrix with dimensions 4 4 will be used as an example in this study. Entropy, Peak Signal to Noise
Ratio (PSNR), and Unified Average Changing Intensity (UACI) will be used to assess the grayscale image
encryption efficiency and compare the encrypted image with the original image to evaluate the performance
of the proposed encryption technique.
Information security is one of the most important issues in the
recent times. Elliptic Curve Cryptography (ECC) is one of the most
efficient public key cryptosystems that is secured against adversaries
because it is hard for them to find the secret key and solve
the elliptic curve discrete logarithm problem. Its strengthened
security also comes from the small key size that is used in it with
the same level of safety compared to the other cryptosystems like RSA(Rivest–Shamir–Adleman))
Welocme to ViralQR, your best QR code generator.ViralQR
Welcome to ViralQR, your best QR code generator available on the market!
At ViralQR, we design static and dynamic QR codes. Our mission is to make business operations easier and customer engagement more powerful through the use of QR technology. Be it a small-scale business or a huge enterprise, our easy-to-use platform provides multiple choices that can be tailored according to your company's branding and marketing strategies.
Our Vision
We are here to make the process of creating QR codes easy and smooth, thus enhancing customer interaction and making business more fluid. We very strongly believe in the ability of QR codes to change the world for businesses in their interaction with customers and are set on making that technology accessible and usable far and wide.
Our Achievements
Ever since its inception, we have successfully served many clients by offering QR codes in their marketing, service delivery, and collection of feedback across various industries. Our platform has been recognized for its ease of use and amazing features, which helped a business to make QR codes.
Our Services
At ViralQR, here is a comprehensive suite of services that caters to your very needs:
Static QR Codes: Create free static QR codes. These QR codes are able to store significant information such as URLs, vCards, plain text, emails and SMS, Wi-Fi credentials, and Bitcoin addresses.
Dynamic QR codes: These also have all the advanced features but are subscription-based. They can directly link to PDF files, images, micro-landing pages, social accounts, review forms, business pages, and applications. In addition, they can be branded with CTAs, frames, patterns, colors, and logos to enhance your branding.
Pricing and Packages
Additionally, there is a 14-day free offer to ViralQR, which is an exceptional opportunity for new users to take a feel of this platform. One can easily subscribe from there and experience the full dynamic of using QR codes. The subscription plans are not only meant for business; they are priced very flexibly so that literally every business could afford to benefit from our service.
Why choose us?
ViralQR will provide services for marketing, advertising, catering, retail, and the like. The QR codes can be posted on fliers, packaging, merchandise, and banners, as well as to substitute for cash and cards in a restaurant or coffee shop. With QR codes integrated into your business, improve customer engagement and streamline operations.
Comprehensive Analytics
Subscribers of ViralQR receive detailed analytics and tracking tools in light of having a view of the core values of QR code performance. Our analytics dashboard shows aggregate views and unique views, as well as detailed information about each impression, including time, device, browser, and estimated location by city and country.
So, thank you for choosing ViralQR; we have an offer of nothing but the best in terms of QR code services to meet business diversity!
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Bt32444450
1. Akash Raj / International Journal of Engineering Research and Applications (IJERA) ISSN:
2248-9622 www.ijera.comVol. 3, Issue 2, March -April 2013, pp.444-450
High Resolution Image Encryption & Reconstruction Using
Scalable Codes
Akash Raj
Department Of Ece, M.E Embedded System, Sathyabama University, Chennai-119,
Tamil Nadu, India
ABSTRACT
This paper proposes a novel scheme of
scalable coding for encrypted gray images. Therefore, the bit amount of the original image is
Although there have been a lot of works on 8N. The content owner generates a pseudorandom
scalable coding of unencrypted images/videos the bit sequence with a length of 8N. Here, we assume
scalable coding of encrypted data has not been the content owner and the decoder has the same
reported. In the encryption phase of the pseudorandom number generator (PRNG) and a
proposed scheme, the pixel values are completely shared secret key used as the seed of the PRNG.
concealed so that an attacker cannot obtain any Then, the content owner divides the pseudorandom
statistical information of an original image. bit sequence into N pieces, each of which containing
Then, the encrypted data are decomposed into 8 bits, and converts each piece as an integer number
several parts, and each part is compressed as a within [0, 255]. An encrypted image is produced by
bit stream. At the receiver side with the a one-by-one addition modulo 256 as follows:
cryptographic key, the principal content with
higher resolution can be reconstructed when g 0 i, j mod p i, j e i, j ,256,
more bit streams are received.
1 i N1,1 i N 2
Keywords-
Bitstreams,Cryptography,Downsampling, Hadamard Where p i, j represents the gray values of pixels
transform, Imagecompression ,Image
encryption,QuantizationScalable coding. at positions i, j ,
e i, j
represents the
pseudorandom numbers within [0, 255] generated
by the PRNG, and g i , j represents the
I. INTRODUCTION 0
In recent years, encrypted signal processing
has attracted considerable research interests. The encrypted pixel values. Clearly, the encrypted pixel
discrete Fourier transform and adaptive filtering can values g
0
i, j are pseudorandom numbers since
be implemented in the encrypted domain based on
e i, j values are pseudorandom numbers. It is well
the holomorphic properties of a cryptosystem, and a
composite signal representation method can be used known that there is no probability polynomial time
to reduce the size of encrypted data and computation (PPT) algorithm to distinguish a pseudorandom
complexity. In joint encryption and data hiding, a number sequence and a random number sequence
part of significant data of a plain signal is encrypted until now. Therefore, any PPT adversary cannot
for content protection, and the remaining data are distinguish an encrypted pixel sequence and a
used to carry buyer–seller protocols, the fingerprint random number sequence. That is to say, the image
data are embedded into an encrypted version of encryption algorithm that we have proposed is
digital multimedia to ensure that the seller cannot semantically secure against any PPT adversary.
know the buyer’s watermarked version while the
buyer cannot obtain the original product. A number
of works on compressing encrypted images have B. ENCRYPTED IMAGE ENCODING
been also presented. When a sender encrypts an Although an encoder does not know the
original image for privacy protection, a channel secret key and the original content, he can still
provider without the knowledge of a cryptographic compress the encrypted data as a set of bitstreams.
key and original content may tend to reduce the data The detailed encoding procedure is as follows. First,
amount due to the limited channel resource the encoder decomposes the encrypted image into a
series of subimages and data sets with a multiple-
A. IMAGE ENCRYPTION resolution construction. The subimage at the
The original image is in an uncompressed t 1th level G t 1 is generated by
format and that the pixel values are within [0, 255], downsampling the subimage at the t th level as
and denote the numbers of rows and columns as N1
and N2 and the pixel number as (N=N1 X N2). follows:
444 | P a g e
2. Akash Raj / International Journal of Engineering Research and Applications (IJERA) ISSN:
2248-9622 www.ijera.comVol. 3, Issue 2, March -April 2013, pp.444-450
g t 1 i , j g (t ) 2i ,2 j , Where H is a L(t) x L(t) Hadamard matrix made up of
+1 or -1. That implies the matrix H meets
t 0,1, , T 1 H’*H = H*H’ = L(t) * I
(0) Where H(t ) is a transpose of H,I is an L (t) x L (t)
Where G just the encrypted image and T is is the identity matrix, and L (t) must be a multiple of 4.
number of decomposition levels. In addition, the
For each coefficient C k l , calculate
( t 1) (t)
encrypted pixels that belongs to G but do not
belong to form data set Q
t 1
as follows:
C k(t ) l
mod C k( t ) l ,256
Q t 1
g i, j mod i,2 1or mod( j,2) 1 ,
(t )
256 / M
(t )
t 0,1,T 1. 1 k K ,1 k l L
(t ) (t )
(t) ( t 1) Where
That means each G is decomposed into G
( t 1) ( t 1)
and Q , and the data amount of Q is three M( t ) round M / L( t )
( t 1) and round (.) finds the nearest integer. The
times of that of G . After the multiple-level
(t)
decomposition, the encrypted image is reorganized remainder of C k (l) modulo 256 is quantized as
as G
(T )
, Q T , Q T 1 , and Q ( t ) (t)
integer C k (l) , L (t), and the quantization steps are
T approximately proportional to square roots of L (t).
For the subimage G , the encoder quantizes each
value using a step Δ as follows: (t)
Then, C k (l) at different levels are converted into
g (T ) i, j bitstreams, which are denoted as BS (t). Since
bi, j 0 C (kt ) (l) M ( t ) 1
(t)
Where the operator takes an integer toward and the number of C k (l) at the th level is 3N/4t
minus infinity and the bit amount of BS(t) is
256 / M 3 N log 2 M ( t )
N(t) , t 1,2, , T
Here, M is an integer shared by the encoder and the 4t
decoder, and its value will be discussed later.
Clearly The encoder transmits the bitstreams with
0 b(i, j) M 1
an order of BG , BS , BS
(T ) ( T 1)
, , BS . . If (1)
Then, the data of b (i,j) are converted into a the channel bandwidth is limited, the latter
bitstream, which is denoted as BG. The bit amount bitstreams may be abandoned. A higher resolution
of BG is image can be reconstructed when more bitstreams
N are obtained at the receiver side. Here, the total
N BG . log 2 M.
4T compression ratio R C , which is a ratio between the
For each data set Q t 1,2, T the encoder
(t) amount of the encoded data and the encrypted image
data, is
permutes and divides encrypted pixels in it into K(t)
groups, each of which containing L(t) pixels
K (t)
x L( t ) 3N / 4 t . In this way, the L (t) pixels RC
N BG
1 T (t ) log 2 M 3 T log 2 M (t )
N 8 4t 8 4t
in the same group scatter in the entire image. The 8 N 8 N t 1 t 1
permutation way is shared by the encoder and the
decoder, and the values of L (t) will be discussed
later. Denote the encrypted pixels of the Kth group In the figure below, fig (a) is the original image, fig
as q k 1, q k 2 , , q k L 1 k K t ,
(t) (t) (t)
(t)
(b) is encrypted image of size 512x512.after
and perform the Hadamard transform in each group
as follows: encryption I compressed the imge .i.e fig (c) is
256x256 size image. Fig (d) is 128x128, fig (e) is
C (kt ) (1) q (kt ) (1)
C ( t ) (2) q ( t ) (2) 64x64 size image.
k H k
C (kt ) L t
q (kt ) L t
445 | P a g e
3. Akash Raj / International Journal of Engineering Research and Applications (IJERA) ISSN:
2248-9622 www.ijera.comVol. 3, Issue 2, March -April 2013, pp.444-450
Fig (a) fig (b) fig (c) fig (d) fig (e)
Fig (1) Encrypted and Compressed Images
Denote the interpolated pixel values of the Kth
group at the tth level as
C. IMAGE RECONSTRUCTION
With the bitstreams and the secret key, a
receiver can reconstruct the principal content of the
original image, and the resolution of the
reconstructed image is dependent on the number of
received bitstreams. While BG provides the rough
information of the original content, 𝐵𝑆 (𝑡) can be
used to reconstruct the detailed content with an 𝑟𝑘 𝑡 1 , 𝑟𝑘 𝑡 2 … … . 𝑟𝑘 𝑡 𝐿(𝑡) 1 ≤ 𝑘≤ 𝐾 ,𝜏 𝑡
iteratively updating procedure. The image ≤ 𝑡≤ 𝑇
reconstruction procedure is as follows. and their corresponding original pixel values as
When having the bitstream BG, the decoder may
𝑝𝑘𝑡 1 , 𝑝𝑘𝑡 2 … … . 𝑝𝑘𝑡 𝐿(𝑡) . The errors of
obtain the values of 𝑏(𝑖, 𝑗) and decrypts them as a
subimage, i.e., interpolated values are
𝑇
𝑝 𝑖, 𝑗 = 𝑚𝑜𝑑 𝑏 𝑖, 𝑗 . ∆ − 𝑒 2 𝑇 . 𝑖. 2 𝑇 . 𝑗 . 256 𝑡 𝑡 𝑡
∆ ∆𝑝 𝑘 𝑙 = 𝑝𝑘 𝑙 − 𝑟𝑘 𝑙 ,
+ , 1 ≤
2
𝑁1 𝑁2 𝑙 ≤ 𝐿(𝑡) , 1 ≤ 𝑘 ≤ 𝐾 (𝑡) , 𝜏 ≤ 𝑡 ≤ 𝑇 .
1 ≤ 𝑖≤ 𝑇 , 1 ≤ 𝑗≤ 𝑇
2 2 Define the encrypted values of 𝑟𝑘 𝑡 𝑙 as
Where 𝑒 2 𝑇 . 𝑖. 2 𝑇 . 𝑗 are derived from the secret 𝑟𝑘
𝑡 𝑡
𝑙 = 𝑚𝑜𝑑 𝑟𝑘 𝑙 + 𝑒 𝑘 𝑙 , 256 ,
𝑡
key.If the bitstreams𝐵𝑆 (𝑡) (𝜏 ≤ 𝑡 ≤ 𝑇) are also
1 ≤ 𝑙 ≤ 𝐿(𝑡) , 1 ≤ 𝑘 ≤ 𝐾 (𝑡) , 𝜏 ≤ 𝑡 ≤ 𝑇 .
received, an image with a size of 𝑁1 /2(𝜏−1) ×
𝑁2 /2(𝜏−1) will be reconstructed. First, upsample the 𝑡
Where 𝑒 𝑘 𝑙 are pseudorandom numbers derived
subimage 𝑝 𝑇 𝑖, 𝑗 by factor 2(𝑇−𝜏+1) to yield an
𝑁1 /2(𝜏−1) × 𝑁2 /2(𝜏−1) image as follows: from the secret key and corresponding to 𝑟𝑘 𝑡 𝑙 .
Then
𝑇−𝜏+1 𝑇−𝜏+1
𝑟 2 . 𝑖 .2 . 𝑗 = 𝑝 𝑇 𝑖, 𝑗 ,
𝑁1 𝑁2 ∆𝑝 𝑘 𝑡 𝑙 ≡ 𝑞 𝑘 𝑡 𝑙 − 𝑟𝑘 𝑡 𝑙 𝑚𝑜𝑑 256.
1 ≤ 𝑖≤ 𝑇 , 1 ≤ 𝑗≤ 𝑇
2 2
We also define
and estimate the values of other pixels according to
the pixel values using a bilinear interpolation
method.
446 | P a g e
4. Akash Raj / International Journal of Engineering Research and Applications (IJERA) ISSN:
2248-9622 www.ijera.comVol. 3, Issue 2, March -April 2013, pp.444-450
∆𝐶 𝑘 𝑡 1 ∆𝑝 𝑘 𝑡 1
𝐷𝑘 𝑙 , 𝑖𝑓𝑑 𝑘 𝑙 < 128
∆𝐶 𝑘
𝑡
2 ∆𝑝 𝑘
𝑡
2 𝐷𝑘𝑡 𝑙 =
𝐷 𝑘 𝑙 − 256 , 𝑖𝑓𝑑 𝑘 𝑙 ≥ 128
. = 𝑯 . .
. . 𝑡
. . 𝐷 𝑘 𝑙 are the differences between the values
∆𝐶 𝑘
𝑡
𝐿(𝑡) ∆𝑝 𝑘
𝑡
𝐿(𝑡) consistent with the corresponding 𝑐 𝑘 𝑡 𝑙 and
𝐶 𝑘 𝑡 𝑙 . Then, considering 𝐷 𝑘 𝑡 𝑙 as an estimate of
𝑡
Where H is a 𝐿(𝑡) × 𝐿(𝑡) Hadamard matrix made up ∆𝐶 𝑘 𝑙 , modify the pixel values of each group as
of +1 or -1. Since only the addition and subtraction follows:
are involved in the Hadamard transform 𝑟𝑘 𝑡 1 𝑟𝑘 𝑡 1 𝐷𝑘𝑡 1
𝑡 𝑡 𝑡
∆𝐶 𝑘 𝑡 1 ∆𝑝 𝑘 𝑡 1 𝑟𝑘 2 𝑟𝑘 2 ′
𝐷𝑘 2
. . 𝑯 .
= + .
∆𝐶 𝑘 𝑡 2 ∆𝑞 𝑘 𝑡 2 . . 𝐿(𝑡) .
. ≡ 𝑯 . . . . .
. . 𝑟𝑘 𝑡 𝐿 𝑟𝑘 𝑡 𝐿 𝐷𝑘
𝑡
𝐿(𝑡)
. .
𝑡 𝑡
∆𝐶 𝑘 𝐿(𝑡) ∆𝑞 𝑘 𝐿(𝑡) And enforce the modified pixel values into [0,255]
𝑟𝑘 𝑡 1 as follows:
𝑡
𝑟𝑘
𝑡
2 0, 𝑖𝑓𝑟𝑘 1 < 0
− 𝑯. . 𝑚𝑜𝑑 256 𝑟𝑘 𝑡 𝑙 = 𝑟𝑘 𝑡 1 , 𝑖𝑓 0 ≤ 𝑟𝑘 𝑡 1 ≤ 255
.
255 , 𝑖𝑓𝑟𝑘 𝑡 1 > 255
.
𝑟𝑘 𝑡 𝐿(𝑡) 3) Calculate the average energy of difference
due to the modification as follows:
That means the transform of errors in the plain
domain is equivalent to the transform of errors in the 𝐾 (𝑡) 𝐿 (𝑡) 𝑡 2
encrypted domain with the modular arithmetic.
𝑇
𝑡=𝜏 𝑘=1 𝑙=1 𝑟 𝑘 𝑙 − 𝑟𝑘 𝑡 𝑙
𝐷 = 𝑇
Denoting 𝑡=𝜏 3𝑁 4𝑡
𝐶𝑘𝑡 1 𝑟𝑘 𝑡 1 If D is not less than a given threshold of
𝑡
𝐶𝑘𝑡 2 𝑟𝑘 𝑡 2 0.10, for each pixel 𝑟𝑘 𝑙 , after putting it back to
. . the position in the image and regarding the average
= 𝑯. value of its four neighbor pixels as its new value
. .
. . 𝑟𝑘 𝑡 𝑙 , go to step 1. Otherwise, terminate the
𝐶 𝑘 𝑡 𝐿(𝑡) 𝑟𝑘 𝑡 𝐿(𝑡) iteration, and output the image as a final
reconstructed result.
We have
𝑡 𝑡 𝑡 In the iterative procedure, while the
∆𝐶 𝑘 𝑙 ≡ 𝐶 𝑘 𝑙 − 𝐶 𝑘 𝑙 𝑚𝑜𝑑 256
decrypted pixels 𝑝 𝑇 𝑖, 𝑗 are used to give an initial
With the bitstreams 𝐵𝑆 (𝑡) (𝜏 ≤ 𝑡 ≤ 𝑇) , the values
estimation of other pixels, the values of 𝑐 𝑘 𝑡 𝑙 in
of 𝐶 𝑘 𝑡 𝑙 can be retrived, which provide the
𝑡 bitstreams 𝐵𝑆 (𝑡) provide more detailed information
information of 𝐶 𝑘 𝑙 . Therefore, the receiver may to produce the final reconstructed result with
use an iterative procedure to progressively improve 𝑡
satisfactory quality. In step 2, by estimating ∆𝐶 𝑘 𝑙
the quality of the reconstructed image by updating 𝑡
according to 𝑐 𝑘 𝑙 , the pixel values are modified
the pixel values according to 𝐶 𝑘 𝑡 𝑙 . The detailed
to lower the reconstruction errors. If the image is
procedure is as follows.
uneven and 𝐿(𝑡)is big, the absolute value of actual
1) For each group
𝑡 𝑡 𝑡 (𝑡) ∆𝐶 𝑘 𝑡 𝑙 may be more than 128 due to error
𝑟𝑘 1 , 𝑟𝑘 2 … … . 𝑟𝑘 𝐿 , calculate 𝑡
𝑡 𝑡 accumulation in a group, so that 𝐷 𝑘 𝑙 maybe not
𝑟𝑘 𝑙 and 𝐶 𝑘 𝑙 .
close to ∆𝐶 𝑘 𝑡 𝑙 . To avoid this case, we let
(𝑡)
𝐿 decrease with a increasing t since the spatial
2) Calculate correlation in a subimage with lower resolution is
weaker. For instance, 𝐿(1) = 24, 𝐿(2) = 8,
(3)
𝐷 𝑘 𝑡 𝑙 = 𝑚𝑜𝑑 𝑐 𝑘 𝑡 𝑙 . ∆(𝑡) + ∆(𝑡) 2 𝐿 = 4 for T=3.
− 𝐶 𝑘 𝑡 𝑙 .256
447 | P a g e
5. Akash Raj / International Journal of Engineering Research and Applications (IJERA) ISSN:
2248-9622 www.ijera.comVol. 3, Issue 2, March -April 2013, pp.444-450
Fig (a) fig (b) fig (c) fig (d) fig (e)
Fig (2) decompressed and decoded images
D. OVERALL DIAGRAM
Encrypted
Take Image Image
Image
Input Image Encryption Reconstruction
Encoding
Fig (2) block diagram
II. PROPOSED SYSTEM ALGORITHM IV. ADVANTAGES
A. SCALABLE CODING SCHEME The subimage is decrypted to produce an
In the proposed scheme, a series of approximate image; the quantized data of
pseudorandom numbers derived from a secret key Hadamard coefficients can provide more
are used to encrypt the original pixel values. After detailed information for image
decomposing the encrypted data into a subimage reconstruction.
and several data sets with a multiple-resolution Bitstreams are generated with a multiple-
construction, an encoder quantizes the subimage and resolution construction, the principal content
the Hadamard coefficients of each data set to with higher resolution can be obtained when
effectively reduce the data amount. Then, the more bitstreams are received.
quantized subimage and coefficients are regarded as
a set of bit streams. When having the encoded bit V. TABLES
streams and the secret key, a decoder can first obtain A. COMPRESSION RATIO
an approximate image by decrypting the quantized
subimage and then reconstructing the detailed
content using the quantized coefficients with the aid
of spatial correlation in natural images. Because of
the hierarchical coding mechanism, the principal
original content with higher resolution can be
reconstructed when more bit streams are received.
III. FUTURE ENHANCEMENT
In Oder to reduce the size of the
compressed image we can use block Truncation
Coding (BTC) for compression; Block Truncation
Code (BTC) is digital technique in image processing
using which images can be coded efficiently. BTC
has played an important role
in the sense that many coding techniques
have been developed based on it. its main attraction
being its simple underlying concepts and ease of B. COMPRESSION RATIO GRAPH
implementation.
448 | P a g e
6. Akash Raj / International Journal of Engineering Research and Applications (IJERA) ISSN:
2248-9622 www.ijera.comVol. 3, Issue 2, March -April 2013, pp.444-450
Encrypted Images”. IEEE transactions on image
processing, vol. 21, no. 6, June 2012
[2] Z. Erkin, A. Piva, S. Katzenbeisser, R. L.
Lagendijk, J. Shokrollahi, G. Neven, and
M. Barni, “Protection and retrieval of
encrypted multimedia content: When
cryptography meets signal processing,”
EURASIP J. Inf. Security, vol. 2007, pp.
1–20, Jan. 2007.
[3] T. Bianchi, A. Piva, and M. Barni, “On the
implementation of the discrete Fourier
transform in the encrypted domain,” IEEE
Trans. Inf. Forensics Security, vol. 4, no. 1,
pp. 86–97, Mar. 2009.
[4] J. R. Troncoso-Pastoriza and F. Pérez-
C. PERFORMANCE COMPERISION OF González, “Secure adaptive filtering,”
SEVERAL COMPRESSION MERTHODS IEEE Trans. Inf. Forensics Security, vol. 6,
no. 2, pp. 469–485, Jun. 2011.
[5] T. Bianchi, A. Piva, and M. Barni,
“Composite signal representation for fast
and storage-efficient processing of
encrypted signals,” IEEE Trans. Inf.
Forensics Security, vol. 5, no. 1, pp. 180–
187, Mar. 2010.
[6] S. Lian, Z. Liu, Z. Ren, and H. Wang,
“Commutative encryption and
watermarking in video compression,” IEEE
Trans. Circuits Syst. Video Technol., vol.
17, no. 6, pp. 774–778, Jun. 2007.
[7] M. Cancellaro, F. Battisti, M. Carli, G.
Boato, F. G. B. Natale, and A. Neri, “A
commutative digital image watermarking
and encryption method in the tree
structured Haar transform domain,” Signal
Process.Image Commun., vol. 26, no. 1,
pp. 1–12, Jan. 2011.
VI. CONCLUSION [8] N. Memon and P. W. Wong, “A buyer-
This paper has proposed a novel scheme of seller watermarking protocol,”IEEE Trans.
scalable coding for encrypted images. The original Image Process., vol. 10, no. 4, pp. 643–
image is encrypted by a modulo-256 addition with 649, Apr. 2001.
pseudorandom numbers, and the encoded bitstreams [9] M. Kuribayashi and H. Tanaka,
are made up of a quantized encrypted subimage and “Fingerprinting protocol for images based
the quantized remainders of Hadamard coefficients. on additive homomorphic property,” IEEE
At the receiver side, while the subimage is Trans. Image Process., vol. 14, no. 12, pp.
decrypted to produce an approximate image, the 2129–2139, Dec. 2005.
quantized data of Hadamard coefficients can [10] M. Johnson, P. Ishwar, V. M. Prabhakaran,
provide more detailed information for image D. Schonberg, and K. Ramchandran, “On
reconstruction. Since the bitstreams are generated compressing encrypted data,” IEEE Trans.
with a multiple-resolution construction, the principal Signal Process., vol. 52, no. 10, pp. 2992–
content with higher resolution can be obtained when 3006, Oct. 2004.
more bitstreams are received. [11] D. Schonberg, S. C. Draper, and K.
Ramchandran, “On blind compression of
REFERENCES encrypted correlated data approaching the
[1]Xinpeng Zhang, Member, IEEE, Guorui Feng, source entropy rate,” in Proc. 43rd Annu.
Allerton Conf., Allerton, IL, 2005.
YanliRen, and ZhenxingQian.” Scalable Coding of [12] R. Lazzeretti and M. Barni, “Lossless
compression of encrypted greylevel and
449 | P a g e
7. Akash Raj / International Journal of Engineering Research and Applications (IJERA) ISSN:
2248-9622 www.ijera.comVol. 3, Issue 2, March -April 2013, pp.444-450
color images,” in Proc. 16th EUSIPCO,
Lausanne, Switzerland, Aug. 2008 .
[13] W. Liu, W. Zeng, L. Dong, and Q. Yao,
“Efficient compression of encrypted
grayscale images,” IEEE Trans. Signal
Process., vol. 19, no. 4,pp. 1097–1102,
Apr. 2010.
[14] D. Schonberg, S. C. Draper, C. Yeo, and K.
Ramchandran, “Toward compression of
encrypted images and video sequences,”
IEEE Trans. Inf. Forensics Security, vol. 3,
no. 4, pp. 749–762, Dec. 2008.
[15] A. Kumar and A. Makur, “Lossy
compression of encrypted image by
compressing sensing technique,” in Proc.
IEEE TENCON, 2009, pp. 1–6
.[16] X. Zhang, “Lossy compression and
iterative reconstruction for encrypted
image,” IEEE Trans. Inf. Forensics
Security, vol. 6, no. 1, pp. 53–58, Mar.
2011.
[17] A. Bilgin, P. J. Sementilli, F. Sheng, and
M. W. Marcellin, “Scalable image coding
using reversible integerwavelet
transforms,” IEEE Trans.Image Process.,
vol. 9, no. 11, pp. 1972–1977, Nov. 2000.
[18] D. Taubman, “High performance scalable
image compression with EBCOT,” IEEE
Trans. Image Process., vol. 9, no. 7, pp.
1158–1170, Jul. 2000.
450 | P a g e