SlideShare a Scribd company logo
• With the escalating use of internet technology, the exigency for security of valuable
information becomes of utmost importance.
• Our aim is to provide an efficient way of encrypting images where the speed, time or
information are never compromised. Therefore in our paper we present a permutation
based algorithm where each pixel of the image is swapped with the corresponding
generated random value using pseudo random number generators.
Step 1: LCG
STEP 2: LFG
ARRAY OF
PSEUDO
RANDOM
NUMBERS
• Iteration through all
the rows shuffling
them using random
stream from previous
step
• Iteration through all
the columns shuffling
them using random
stream from previous
step
1 2 3 4 5
6 7 8 9 10
11 12 13 14 15
16 17 18 19 20
21 22 23 24 25
966558 75961 2239 25424 42073
3 0 2 1 4
Modulus of random
numbers with
image size
In order to attain
random numbers in
a specific range
Modulus of random
numbers with
image size
In order to attain
random numbers in
a specific range
2 4 0 1 3
57643 3424 21156 69078 13167
6 9 8 10 7
1 4 3 2 5
11 14 13 12 15
21 24 23 22 25
16 19 18 17 20
Row Shuffle Column Shuffle
• The decryption process is exactly similar to the encryption process. One
has to repeat the steps backwards in order to attain the original
image(Backtracking).
• Our algorithm works in linear time. In the sense that instead of rows*columns it is
rows+columns which reduces the encryption time
• Our algorithm is adaptable and flexible. By changing some parameters like the block
size, or the PRNG parameters we get a different encrypted image. Therefore leading
to a plethora of possibilities
We make use of 3 different images and pass them through the encryption
process with each having different block size.
• An image of size 1440 × 1280 pixels is encrypted using the algorithm. The private key
parameters for both encryption and decryption are set as follows:
J=418; k=1279
: a=1664525; m=2**32; c=1013904223
• Block length value: 1
• An image of size 2560 × 1600 pixels is encrypted using the algorithm. The private key
parameters for both encryption and decryption are set as follows:
: J=418; k=1279
a=1664525; m=2**32; c=1013904223
• Block length value: 8
• An image of size 1440 × 1280 pixels is encrypted using the algorithm. The private key
parameters for both encryption and decryption are set as follows:
J=418; k=1279
a=1664525; m=2**32; c=1013904223
• Block length value: 4
ICACCI_2015_Presentation
ICACCI_2015_Presentation
ICACCI_2015_Presentation
ICACCI_2015_Presentation
ICACCI_2015_Presentation
ICACCI_2015_Presentation
ICACCI_2015_Presentation
ICACCI_2015_Presentation
ICACCI_2015_Presentation

More Related Content

What's hot

Leveraging sql server to improve vector display through point clustering
Leveraging sql server to improve vector display through point clusteringLeveraging sql server to improve vector display through point clustering
Leveraging sql server to improve vector display through point clustering
Texas Natural Resources Information System
 
20180129
2018012920180129
20180129
ChihPengChang
 
Multi-class Image Classification using deep convolutional networks on extreme...
Multi-class Image Classification using deep convolutional networks on extreme...Multi-class Image Classification using deep convolutional networks on extreme...
Multi-class Image Classification using deep convolutional networks on extreme...
Ashis Kumar Chanda
 
CONVOLUTIONAL NEURAL NETWORKS: The workhorse of image and video
CONVOLUTIONAL NEURAL NETWORKS: The workhorse of image and videoCONVOLUTIONAL NEURAL NETWORKS: The workhorse of image and video
CONVOLUTIONAL NEURAL NETWORKS: The workhorse of image and video
Cristiano Rafael Steffens
 
Point cloud library
Point cloud libraryPoint cloud library
Point cloud library
Bindu Karki
 
Feature Extraction Based Estimation of Rain Fall By Cross Correlating Cloud R...
Feature Extraction Based Estimation of Rain Fall By Cross Correlating Cloud R...Feature Extraction Based Estimation of Rain Fall By Cross Correlating Cloud R...
Feature Extraction Based Estimation of Rain Fall By Cross Correlating Cloud R...
IOSR Journals
 

What's hot (6)

Leveraging sql server to improve vector display through point clustering
Leveraging sql server to improve vector display through point clusteringLeveraging sql server to improve vector display through point clustering
Leveraging sql server to improve vector display through point clustering
 
20180129
2018012920180129
20180129
 
Multi-class Image Classification using deep convolutional networks on extreme...
Multi-class Image Classification using deep convolutional networks on extreme...Multi-class Image Classification using deep convolutional networks on extreme...
Multi-class Image Classification using deep convolutional networks on extreme...
 
CONVOLUTIONAL NEURAL NETWORKS: The workhorse of image and video
CONVOLUTIONAL NEURAL NETWORKS: The workhorse of image and videoCONVOLUTIONAL NEURAL NETWORKS: The workhorse of image and video
CONVOLUTIONAL NEURAL NETWORKS: The workhorse of image and video
 
Point cloud library
Point cloud libraryPoint cloud library
Point cloud library
 
Feature Extraction Based Estimation of Rain Fall By Cross Correlating Cloud R...
Feature Extraction Based Estimation of Rain Fall By Cross Correlating Cloud R...Feature Extraction Based Estimation of Rain Fall By Cross Correlating Cloud R...
Feature Extraction Based Estimation of Rain Fall By Cross Correlating Cloud R...
 

Viewers also liked

Honkela, Korhonen, Lagus & Saarinen: Five-Dimensional Sentiment Analysis of C...
Honkela, Korhonen, Lagus & Saarinen: Five-Dimensional Sentiment Analysis of C...Honkela, Korhonen, Lagus & Saarinen: Five-Dimensional Sentiment Analysis of C...
Honkela, Korhonen, Lagus & Saarinen: Five-Dimensional Sentiment Analysis of C...
Timo Honkela
 
Equipos Segundo Periodo
Equipos Segundo PeriodoEquipos Segundo Periodo
Equipos Segundo Periodo
Ernesto Sánchez Suárez
 
Jose Gutierrez Resume
Jose Gutierrez ResumeJose Gutierrez Resume
Jose Gutierrez Resume
J.R. Gutierrez
 
Eight Things
Eight ThingsEight Things
Eight Things
Dennis Stevens
 
чемпіонат україни з бокс
чемпіонат україни з боксчемпіонат україни з бокс
чемпіонат україни з бокс
Александр Дрон
 
Strategy Execution
Strategy ExecutionStrategy Execution
Strategy Execution
Dennis Stevens
 
El sistema solar.
El sistema solar.El sistema solar.
El sistema solar.roca1700
 
Blog zona 139
Blog zona 139Blog zona 139
Blog zona 139
Irma Nohemi Sanchez R.
 
2016_CurriculumVitae_DASCHER
2016_CurriculumVitae_DASCHER2016_CurriculumVitae_DASCHER
2016_CurriculumVitae_DASCHER
Erin Dorothea Dascher
 
Straight edge Tic
Straight edge TicStraight edge Tic
Straight edge Tic
Alejandro Ramirez
 
Examenes ordinarios y extraordinarios 2015-2016
Examenes ordinarios y extraordinarios 2015-2016Examenes ordinarios y extraordinarios 2015-2016
Examenes ordinarios y extraordinarios 2015-2016
Ernesto Sánchez Suárez
 
community counsulting(시나컨설팅)
community counsulting(시나컨설팅)community counsulting(시나컨설팅)
community counsulting(시나컨설팅)
YOO SUN YOUNG
 
Feeding The Agile Beast
Feeding The  Agile  BeastFeeding The  Agile  Beast
Feeding The Agile Beast
Dennis Stevens
 
Travel party web
Travel party webTravel party web
Travel party web
Chang Youp Lee
 
Generaciones de las Computadoras
Generaciones de las ComputadorasGeneraciones de las Computadoras
Generaciones de las Computadoras
Ana Hernandez
 
бережна звіт за 2014 2015
бережна звіт за 2014 2015бережна звіт за 2014 2015
бережна звіт за 2014 2015rmk-resh
 
звіт про роботу методиста глушко о
звіт про роботу методиста  глушко озвіт про роботу методиста  глушко о
звіт про роботу методиста глушко оrmk-resh
 
14 Ways Leaders Can Build A Great Workplace Culture
14 Ways Leaders Can Build A Great Workplace Culture14 Ways Leaders Can Build A Great Workplace Culture
14 Ways Leaders Can Build A Great Workplace Culture
Change Recruitment Group
 
Звіт вчителів української мови
Звіт вчителів української мовиЗвіт вчителів української мови
Звіт вчителів української мови
ZHOIPPO
 
Links-EN
Links-ENLinks-EN

Viewers also liked (20)

Honkela, Korhonen, Lagus & Saarinen: Five-Dimensional Sentiment Analysis of C...
Honkela, Korhonen, Lagus & Saarinen: Five-Dimensional Sentiment Analysis of C...Honkela, Korhonen, Lagus & Saarinen: Five-Dimensional Sentiment Analysis of C...
Honkela, Korhonen, Lagus & Saarinen: Five-Dimensional Sentiment Analysis of C...
 
Equipos Segundo Periodo
Equipos Segundo PeriodoEquipos Segundo Periodo
Equipos Segundo Periodo
 
Jose Gutierrez Resume
Jose Gutierrez ResumeJose Gutierrez Resume
Jose Gutierrez Resume
 
Eight Things
Eight ThingsEight Things
Eight Things
 
чемпіонат україни з бокс
чемпіонат україни з боксчемпіонат україни з бокс
чемпіонат україни з бокс
 
Strategy Execution
Strategy ExecutionStrategy Execution
Strategy Execution
 
El sistema solar.
El sistema solar.El sistema solar.
El sistema solar.
 
Blog zona 139
Blog zona 139Blog zona 139
Blog zona 139
 
2016_CurriculumVitae_DASCHER
2016_CurriculumVitae_DASCHER2016_CurriculumVitae_DASCHER
2016_CurriculumVitae_DASCHER
 
Straight edge Tic
Straight edge TicStraight edge Tic
Straight edge Tic
 
Examenes ordinarios y extraordinarios 2015-2016
Examenes ordinarios y extraordinarios 2015-2016Examenes ordinarios y extraordinarios 2015-2016
Examenes ordinarios y extraordinarios 2015-2016
 
community counsulting(시나컨설팅)
community counsulting(시나컨설팅)community counsulting(시나컨설팅)
community counsulting(시나컨설팅)
 
Feeding The Agile Beast
Feeding The  Agile  BeastFeeding The  Agile  Beast
Feeding The Agile Beast
 
Travel party web
Travel party webTravel party web
Travel party web
 
Generaciones de las Computadoras
Generaciones de las ComputadorasGeneraciones de las Computadoras
Generaciones de las Computadoras
 
бережна звіт за 2014 2015
бережна звіт за 2014 2015бережна звіт за 2014 2015
бережна звіт за 2014 2015
 
звіт про роботу методиста глушко о
звіт про роботу методиста  глушко озвіт про роботу методиста  глушко о
звіт про роботу методиста глушко о
 
14 Ways Leaders Can Build A Great Workplace Culture
14 Ways Leaders Can Build A Great Workplace Culture14 Ways Leaders Can Build A Great Workplace Culture
14 Ways Leaders Can Build A Great Workplace Culture
 
Звіт вчителів української мови
Звіт вчителів української мовиЗвіт вчителів української мови
Звіт вчителів української мови
 
Links-EN
Links-ENLinks-EN
Links-EN
 

Similar to ICACCI_2015_Presentation

An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
ZiadAlqady
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
ZiadAlqady
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
ZiadAlqady
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
ZiadAlqady
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processing
IJMIT JOURNAL
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processing
IJMIT JOURNAL
 
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET Journal
 
A New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and DecryptionA New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and Decryption
IRJET Journal
 
Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptography
Saurabh Nambiar
 
A New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionA New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash Function
IRJET Journal
 
Crypegangraphy.pptx
Crypegangraphy.pptxCrypegangraphy.pptx
Crypegangraphy.pptx
MdjunaidAli3
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd Iaetsd
 
Image Security
Image SecurityImage Security
Image Security
Satyendra Rajput
 
Image Security System using Image Processing
Image Security System using Image ProcessingImage Security System using Image Processing
Image Security System using Image Processing
SruthiReddy112
 
Implementation for Data Hiding using Visual Cryptography
Implementation for Data Hiding using Visual Cryptography           Implementation for Data Hiding using Visual Cryptography
Implementation for Data Hiding using Visual Cryptography
IRJET Journal
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
IRJET Journal
 
Biomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithmBiomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithm
ijcsit
 
Encryption of Decomposed Image by using ASCII Code based Carrier Signal
Encryption of Decomposed Image by using ASCII Code based Carrier SignalEncryption of Decomposed Image by using ASCII Code based Carrier Signal
Encryption of Decomposed Image by using ASCII Code based Carrier Signal
IRJET Journal
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...
Aparna Nk
 
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUESADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
IRJET Journal
 

Similar to ICACCI_2015_Presentation (20)

An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processing
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processing
 
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
 
A New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and DecryptionA New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and Decryption
 
Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptography
 
A New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionA New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash Function
 
Crypegangraphy.pptx
Crypegangraphy.pptxCrypegangraphy.pptx
Crypegangraphy.pptx
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detection
 
Image Security
Image SecurityImage Security
Image Security
 
Image Security System using Image Processing
Image Security System using Image ProcessingImage Security System using Image Processing
Image Security System using Image Processing
 
Implementation for Data Hiding using Visual Cryptography
Implementation for Data Hiding using Visual Cryptography           Implementation for Data Hiding using Visual Cryptography
Implementation for Data Hiding using Visual Cryptography
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
Biomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithmBiomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithm
 
Encryption of Decomposed Image by using ASCII Code based Carrier Signal
Encryption of Decomposed Image by using ASCII Code based Carrier SignalEncryption of Decomposed Image by using ASCII Code based Carrier Signal
Encryption of Decomposed Image by using ASCII Code based Carrier Signal
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...
 
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUESADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
 

ICACCI_2015_Presentation

  • 1.
  • 2. • With the escalating use of internet technology, the exigency for security of valuable information becomes of utmost importance. • Our aim is to provide an efficient way of encrypting images where the speed, time or information are never compromised. Therefore in our paper we present a permutation based algorithm where each pixel of the image is swapped with the corresponding generated random value using pseudo random number generators.
  • 3. Step 1: LCG STEP 2: LFG ARRAY OF PSEUDO RANDOM NUMBERS • Iteration through all the rows shuffling them using random stream from previous step • Iteration through all the columns shuffling them using random stream from previous step
  • 4. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 966558 75961 2239 25424 42073 3 0 2 1 4 Modulus of random numbers with image size In order to attain random numbers in a specific range Modulus of random numbers with image size In order to attain random numbers in a specific range 2 4 0 1 3 57643 3424 21156 69078 13167 6 9 8 10 7 1 4 3 2 5 11 14 13 12 15 21 24 23 22 25 16 19 18 17 20 Row Shuffle Column Shuffle
  • 5. • The decryption process is exactly similar to the encryption process. One has to repeat the steps backwards in order to attain the original image(Backtracking).
  • 6. • Our algorithm works in linear time. In the sense that instead of rows*columns it is rows+columns which reduces the encryption time • Our algorithm is adaptable and flexible. By changing some parameters like the block size, or the PRNG parameters we get a different encrypted image. Therefore leading to a plethora of possibilities
  • 7. We make use of 3 different images and pass them through the encryption process with each having different block size.
  • 8. • An image of size 1440 × 1280 pixels is encrypted using the algorithm. The private key parameters for both encryption and decryption are set as follows: J=418; k=1279 : a=1664525; m=2**32; c=1013904223 • Block length value: 1
  • 9. • An image of size 2560 × 1600 pixels is encrypted using the algorithm. The private key parameters for both encryption and decryption are set as follows: : J=418; k=1279 a=1664525; m=2**32; c=1013904223 • Block length value: 8
  • 10. • An image of size 1440 × 1280 pixels is encrypted using the algorithm. The private key parameters for both encryption and decryption are set as follows: J=418; k=1279 a=1664525; m=2**32; c=1013904223 • Block length value: 4