This document summarizes a research paper that proposes a new method for color image encryption and decryption using segment map tables (SMT) and a private key (PK). The method segments the image into blocks, reorders the blocks using the SMT, and encrypts the reordered image by XORing it with the PK. It was tested on various images and results showed it to be simple, secure, efficient with fast encryption and decryption speeds, and to better preserve image quality compared to other methods. Experimental results validated that the proposed method satisfies requirements for mean square error and peak signal-to-noise ratio during the encryption and decryption processes.
Image compression using genetic programmingAhmed Ebid
The fast growth in digital image applications such as web sites, multimedia and even personal image archives encouraged researchers to develop advanced techniques to compress images. Many compression techniques where introduced whether reversible or not. Most of those techniques were based on statistical analysis of repetition or mathematical transforming to reduce the size of the image. This research is concerning in applying Genetic programing (GP) technique in image compression. In order to achieve that goal, a parametric study was carried out to determine the optimum combination of (GP) parameters to achieve maximum quality and compression ratio. For simplicity the study considered 256 level gray scale image. A special C++ software was developed to carry out all calculations, the compressed images was rendered using Microsoft Excel. Study results was compared with JPEG results as one of the most popular lossy compression techniques. It is concluded that using optimum (GP) parameters leads to acceptable quality (objectively and subjectively) corresponding to compression ratio ranged between 2.5 and 4.5.
Secret-Fragment-Visible Mosaic Image-Creation and Recovery via Colour Transfo...IJSRD
Secret-fragment-visible mosaic image which automatically transforms the secret image into a meaningful mosaic image of the same size. The mosaic image looks like to an arbitrarily selected target image. It may be used as a camouflage of the secret image and yielded by dividing the secret image into fragments and transforming their color characteristics to the corresponding blocks of the target image. Some technologies are designed to conduct the color transformation process so that the secret image may be recovered. The information required for recovering the secret is embedding into the created mosaic image. Good experimental results are showing the feasibility of the proposed method.
A NOVEL APPROACH TO SMOOTHING ON 3D STRUCTURED ADAPTIVE MESH OF THE KINECT-BA...csandit
3-dimensional object modelling of real world objects in steady state by means of multiple point
cloud (pcl) depth scans taken by using sensing camera and application of smoothing algorithm
are suggested in this study. Polygon structure, which is constituted by coordinates of point
cloud (x,y,z) corresponding to the position of 3D model in space and obtained by nodal points
and connection of these points by means of triangulation, is utilized for the demonstration of 3D
models. Gaussian smoothing and developed methods are applied to the mesh consisting of
merge of these polygons, and a new mesh simplification and augmentation algorithm are
suggested for the over the 3D modelling. Mesh consisting of merge of polygons can be
demonstrated in a more packed, smooth and fluent way. In this study is shown that applied the
triangulation and smoothing method for 3D modelling, perform to a fast and robust mesh
structures compared to existing methods therewithal no remeshing is necessary for refinement
and reduction.
An Effective Method to Hide Texts Using Bit Plane Extractioniosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
METHOD FOR A SIMPLE ENCRYPTION OF IMAGES BASED ON THE CHAOTIC MAP OF BERNOULLIijcsit
In this document, we propose a simple algorithm for the encryption of gray-scale images, although the
scheme is perfectly usable in color images. Prior to encryption, the proposed algorithm includes a pair of
permutation processes, inspired by the Bernoulli mapping. The permutation disperses the image
information to hinder the unauthorized recovery of the original image. The image is encrypted using the
XOR function between a sequence generated from the same Bernoulli mapping and the image data,
obtained after two permutation processes. Finally, for the verification of the algorithm, the gray-scale Lena
pattern image was used; calculating histograms for each stage alongside of the encryption process. The
histograms prove dispersion evolution for pattern image during whole algorithm.
Enhancement of genetic image watermarking robust against cropping attackijfcstjournal
The enhancement of image watermarking algorithm robust against particular attack by using genetic
algorithm is presented here. There is a trade-off between imperceptibility and robustness in image
watermarking. To preserve both of these characteristics in digital image watermarking in a logical value,
the genetic algorithm is used. Some factors were introduced for providing robustness of image
watermarking against cropping attack such as the Centre of Interest Proximity Factor (CIPF), the
Complexity Factor (CF) and the Priority Coefficient (PC).
Development of stereo matching algorithm based on sum of absolute RGB color d...IJECEIAES
This article presents local-based stereo matching algorithm which comprises a devel- opment of an algorithm using block matching and two edge preserving filters in the framework. Fundamentally, the matching process consists of several stages which will produce the disparity or depth map. The problem and most challenging work for matching process is to get an accurate corresponding point between two images. Hence, this article proposes an algorithm for stereo matching using improved Sum of Absolute RGB Differences (SAD), gradient matching and edge preserving filters. It is Bilateral Filter (BF) to surge up the accuracy. The SAD and gradient matching will be implemented at the first stage to get the preliminary corresponding result, then the BF works as an edge-preserving filter to remove the noise from the first stage. The second BF is used at the last stage to improve final disparity map and increase the object boundaries. The experimental analysis and validation are using the Middlebury standard benchmarking evaluation system. Based on the results, the proposed work is capable to increase the accuracy and to preserve the object edges. To make the proposed work more reliable with current available methods, the quantitative measurement has been made to compare with other existing methods and it shows the proposed work in this article perform much better.
Image compression using genetic programmingAhmed Ebid
The fast growth in digital image applications such as web sites, multimedia and even personal image archives encouraged researchers to develop advanced techniques to compress images. Many compression techniques where introduced whether reversible or not. Most of those techniques were based on statistical analysis of repetition or mathematical transforming to reduce the size of the image. This research is concerning in applying Genetic programing (GP) technique in image compression. In order to achieve that goal, a parametric study was carried out to determine the optimum combination of (GP) parameters to achieve maximum quality and compression ratio. For simplicity the study considered 256 level gray scale image. A special C++ software was developed to carry out all calculations, the compressed images was rendered using Microsoft Excel. Study results was compared with JPEG results as one of the most popular lossy compression techniques. It is concluded that using optimum (GP) parameters leads to acceptable quality (objectively and subjectively) corresponding to compression ratio ranged between 2.5 and 4.5.
Secret-Fragment-Visible Mosaic Image-Creation and Recovery via Colour Transfo...IJSRD
Secret-fragment-visible mosaic image which automatically transforms the secret image into a meaningful mosaic image of the same size. The mosaic image looks like to an arbitrarily selected target image. It may be used as a camouflage of the secret image and yielded by dividing the secret image into fragments and transforming their color characteristics to the corresponding blocks of the target image. Some technologies are designed to conduct the color transformation process so that the secret image may be recovered. The information required for recovering the secret is embedding into the created mosaic image. Good experimental results are showing the feasibility of the proposed method.
A NOVEL APPROACH TO SMOOTHING ON 3D STRUCTURED ADAPTIVE MESH OF THE KINECT-BA...csandit
3-dimensional object modelling of real world objects in steady state by means of multiple point
cloud (pcl) depth scans taken by using sensing camera and application of smoothing algorithm
are suggested in this study. Polygon structure, which is constituted by coordinates of point
cloud (x,y,z) corresponding to the position of 3D model in space and obtained by nodal points
and connection of these points by means of triangulation, is utilized for the demonstration of 3D
models. Gaussian smoothing and developed methods are applied to the mesh consisting of
merge of these polygons, and a new mesh simplification and augmentation algorithm are
suggested for the over the 3D modelling. Mesh consisting of merge of polygons can be
demonstrated in a more packed, smooth and fluent way. In this study is shown that applied the
triangulation and smoothing method for 3D modelling, perform to a fast and robust mesh
structures compared to existing methods therewithal no remeshing is necessary for refinement
and reduction.
An Effective Method to Hide Texts Using Bit Plane Extractioniosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
METHOD FOR A SIMPLE ENCRYPTION OF IMAGES BASED ON THE CHAOTIC MAP OF BERNOULLIijcsit
In this document, we propose a simple algorithm for the encryption of gray-scale images, although the
scheme is perfectly usable in color images. Prior to encryption, the proposed algorithm includes a pair of
permutation processes, inspired by the Bernoulli mapping. The permutation disperses the image
information to hinder the unauthorized recovery of the original image. The image is encrypted using the
XOR function between a sequence generated from the same Bernoulli mapping and the image data,
obtained after two permutation processes. Finally, for the verification of the algorithm, the gray-scale Lena
pattern image was used; calculating histograms for each stage alongside of the encryption process. The
histograms prove dispersion evolution for pattern image during whole algorithm.
Enhancement of genetic image watermarking robust against cropping attackijfcstjournal
The enhancement of image watermarking algorithm robust against particular attack by using genetic
algorithm is presented here. There is a trade-off between imperceptibility and robustness in image
watermarking. To preserve both of these characteristics in digital image watermarking in a logical value,
the genetic algorithm is used. Some factors were introduced for providing robustness of image
watermarking against cropping attack such as the Centre of Interest Proximity Factor (CIPF), the
Complexity Factor (CF) and the Priority Coefficient (PC).
Development of stereo matching algorithm based on sum of absolute RGB color d...IJECEIAES
This article presents local-based stereo matching algorithm which comprises a devel- opment of an algorithm using block matching and two edge preserving filters in the framework. Fundamentally, the matching process consists of several stages which will produce the disparity or depth map. The problem and most challenging work for matching process is to get an accurate corresponding point between two images. Hence, this article proposes an algorithm for stereo matching using improved Sum of Absolute RGB Differences (SAD), gradient matching and edge preserving filters. It is Bilateral Filter (BF) to surge up the accuracy. The SAD and gradient matching will be implemented at the first stage to get the preliminary corresponding result, then the BF works as an edge-preserving filter to remove the noise from the first stage. The second BF is used at the last stage to improve final disparity map and increase the object boundaries. The experimental analysis and validation are using the Middlebury standard benchmarking evaluation system. Based on the results, the proposed work is capable to increase the accuracy and to preserve the object edges. To make the proposed work more reliable with current available methods, the quantitative measurement has been made to compare with other existing methods and it shows the proposed work in this article perform much better.
BAYESIAN CLASSIFICATION OF FABRICS USING BINARY CO-OCCURRENCE MATRIXijistjournal
Classification of fabrics is usually performed manually which requires considerable human efforts. The goal of this paper is to recognize and classify the types of fabrics, in order to identify a weave pattern automatically using image processing system. In this paper, fabric texture feature is extracted using Grey Level Co-occurrence Matrices as well as Binary Level Co-occurrence Matrices. The Co-occurrence matrices functions characterize the texture of an image by calculating how often pairs of pixel with specific values and in a specified spatial relationship occur in an image, and then extracting statistical measures from this matrix. The extracted features from GLCM and BLCM are used to classify the texture by Bayesian classifier to compare their effectiveness.
Survey of Hybrid Image Compression Techniques IJECEIAES
A compression process is to reduce or compress the size of data while maintaining the quality of information contained therein. This paper presents a survey of research papers discussing improvement of various hybrid compression techniques during the last decade. A hybrid compression technique is a technique combining excellent properties of each group of methods as is performed in JPEG compression method. This technique combines lossy and lossless compression method to obtain a highquality compression ratio while maintaining the quality of the reconstructed image. Lossy compression technique produces a relatively high compression ratio, whereas lossless compression brings about high-quality data reconstruction as the data can later be decompressed with the same results as before the compression. Discussions of the knowledge of and issues about the ongoing hybrid compression technique development indicate the possibility of conducting further researches to improve the performance of image compression method.
This lecture loops back to topology practices and discusses best-practices for optimising and refining geometry. We finish off discussing the potential export pipelines for your assets.
Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...CSCJournals
This paper proposes a new, simple, and efficient segmentation approach that could find diverse applications in pattern recognition as well as in computer vision, particularly in color image segmentation. First, we choose the best segmentation components among six different color spaces. Then, Histogram and SFCM techniques are applied for initialization of segmentation. Finally, we fuse the segmentation results and merge similar regions. Extensive experiments have been taken on Berkeley image database by using the proposed algorithm. The results show that, compared with some classical segmentation algorithms, such as Mean-Shift, FCR and CTM, etc, our method could yield reasonably good or better image partitioning, which illustrates practical value of the method.
Application of Digital Image Processing in Drug IndustryIOSRjournaljce
Digital Image Processing is a very vast field It has many applications in every field and one such application is in drug industry. Drug Industry is leading industry. Manufacturing process in drug Industry is increasing day by day as we are dependent on these medicines. But these medicines might be defected, tablets may be broken, there may be missing tablet in a strip and consumption of such drugs might be dangerous. This paper shows different methods in digital image processing technique to find the defects in tablets. Four methods are used in order to detect the defect in tablet strip.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...rahulmonikasharma
In fast growing database repository system, image as data is one of the important concern despite text or numeric. Still we can’t replace test on any cost but for advancement, information may be managed with images. Therefore image processing is a wide area for the researcher. Many stages of processing of image provide researchers with new ideas to keep information safe with better way. Feature extraction, segmentation, recognition are the key areas of the image processing which helps to enhance the quality of working with images. Paper presents the comparison between image formats like .jpg, .png, .bmp, .gif. This paper is focused on the feature extraction and segmentation stages with background removal process. There are two filters, one is integer filter and second one is floating point Filter, which is used for the key feature extraction from image. These filters applied on the different images of different formats and visually compare the results.
Interpolation Technique using Non Linear Partial Differential Equation with E...CSCJournals
With the large use of images for the communication, image zooming plays an important role.
Image zooming is the process of enlarging the image with some factor of magnification, where
the factor can be integer or non-integer. Applying zooming algorithm to an image generally results
in aliasing; edge blurring and other artifacts. The main focus of the work presented in this paper is
on the reduction of these artifacts. This paper focuses on reduction of these artifacts and
presents an image zooming algorithm using non-linear fourth order PDE method combined with
edge directed bi-cubic algorithm. The proposed method uses high resolution image obtained from
edge directed bi-cubic interpolation algorithm to construct the zoomed image. This technique
preserves edges and minimizes blurring and staircase effects in the zoomed image. In order to
evaluate image quality obtained after zooming, the objective assessment is performed.
BAYESIAN CLASSIFICATION OF FABRICS USING BINARY CO-OCCURRENCE MATRIXijistjournal
Classification of fabrics is usually performed manually which requires considerable human efforts. The goal of this paper is to recognize and classify the types of fabrics, in order to identify a weave pattern automatically using image processing system. In this paper, fabric texture feature is extracted using Grey Level Co-occurrence Matrices as well as Binary Level Co-occurrence Matrices. The Co-occurrence matrices functions characterize the texture of an image by calculating how often pairs of pixel with specific values and in a specified spatial relationship occur in an image, and then extracting statistical measures from this matrix. The extracted features from GLCM and BLCM are used to classify the texture by Bayesian classifier to compare their effectiveness.
Survey of Hybrid Image Compression Techniques IJECEIAES
A compression process is to reduce or compress the size of data while maintaining the quality of information contained therein. This paper presents a survey of research papers discussing improvement of various hybrid compression techniques during the last decade. A hybrid compression technique is a technique combining excellent properties of each group of methods as is performed in JPEG compression method. This technique combines lossy and lossless compression method to obtain a highquality compression ratio while maintaining the quality of the reconstructed image. Lossy compression technique produces a relatively high compression ratio, whereas lossless compression brings about high-quality data reconstruction as the data can later be decompressed with the same results as before the compression. Discussions of the knowledge of and issues about the ongoing hybrid compression technique development indicate the possibility of conducting further researches to improve the performance of image compression method.
This lecture loops back to topology practices and discusses best-practices for optimising and refining geometry. We finish off discussing the potential export pipelines for your assets.
Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...CSCJournals
This paper proposes a new, simple, and efficient segmentation approach that could find diverse applications in pattern recognition as well as in computer vision, particularly in color image segmentation. First, we choose the best segmentation components among six different color spaces. Then, Histogram and SFCM techniques are applied for initialization of segmentation. Finally, we fuse the segmentation results and merge similar regions. Extensive experiments have been taken on Berkeley image database by using the proposed algorithm. The results show that, compared with some classical segmentation algorithms, such as Mean-Shift, FCR and CTM, etc, our method could yield reasonably good or better image partitioning, which illustrates practical value of the method.
Application of Digital Image Processing in Drug IndustryIOSRjournaljce
Digital Image Processing is a very vast field It has many applications in every field and one such application is in drug industry. Drug Industry is leading industry. Manufacturing process in drug Industry is increasing day by day as we are dependent on these medicines. But these medicines might be defected, tablets may be broken, there may be missing tablet in a strip and consumption of such drugs might be dangerous. This paper shows different methods in digital image processing technique to find the defects in tablets. Four methods are used in order to detect the defect in tablet strip.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...rahulmonikasharma
In fast growing database repository system, image as data is one of the important concern despite text or numeric. Still we can’t replace test on any cost but for advancement, information may be managed with images. Therefore image processing is a wide area for the researcher. Many stages of processing of image provide researchers with new ideas to keep information safe with better way. Feature extraction, segmentation, recognition are the key areas of the image processing which helps to enhance the quality of working with images. Paper presents the comparison between image formats like .jpg, .png, .bmp, .gif. This paper is focused on the feature extraction and segmentation stages with background removal process. There are two filters, one is integer filter and second one is floating point Filter, which is used for the key feature extraction from image. These filters applied on the different images of different formats and visually compare the results.
Interpolation Technique using Non Linear Partial Differential Equation with E...CSCJournals
With the large use of images for the communication, image zooming plays an important role.
Image zooming is the process of enlarging the image with some factor of magnification, where
the factor can be integer or non-integer. Applying zooming algorithm to an image generally results
in aliasing; edge blurring and other artifacts. The main focus of the work presented in this paper is
on the reduction of these artifacts. This paper focuses on reduction of these artifacts and
presents an image zooming algorithm using non-linear fourth order PDE method combined with
edge directed bi-cubic algorithm. The proposed method uses high resolution image obtained from
edge directed bi-cubic interpolation algorithm to construct the zoomed image. This technique
preserves edges and minimizes blurring and staircase effects in the zoomed image. In order to
evaluate image quality obtained after zooming, the objective assessment is performed.
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUEijcisjournal
Due to enormous increase in the usage of computers and mobiles, today’s world is currently flooded with huge volumes of data. This paper is primarily focused on multimedia data and how it can be protected from unwanted attacks. Sharing of multimedia data is easy and very efficient, it has been a customary practice to share multimedia data but there is no proper encryption technique to encrypt multimedia data. Sharing of multimedia data over unprotected networks using DCT algorithm and then applying selective encryption-based algorithm has never been adequately studied. This paper introduces a new selective encryption-based security system which will transfer data with protection even in unauthenticated network. Selective encryption-based security system will also minimize time during encryption process which there by achieves efficiency. The data in the image is transmitted over a network is discriminated using DCT transform and then it will be selectively encrypted using Number Puzzle technique, and thus provides security from unauthorized access. This paper discusses about numeric puzzle-based encryption technique
and how it can achieve security and integrity for multimedia data over traditional encryption technique.
Reversible Color Transformation: Method To Secure Secret Image By Transformin...IJERA Editor
Security of information is becoming main target for modern network age. Internet is the most popular medium for transferring of data. The images which are being transmitted are have various applications, such as confidential enterprise archives, etc. As these images contain secret information which have to protect from unauthorized receptors during transmission of these images hence, a new secure transmission technique is proposed, by transforming confidential or secret image into meaningful secret fragment mosaic image. This mosaic tile image is almost of same size and looks similar to the selected target image. The proposed method contains technique which forms the secret-fragment-visible mosaic image using reversible color transformation scheme. The blocks fragment of secret image are arrange in different ways to produce mosaic image which is seems to be different from secret image. The color transformation process is used, so that secret image may be recovered nearly losslessly. A key is embedded by a losslessly data hiding scheme into created mosaic image for recovery of the original secret image
Similar to Color image encryption decryption using smt (20)
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...ssuser7dcef0
Power plants release a large amount of water vapor into the
atmosphere through the stack. The flue gas can be a potential
source for obtaining much needed cooling water for a power
plant. If a power plant could recover and reuse a portion of this
moisture, it could reduce its total cooling water intake
requirement. One of the most practical way to recover water
from flue gas is to use a condensing heat exchanger. The power
plant could also recover latent heat due to condensation as well
as sensible heat due to lowering the flue gas exit temperature.
Additionally, harmful acids released from the stack can be
reduced in a condensing heat exchanger by acid condensation. reduced in a condensing heat exchanger by acid condensation.
Condensation of vapors in flue gas is a complicated
phenomenon since heat and mass transfer of water vapor and
various acids simultaneously occur in the presence of noncondensable
gases such as nitrogen and oxygen. Design of a
condenser depends on the knowledge and understanding of the
heat and mass transfer processes. A computer program for
numerical simulations of water (H2O) and sulfuric acid (H2SO4)
condensation in a flue gas condensing heat exchanger was
developed using MATLAB. Governing equations based on
mass and energy balances for the system were derived to
predict variables such as flue gas exit temperature, cooling
water outlet temperature, mole fraction and condensation rates
of water and sulfuric acid vapors. The equations were solved
using an iterative solution technique with calculations of heat
and mass transfer coefficients and physical properties.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
1. Vol-4 Issues 05, May -2020 ISSN: 2456-9348
Impact Factor: 4.520
International Journal of Engineering Technology Research & Management
IJETRM (http://ijetrm.com/) [32]
COLOR IMAGE ENCRYPTION-DECRYPTION USING SMT
Dr. Mohammad S. Khrisat
Dr. Saleh A. Khawatreh
Dr. Majed Omar Dwairi
Dr. Amjad Hindi
Prof. Ziad Alqadi
Albalqa Applied University, Faculty of engineering technology, Al-Ahliyya Amman University
mkhrisat@bau.edu.jo
skhawatreh@ammanu.edu.jo
majeddw@gmail.com
amjadhindi@bau.edu.jo
natalia_maw@yahoo.com
ABSTRACT
Digital color image is very famous and important data type; it is used in many important vital applications such
as banking systems, protection and security systems, so image protection is required. In this research paper we
will introduce a simplified method of color image encryption-decryption which is based on using SMT and PK;
the method will be tested and implemented using various color images. The issues of security, efficiency and
accuracy will be discussed; the obtained experimental results will be analyzed in order to raise some judgments.
KEYWORDS:
Color image, encryption, SMT, PK, decryption, encryption time, efficiency measures, speedup, throughput,
MSE, PSNR.
INTRODUCTION
The digital image [1],[2],[3],[4]is one of the most important types of digital data circulating between people and
between different institutions, because it is used in many important and vital applications such as banking
applications, military and medical applications and many others [5],[6], [7]. The digital image sometimes
contains confidential information, or the image may be of a personal nature, which requires preventing
unaffected entities and people from understanding it or spying on it, and this in turn leads us to search for a safe
and effective way to encode the digital image by creating a destroyed encrypted image. The unauthorized person
cannot understand it with the naked eye or even restore it using programmatic methods [8], [9], [10].
The digital image represents the three-dimensional matrix, the first dimension is devoted to represent the red
color, and the second dimension is to represent the green color, while the third dimension represents the blue
color [11],[12],[13], as shown in Figure 1.
2. Vol-4 Issues 05, May -2020 ISSN: 2456-9348
Impact Factor: 4.520
International Journal of Engineering Technology Research & Management
IJETRM (http://ijetrm.com/) [33]
Figure 1: Color image components
The true color of the pixel is formed by mixing the three colors [14], [15], [16], [17], as shown in the figure 2,
and the image can be dealt with by retrieving the two-dimensional matrix for each color, and the image can also
be reshaped with any dimensions we see suitable for the image processing process. Figure 3 shows an example
of a digital image and for each of the three colors [18], [19], [20].
Figure 2: Mixing the color for a color pixel
Figure 3: Color image components and there histograms
The process of encrypting the digital image is defined as the process of destroying the original image so that an
incomprehensible and distorted image is produced and this process is usually done using a special private key
that is known by the sender and receiver and by using this key and some special operations the encrypted image
is generated as shown In figure 4 [21], [22]. [23].
3. Vol-4 Issues 05, May -2020 ISSN: 2456-9348
Impact Factor: 4.520
International Journal of Engineering Technology Research & Management
IJETRM (http://ijetrm.com/) [34]
Figure 4: Encryption-decryption process.
The process of decrypting the digital image is defined as the process of returning the image to its original, so
that it is completely identical to the original image, using the same key and special and specific operations [24],
25], [26].
Related works
The efficiency of the encrypting and decrypting method is measured by various factors, the most important of
which are [36], [37]:
- The extent of distortion of the original image, and in this case, the value of the mean square error (MSE)
between the original and encrypted images must be very high (or the value of peak-signal-to-noise ratio (PSNR)
t should be very low value)[30], [31].
- Not to lose any part of the original image information, in this case the value of the mean square error (MSE)
between the original and decrypted images must be closed to zero (or the value of peak-signal-to-noise ratio
(PSNR) t should be closed to infinite) [27], [28], [29].
- High speed by reducing encrypting time and decrypting time.
- High level of security and protection with hard-to-hack keys [41].
- Ease of implementation.
There are now several methods available that range in how well they encode a digital image, some of these
methods were based on image blocking and XORING the created blocks by a private key [31], [32], [33], [35],
[41], in [34], and others were based on matrix multiplication of the original image and a special generated
private key matrix [30]. In [37] the authors used matrix reordering principle, while in [39] the encryption was
based on based on 3D Chaotic Cat Maps. In [40] the authors introduced a method based on Rubik's Cube
principle; these methods will be implemented to make comparisons with the proposed here method.
The proposed method
The proposed method as shown in figure 5 uses two private keys:
- Private key (PK), it is a huge 3D matrix which can cover any digital color image, it will be during the
encryption-decryption processes adopted to the image size, this key must be generated once and saved
by the sender and the receiver, it also can be updated any time. This key contains the values from 0 to
255 and it is very difficult to hack it.
- SMT (segment map table)( this structure was taken from the operating system and here thanks to
segmentation memory management), this table will be created for any image and it contains the
following fields as shown in table 1, this table must be used as a second secret key and it will be
generated from the initial SMT shown in table 2:
Figure 5: Proposed method
4. Vol-4 Issues 05, May -2020 ISSN: 2456-9348
Impact Factor: 4.520
International Journal of Engineering Technology Research & Management
IJETRM (http://ijetrm.com/) [35]
Table 1: Secret SMT (example)
Segment number Size Location
3 27500 1
5 92875 27501
1 2000 120376
4 24000 122376
2 5500 146375
Table 2: Initial SMT (example)
Segment number Size Location
1 2000 1
2 5500 2001
3 27500 7501
4 24000 35001
5 92875 59001
The process of encryption can be implemented applying the following steps:
1) Get the original color image.
2) Retrieve the image size.
3) Reshape original image matrix into one raw matrix.
4) Load PK.
5) Adopt PK to suit the image size.
6) Apply XORING.
7) Select the number of segments and the size of each segment.
8) Build SMT.
9) Reorder the segments and create a new secret SMP.
10) Combine again the image and reshape it to 3D matrix to get the encrypted image.
The decryption phase will be implemented applying the following steps:
1) Get the encrypted color image.
2) Retrieve the image size.
3) Reshape encrypted image matrix into one raw matrix.
4) Load PK.
5) Adopt PK to suit the image size.
6) Get secret SMT
7) Reorder the segments and create a new secret SMP.
8) Apply XORING.
9) Combine again the image and reshape it to 3D matrix to get the decrypted image.
Implementation and experimental results
Several images were taken and implemented using the proposed method, each image was segmented into 5
segments using SMT shown in table 1 (the number of segments can be changed and the contents of SMT can be
also changed).
The selected PK was with size (3000*3000*3), figures 5 thru 8 show the outputs after executing each phase of
the proposed method:
6. Vol-4 Issues 05, May -2020 ISSN: 2456-9348
Impact Factor: 4.520
International Journal of Engineering Technology Research & Management
IJETRM (http://ijetrm.com/) [37]
Decrypted image
0 100 200
0
200
400
600
0 100 200
0
200
400
600
0 100 200
0
200
400
Figure 8: Decrypted image (example)
Table 3 shows the experimental results of implementation, and from this table we can see that the proposed
method satisfies the factors of encryption-decryption efficiency and security.
The results were compared with other methods results, table 4 shows how this method has an advantages and
how it improve the process of encryption-decryption.
Table 3: Experimental results
Image Size (byte) ET(seconds) DT(seconds) PSNR between
original and
encrypted
images
Throughput(byte
per second)
1 151875 0.0020 0.0020 7.8342 75937000
2 150849 0.0020 0.0020 7.1020 75424000
3 518400 0.0050 0.0050 7.7367 64800000
4 5140800 0.0740 0.0740 8.3368 69470000
5 4326210 0.0600 0.0600 8.3765 72104000
6 122265 0.0020 0.0020 8.9170 61132000
7 518400 0.0070 0.0070 7.3474 74057000
8 150975 0.0020 0.0020 8.4069 75487000
9 151353 0.0020 0.0020 7.3284 75676000
10 1890000 0.0270 0.0270 7.5659 70000000
11 6119256 0.0860 0.0860 9.6703 71154000
12 150876 0.0020 0.0020 8.0780 75438000
13 150738 0.0020 0.0020 8.6319 75369000
14 151875 0.0020 0.0020 6.7169 75938000
15 2500608 0.0360 0.0360 7.3243 69461000
Average 1479632 0.0207 0.0207 7.9582 72096000
Table 4: Results comparisons
Method Encryption time
(s)
Decryption time
(s)
Throughput (M
bytes)
Speedup of the
proposed
method
Order
Proposed
SSEAM
0.0207 0.0207 72.096000 `1 1
Ref. [27] 0.0513 0.0513 29.2398 4.4609 2
7. Vol-4 Issues 05, May -2020 ISSN: 2456-9348
Impact Factor: 4.520
International Journal of Engineering Technology Research & Management
IJETRM (http://ijetrm.com/) [38]
Ref. [34] 0.06469 0.062727 23.1876 5.6252 3
Ref. [36] 0.23 0.23 6.5217 20.0000 5
Ref. [37] 0.5 0.5 3 43.4783 7
Ref. [38] 0.4 0.4 3.7500 34.7826 6
Ref. [39] 0.12 0.12 12.5000 10.4348 4
Ref. [40] v.1 0.56 0.56 2.6786 48.6957 8
Ref [40] v.2 1.01 1.01 1.4852 87.8261 9
Conclusion
A new based on SMT method of color image encryption-decryption was proposed and implemented; the
obtained experimental results showed that the proposed method is simple, highly secure by providing the use
secret huge key and changeable ranges of color image segmentation. The proposed method is very efficient by
providing a very small time of encryption-decryption and a very high value of method throughput. The proposed
methods satisfies the requirement for MSE and PSNR values in the encryption and decryption phases and it has
a better performance comparing with some other existing methods
References
[1] Majed O Al-Dwairi, Ziad A Alqadi, Amjad A Abujazar, Rushdi Abu Zneit, Optimized true-color image
processing, World Applied Sciences Journal, vol. 8, issue 10, pp. 1175-1182, 2010.
[2] Jamil Al Azzeh, Hussein Alhatamleh, Ziad A Alqadi, Mohammad Khalil Abuzalata, Creating a Color Map
to be used to Convert a Gray Image to Color Image, International Journal of Computer Applications, vol. 153,
issue 2, pp. 31-34, 2016.
[3] AlQaisi Aws, AlTarawneh Mokhled, A Alqadi Ziad, A Sharadqah Ahmad, Analysis of Color Image Features
Extraction using Texture Methods, TELKOMNIKA, vol. 17, issue 3, 2018.
[4] Mohammed Ashraf Al Zudool, Saleh Khawatreh, Ziad A. Alqadi, Efficient Methods used to Extract Color
Image Features, IJCSMC, vol. 6, issue 12, pp. 7-14, 2017.
[5] Akram A. Moustafa and Ziad A. Alqadi, Reconstructed Color Image Segmentation, Proceedings of the
World Congress on Engineering and Computer Science, WCECS 2009, vol. II, 2009.
[6] JAMIL AL-AZZEH, BILAL ZAHRAN, ZIAD ALQADI, BELAL AYYOUB AND MAZEN ABU-
ZAHER, A NOVEL ZERO-ERROR METHOD TO CREATE A SECRET TAG FOR AN IMAGE, Journal of
Theoretical and Applied Information Technology, vol. 96, issue 13, pp. 4081-4091, 2018.
[7] Saleh Khawatreh, Belal Ayyoub, Ashraf Abu-Ein, Ziad Alqadi, A Novel Methodology to Extract Voice
Signal Features, International Journal of Computer Applications, vol. 975, pp. 8887, 2018.
[8] Dr Rushdi S Abu Zneit, Dr Ziad AlQadi, Dr Mohammad Abu Zalata, A Methodology to Create a Fingerprint
for RGB Color Image, IJCSMC, vol. 6, issue 1, pp. 205-212. 2017.
[9] RA Zneit, Ziad Alqadi, Dr Mohammad Abu Zalata, Procedural analysis of RGB color image objects,
IJCSMC, vol. 6, issue 1, pp. 197-204, 2017.
[10] Amjad Y Hindi, Majed O Dwairi, Ziad A AlQadi, A Novel Technique for Data Steganography,
Engineering, Technology & Applied Science Research, vol. 9, issue 6, pp. 4942-4945, 2019.
[11] Mutaz Rasmi Abu Sara Rashad J. Rasras, Ziad A. AlQadi, A Methodology Based on Steganography and
Cryptography to Protect Highly Secure Messages, Engineering, Technology & Applied Science Research, vol.
9, issue 1, pp. 3681-3684, 2019.
[12] Dr. Amjad Hindi, Dr. Ghazi M. Qaryouti, Prof. Yousif Eltous, Prof. Mohammad Abuzalata, Prof. Ziad
Alqadi, Color Image Compression using Linear Prediction Coding, International Journal of Computer Science
and Mobile Computing, vol. 9, issue 2, pp. 13 – 20, 2020.
[13] Ziad Alqadi, Mohammad Abuzalata, Yousf Eltous, Ghazi M Qaryouti, Analysis of fingerprint minutiae to
form fingerprint identifier, International Journal on Informatics Visualization, vol. 4, issue 1, pp. 10-15, 2020.
[14] Prof. Ziad Alqadi, Dr. Mohammad S. Khrisat, Dr. Amjad Hindi, Dr. Majed Omar Dwairi, USING SPEECH
SIGNAL HISTOGRAM TO CREATE SIGNAL FEATURES, International Journal of Engineering Technology
Research & Management, vol. 4, issue 3, pp. 144-153, 2020.
[15] Prof. Ziad Alqadi, Dr. Amjad Hindi, Dr. Majed Omar Dwairi, Dr. Mohammad S. Khrisat, Features
Analysis of RGB Color Image based on Wavelet Packet Information, IJCSMC, vol. 9, issue 3, pp. 149 – 156,
2020.
8. Vol-4 Issues 05, May -2020 ISSN: 2456-9348
Impact Factor: 4.520
International Journal of Engineering Technology Research & Management
IJETRM (http://ijetrm.com/) [39]
[16] Ziad Alqadi Dr. Mohammad S. Khrisat, Dr. Amjad Hindi, Dr. Majed Omar Dwairi, VALUABLE
WAVELET PACKET INFORMATION TO ANALYZE COLOR IMAGES FEATURES, International Journal
of Current Advanced Research, vol. 9, issue 2, pp. 2319-6505, 2020.
[17] Amjad Hindi, Majed Omar Dwairi, Ziad Alqadi, Analysis of Digital Signals using Wavelet Packet Tree,
IJCSMC, vol. 9, issue 2, pp. 96-103, 2020.
[18] Amjad Y. Hindi, Majed O. Dwairi, Ziad A. AlQadi, Creating Human Speech Identifier using WPT,
International Journal of Computer Science and Mobile Computing, vol. 9, issue 2, pp. 117 – 123, 2020.
[19] Dr. Amjad Hindi, Dr. Majed Omar Dwairi, Prof. Ziad Alqadi, Efficiency analysis of color image features
extraction methods, International Journal of Software & Hardware Research in Engineering, vol. 8, issue 2, pp.
58-65, 2020.
[20] Ziad A. AlQadi Amjad Y. Hindi, Majed O. Dwairi, PROCEDURES FOR SPEECH RECOGNITION
USING LPC AND ANN, International Journal of Engineering Technology Research & Management, vol. 4,
issue 2, pp. 48-55, 2020.
[21] Dr. Amjad Hindi, Dr. Majed Omar Dwairi, Prof. Ziad Alqadi, Analysis of Procedures used to build an
Optimal Fingerprint Recognition System, International Journal of Computer Science and Mobile Computing,
vol. 9, issue 2, pp. 21 – 37, 2020.
[22] Ziad alqadi, Analysis of stream cipher security algorithm, Journal of Information and Computing Science,
vol. 2, issue 4, pp. 288-298, 2007.
[23] Ziad Alqad, Prof. Yousf Eltous Dr. Ghazi M. Qaryouti, Prof. Mohammad Abuzalata, Analysis of Digital
Signal Features Extraction Based on LBP Operator, International Journal of Advanced Research in Computer
and Communication Engineering, vol. 9, issue 1, pp. 1-7, 2020.
[24] Ziad A. AlQadi, A Highly Secure and Accurate Method for RGB Image Encryption, IJCSMC, vol. 9, issue
2, pp. 12-21, 2020.
[25] Belal Zahran Rashad J. Rasras, Ziad Alqadi, Mutaz Rasmi Abu Sara, Developing new Multilevel security
algorithm for data encryption-decryption (MLS_ED), International Journal of Advanced Trends in Computer
Science and Engineering, vol. 8, issue 6, pp. 3228-3235, 2020.
[26] Ziad Alqad, Majid Oraiqat, Hisham Almujafet, Salah Al-Saleh, Hind Al Husban, Soubhi Al-Rimawi, A
New Approach for Data Cryptography, International Journal of Computer Science and Mobile Computing, vol.
8, issue 9, pp. 30-48, 2019.
[27] Majed O Al-Dwairi, A Hendi, Z AlQadi, An efficient and highly secure technique to encrypt-decrypt color
images, Engineering, Technology & Applied Science Research, vol. 9, issue 3, pp. 4165-4168, 2019.
[28] Amjad Y Hendi, Majed O Dwairi, Ziad A Al-Qadi, Mohamed S Soliman, A novel simple and highly secure
method for data encryption-decryption, International Journal of Communication Networks and Information
Security, vol. 11, issue 1, pp. 232-238, 2019.
[29] Ziad Alqadi, Ahmad Sharadqh, Naseem Asad, Ismail Shayeb, Jamil Al-Azzeh, Belal Ayyoub, A highly
secure method of secret message encoding, International Journal of Research in Advanced Engineering and
Technology, vol. 5, issue 3, pp. 82-87, 2019.
[30] Rushdi Abu Zneit, Jamil Al-Azzeh, Ziad Alqadi, Belal Ayyoub, Ahmad Sharadqh, Using Color Image as a
Stego-Media to Hide Short Secret Messages, IJCSMC, Vol. 8, Issue 6, pp. 106 –123, 2019.
[31] Qazem Jaber Rashad J. Rasras, Mohammed Abuzalata, Ziad Alqadi, Jamil Al-Azzeh, Comparative
Analysis of Color Image Encryption-Decryption Methods Based on Matrix Manipulation, IJCSMC, vol. 8, issue
3, pp. 14-26, 2019.
[32] Jamil Al-Azzeh, Bilal Zahran, Ziad Alqadi, Belal Ayyoub, Muhammed Mesleh, A Novel Based On Image
Blocking Method To Encrypt-Decrypt Color, International Journal on Informatics Visualization, vol. 3, issue 1,
pp. 86-93, 2019.
[33] Jamil Al-Azzeh, Ziad Alqadi, Qazem Jaber, A Simple, Accurate and Highly Secure Method to Encrypt-
Decrypt Digital Images, INTERNATIONAL JOURNAL ON INFORMATICS VISUALIZATION, VOL 3
(2019) NO 3, pp. 262-265.
[34] S. Wang, Y. Zheng, Z. Gao, “A New Image Scrambling Method through Folding Transform”, IEEE
International Conference on Computer Application and System Modeling, Taiyuan, China, October 22-24,
2010.
[35] J. N. Abdel-Jalil, “Performance analysis of color image encryptiondecryption techniques”, International
Journal of Advanced Computer Technology, Vol. 5, No. 4, pp. 13-17, 2016.
9. Vol-4 Issues 05, May -2020 ISSN: 2456-9348
Impact Factor: 4.520
International Journal of Engineering Technology Research & Management
IJETRM (http://ijetrm.com/) [40]
[36] G. Ye, “An Efficient Image Encryption Scheme based on Logistic maps”, International Journal of Pure and
Applied Mathematics, Vol. 55, No. 1, pp. 37-47, 2009.
[37] T. Sivakumar, R. Venkatesan, “A Novel Image Encryption Approach using Matrix Reordering”, WSEAS
Transactions on Computers, Vol. 12, No. 11, pp. 407-418, 2013.
[38] H. Gao, Y. Zhang, S. Liang, D. Li, “A New Logistic maps for Image Encryption”, Chaos- Solitons &
Fractals, Vol. 29, No. 2, pp. 393- 399, 2006.
[39] G. Chen, Y. Mao, C. K. Chui, “A Symmetric Image Encryption Scheme based on 3D Chaotic Cat Maps”,
Chaos, Solitons & Fractals, Vol. 21, No. 3, pp. 749–761, 2004.
[40] K. Loukhaoukha, J. Y. Chouinard, A. Berdai, “A Secure Image Encryption Algorithm Based on Rubik's
Cube Principle”, Journal of Electrical and Computer Engineering, Vol. 2012, Article ID 173931, pp. pp. 1-13,
2012.
[41] X. Wang, J. Zhang, “An Image Scrambling Encryption using Chaos-controlled Poker Shuffle Operation”,
IEEE International Symposium on Biometrics and Security Technologies, Islamabad, Pakistan, April 23-24,
2008.