An increasing demand of secure data transmission over internet leads to the challenge of implementing a
consistent cryptosystem. In 2004, USA navy published the patent which highlights the importance of fractal
as an encryption/decryption key in a cryptosystem [1]. Fractal possess butterfly effect i.e. sensitivity to
initial condition, due to which small change in input produces a major change in output. This paper
summarizes the various recent image encryption techniques in which fractal key is used to encrypt/decrypt
followed by substitution, scrambling and diffusion techniques to provide strong cryptosystem. The
algorithms covered both private key encryption as well as public key encryption technique in the paper.
A New Approach of Cryptographic Technique Using Simple ECC & ECFIJAEMSJORNAL
Cryptography is the technique in which usually a file is converted into unreadable format by using public key and private key system called as public key cryptosystem. Then as per the user requirement that file is send to another user for secure data transmission. In this paper we purposed an image based cryptography that Elliptic Curve Function (ECF) techniques and pseudo random encoding technique on images to enhance the security of RFID communication. In the ECF approach, the basic idea is to replace the Elliptic Curve Function (ECF) of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The ECF based technique is the most challenging one as it is difficult to differentiate between the cover object and Crypto object if few ECF bits of the cover object are replaced. In Pseudo Random technique, a random key is used as seed for the Pseudo Random Number Generator in needed in the embedding process. Both the techniques used a Crypto key while embedding messages inside the cover image. By using the key, the chance of getting attacked by the attacker is reduced.
Review paper on Data Security using Cryptography and Steganographyvivatechijri
One of the major problems faced by this digital world is Data Security. Data Security plays an important role in the field of information technology. As there are large advancements in internet technology, there has been huge text as well as multimedia data transfer over the internet. The communication channel available for data transfer from the transmitter to receiver is highly insecure. As the security of electronic data is a major issue and to achieve high security and confidentiality, the public and the private sectors use different kinds of techniques and methods to protect the data from unauthorized users. Cryptography and Steganography are the most popular and widely used technologies for security. Cryptography is the art of hiding information by encryption and steganography is a technique to hides data in the cover medium. Cryptography hides the readable and meaningful contents of the data. And the existence of the data is hidden by the Steganography technique.
A Review on - Data Hiding using Cryptography and SteganographyMangaiK4
Abstract - Security and privacy for a data transmission become a major concern due to rise of internet usage. Many developers are working continuously to make an internet safe environment, but the intruders are very smart to hack the information. For that, two entities communicating need to communicate in a way which is not susceptible to listen in or interception. So every organization uses many data encryption techniques to secure their communication. There are two security mechanisms called, Cryptography and Steganography are being applied. By merging these techniques, two level of information security is achieved. This paper discuss about the way of working Cryptography and Steganography and their different approaches.
Improved Image Encryption for Real-Time Application over Wireless Communicati...ijeei-iaes
Advances in communication networks have enabled organization to send confidential data such as digital images over wireless networks. However, the broadcast nature of wireless communication channel has made it vulnerable to attack from eavesdroppers. We have developed a hybrid cryptography technique, and we present its application to digital images as a means of improving the security of digital image for transmission over wireless communication networks. The hybrid technique uses a combination of a symmetric (Data Encryption Standard) and asymmetric (Rivest Shamir Adleman) cryptographic algorithms to secure data to be transmitted between different nodes of a wireless network. Three different image samples of type jpeg, png and jpg were tested using this technique. The results obtained showed that the hybrid system encrypt the images with minimal simulation time, and high throughput. More importantly, there is no relation or information between the original images and their encrypted form, according to Shannon’s definition of perfect security, thereby making the system much more secure.
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...CSCJournals
In this article, the security performance and quality for image encryption and decryption based on filter bank and the combination between XOR and addition modulo 28 have been studied and assessed. The most common security parameters for image encryption and decryption have been employed. The parameters have been used to examine the proposed image encryption scheme with one and two rounds. The parameters include histogram, correlation coefficient, global entropy, block entropy, avalanche effect, number of pixel change rate (NPCR), unified average change intensity (UACI), exhaustive key analysis, and key sensitivity test. The simulation results proved that, the image encryption process passes all these tests. Moreover, it reaches or excels the current state of the arts. So the encrypted image becomes random-like from the statistical point of views after encryption.
This document provides a literature review of cryptography and its role in network security. It begins with an abstract and then discusses early versus modern cryptography. It identifies overall trends in the research, including that cryptography serves as the foundation for most IT security solutions. It reviews both scholarly and non-scholarly literature on the topic. The scholarly literature section discusses research studies on topics like identity management, group key establishment protocols, wireless security, software vulnerability analysis, and chosen ciphertext attacks. The review concludes that continuing research into cryptography is important for preserving electronic data security and privacy.
At Softroniics we provide job oriented training for freshers in IT sector. We are Pioneers in all leading technologies like Android, Java, .NET, PHP, Python, Embedded Systems, Matlab, NS2, VLSI etc. We are specializiling in technologies like Big Data, Cloud Computing, Internet Of Things (iOT), Data Mining, Networking, Information Security, Image Processing, Mechanical, Automobile automation and many other. We are providing long term and short term internship also.
We are providing short term in industrial training, internship and inplant training for Btech/Bsc/MCA/MTech students. Attached is the list of Topics for Mechanical, Automobile and Mechatronics areas.
MD MANIKANDAN-9037291113,04954021113
softroniics@gmail.com
www.softroniics.com
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERINGIJNSA Journal
Healthcare is an essential application of e-services, where for diagnostic testing, medical imaging acquiring, processing, analysis, storage, and protection are used. Image ciphering during storage and transmission over the networks used has seen implemented using many types of ciphering algorithms for security purpose. Current cyphering algorithms are classified into two types: traditional classical cryptography using standard algorithms (DES, AES, IDEA, RC5, RSA, ...) and chaos cryptography using continuous (Chau, Rossler, Lorenz, ...) or discreet (Logistics, Henon, ...) algorithms. The traditional algorithms have struggled to combat image data as compared to regular textual data. Whereas, the chaotic algorithms are more efficient for image ciphering. The Significancecharacteristics of chaos are its extreme sensitivity to initial conditions and algorithm parameters.
In this paper, medical image security based on hybrid/mixed chaotic algorithms is proposed. The proposed method is implemented using MATLAB. Where the image of the Retina of the Eye to detect Blood Vessels is ciphered. The Pseudo-Random Numbers Generators (PRNGs) from the different chaotic algorithms are implemented, and their statistical properties are evaluated using the National Institute of Standards and Technology NIST and other statistical test-suits. Then, these algorithms are used to secure the data, where the statistical properties of the cipher-text are also tested. We propose two PRNGs to increase the complexity of the PRNGs and to allow many of the NIST statistical tests to be passed: one based on twohybrid mixed chaotic logistic maps and one based on two-hybrid mixed chaotic Henon maps, where each chaotic algorithm runs side-by-side andstarts with random initial conditions and parameters (encryption keys). The resulting hybrid PRNGs passed many of the NIST statistical test suits.
A New Approach of Cryptographic Technique Using Simple ECC & ECFIJAEMSJORNAL
Cryptography is the technique in which usually a file is converted into unreadable format by using public key and private key system called as public key cryptosystem. Then as per the user requirement that file is send to another user for secure data transmission. In this paper we purposed an image based cryptography that Elliptic Curve Function (ECF) techniques and pseudo random encoding technique on images to enhance the security of RFID communication. In the ECF approach, the basic idea is to replace the Elliptic Curve Function (ECF) of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The ECF based technique is the most challenging one as it is difficult to differentiate between the cover object and Crypto object if few ECF bits of the cover object are replaced. In Pseudo Random technique, a random key is used as seed for the Pseudo Random Number Generator in needed in the embedding process. Both the techniques used a Crypto key while embedding messages inside the cover image. By using the key, the chance of getting attacked by the attacker is reduced.
Review paper on Data Security using Cryptography and Steganographyvivatechijri
One of the major problems faced by this digital world is Data Security. Data Security plays an important role in the field of information technology. As there are large advancements in internet technology, there has been huge text as well as multimedia data transfer over the internet. The communication channel available for data transfer from the transmitter to receiver is highly insecure. As the security of electronic data is a major issue and to achieve high security and confidentiality, the public and the private sectors use different kinds of techniques and methods to protect the data from unauthorized users. Cryptography and Steganography are the most popular and widely used technologies for security. Cryptography is the art of hiding information by encryption and steganography is a technique to hides data in the cover medium. Cryptography hides the readable and meaningful contents of the data. And the existence of the data is hidden by the Steganography technique.
A Review on - Data Hiding using Cryptography and SteganographyMangaiK4
Abstract - Security and privacy for a data transmission become a major concern due to rise of internet usage. Many developers are working continuously to make an internet safe environment, but the intruders are very smart to hack the information. For that, two entities communicating need to communicate in a way which is not susceptible to listen in or interception. So every organization uses many data encryption techniques to secure their communication. There are two security mechanisms called, Cryptography and Steganography are being applied. By merging these techniques, two level of information security is achieved. This paper discuss about the way of working Cryptography and Steganography and their different approaches.
Improved Image Encryption for Real-Time Application over Wireless Communicati...ijeei-iaes
Advances in communication networks have enabled organization to send confidential data such as digital images over wireless networks. However, the broadcast nature of wireless communication channel has made it vulnerable to attack from eavesdroppers. We have developed a hybrid cryptography technique, and we present its application to digital images as a means of improving the security of digital image for transmission over wireless communication networks. The hybrid technique uses a combination of a symmetric (Data Encryption Standard) and asymmetric (Rivest Shamir Adleman) cryptographic algorithms to secure data to be transmitted between different nodes of a wireless network. Three different image samples of type jpeg, png and jpg were tested using this technique. The results obtained showed that the hybrid system encrypt the images with minimal simulation time, and high throughput. More importantly, there is no relation or information between the original images and their encrypted form, according to Shannon’s definition of perfect security, thereby making the system much more secure.
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...CSCJournals
In this article, the security performance and quality for image encryption and decryption based on filter bank and the combination between XOR and addition modulo 28 have been studied and assessed. The most common security parameters for image encryption and decryption have been employed. The parameters have been used to examine the proposed image encryption scheme with one and two rounds. The parameters include histogram, correlation coefficient, global entropy, block entropy, avalanche effect, number of pixel change rate (NPCR), unified average change intensity (UACI), exhaustive key analysis, and key sensitivity test. The simulation results proved that, the image encryption process passes all these tests. Moreover, it reaches or excels the current state of the arts. So the encrypted image becomes random-like from the statistical point of views after encryption.
This document provides a literature review of cryptography and its role in network security. It begins with an abstract and then discusses early versus modern cryptography. It identifies overall trends in the research, including that cryptography serves as the foundation for most IT security solutions. It reviews both scholarly and non-scholarly literature on the topic. The scholarly literature section discusses research studies on topics like identity management, group key establishment protocols, wireless security, software vulnerability analysis, and chosen ciphertext attacks. The review concludes that continuing research into cryptography is important for preserving electronic data security and privacy.
At Softroniics we provide job oriented training for freshers in IT sector. We are Pioneers in all leading technologies like Android, Java, .NET, PHP, Python, Embedded Systems, Matlab, NS2, VLSI etc. We are specializiling in technologies like Big Data, Cloud Computing, Internet Of Things (iOT), Data Mining, Networking, Information Security, Image Processing, Mechanical, Automobile automation and many other. We are providing long term and short term internship also.
We are providing short term in industrial training, internship and inplant training for Btech/Bsc/MCA/MTech students. Attached is the list of Topics for Mechanical, Automobile and Mechatronics areas.
MD MANIKANDAN-9037291113,04954021113
softroniics@gmail.com
www.softroniics.com
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERINGIJNSA Journal
Healthcare is an essential application of e-services, where for diagnostic testing, medical imaging acquiring, processing, analysis, storage, and protection are used. Image ciphering during storage and transmission over the networks used has seen implemented using many types of ciphering algorithms for security purpose. Current cyphering algorithms are classified into two types: traditional classical cryptography using standard algorithms (DES, AES, IDEA, RC5, RSA, ...) and chaos cryptography using continuous (Chau, Rossler, Lorenz, ...) or discreet (Logistics, Henon, ...) algorithms. The traditional algorithms have struggled to combat image data as compared to regular textual data. Whereas, the chaotic algorithms are more efficient for image ciphering. The Significancecharacteristics of chaos are its extreme sensitivity to initial conditions and algorithm parameters.
In this paper, medical image security based on hybrid/mixed chaotic algorithms is proposed. The proposed method is implemented using MATLAB. Where the image of the Retina of the Eye to detect Blood Vessels is ciphered. The Pseudo-Random Numbers Generators (PRNGs) from the different chaotic algorithms are implemented, and their statistical properties are evaluated using the National Institute of Standards and Technology NIST and other statistical test-suits. Then, these algorithms are used to secure the data, where the statistical properties of the cipher-text are also tested. We propose two PRNGs to increase the complexity of the PRNGs and to allow many of the NIST statistical tests to be passed: one based on twohybrid mixed chaotic logistic maps and one based on two-hybrid mixed chaotic Henon maps, where each chaotic algorithm runs side-by-side andstarts with random initial conditions and parameters (encryption keys). The resulting hybrid PRNGs passed many of the NIST statistical test suits.
This document discusses message transfer using steganography. Steganography is used to hide information like text, images or videos within other media files such as images, videos or music. The document discusses how steganography can be used to securely transfer messages between two parties by hiding the messages within digital files like images without the server being able to decrypt the messages. It discusses how the least significant bits of pixels can be modified to embed secret data without significantly affecting the cover image. Different encryption techniques for embedding the data are also discussed. The document concludes that steganography can help protect messages not only from intruders but also from server-side attacks by making it difficult for the server to detect and decrypt embedded messages.
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...Editor IJCATR
with the arrival of the information age and much more important information systems and communication in human
everyday life, necessity immunization information and communication strategy were also raised. The easiest way to meet this
necessity is conventional encryption algorithms. Encryption is a right tool for data protection in an unsecure channel. To this end, from
two-method symmetric key encryption and public-key cryptography are used. In this paper we examine text cryptography, one of the
most important topics in cryptography. A unique attribute of this kind of encryption has been of interest to many researchers in this
field. This paper, considering the symmetric encryption algorithm, provides a text encryption algorithm using a 128-bit key. The
proposed algorithm uses a 128-bit key, the text data using the XOR operator to convert the encrypted information. Therefore, the aim
of this method is to provide a convenient method for symmetrically encrypting data not to be easily decoded, and finally, the results of
the tests show that the proposed method is better in terms of security and speed of execution
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYcsandit
Digital communication witnesses a noticeable and continuous development in many
applications in the Internet. Hence, a secure communication sessions must be provided. The
security of data transmitted across a global network has turned into a key factor on the network
performance measures. Cryptography and steganography are two important techniques that are
used to provide network security. In this paper, we conduct a comparative study of
steganography and cryptography. We survey a number of methods combining cryptography and
steganography techniques in one system. Moreover, we present a classification of these
methods, and compare them in terms of the algorithm used for encryption, the steganography
technique and the file type used for covering the information.
This document presents an adaptive steganography technique based on an enhanced cipher hiding method for secure data transfer. It combines cryptography and audio steganography. The secret message is first encrypted using a modified least significant bit algorithm and 2's complement operations. The encrypted data is then embedded into the least significant bits of an audio file. Keys are generated and sent with the stego audio to the receiver. The receiver uses the keys to extract the encrypted data from the audio and decrypt it back to the original message. The technique aims to provide better security for data transmission over unsecured networks by taking advantage of both cryptography and steganography.
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document discusses image encryption using a chaotic artificial neural network. It begins by introducing image encryption and its importance for securely transmitting valuable data over the internet. It then provides background on encryption techniques and discusses how image encryption works. The document outlines chaotic cryptography and why characteristics of chaos make it suitable for cryptography. It also discusses artificial neural networks and how they can be used for image encryption. In particular, it describes using a feedforward neural network with hidden layers to encrypt images.
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
Rapid growth of digital communication and multimedia application increases the need of security and it becomes an important issue of communication and storage of multimedia. Image Encryption is one of the techniques that are used to ensure high security. Various fields such as medical science military in which image encryption can be used. Recent cryptography provides necessary techniques for securing information and protective multimedia data. In last some years, encryption technology has been developed quickly and many image encryption methods have been used to protect confidential image data from illegal way in. Within this paper survey of different image encryption techniques have been discussed from which researchers can get an idea for efficient techniques to be used.
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...IJNSA Journal
In today’s day and age when everything is done with the aid of computing technology, the need for confidential communication has drastically increased. Not only the sensitive data such as top intelligent secrets of our nation but personal information of common people needs to be secure. Several combinations of cryptography and steganography techniques in different ways are used by researchers over the past to protect the data being transmitted. Cryptography uses mathematical algorithms to convert the data into an incomprehensible form and Steganography, on the other hand hides the data in a carrier such as image, data, audio or video. Cryptography provides necessary mechanisms for providing accountability, accuracy and confidentiality in public communication mediums such as the Internet and steganography is used in other fields such as copyright, preventing e-document forging etc. We are of the opinion that this security mechanism can further be increased by incorporating the use of Huffman coding in order to reduce the data length. This paper is an effort in the direction to hide, secure and compress the data. It explains the executed procedure by applying various encryption techniques one by one and our aim is to get the best security out of the existing ones. The proposed technique is implemented in MATLAB2016a and the results shown in this paper that our technique is better approach then the conventional techniques.
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATAijcisjournal
Modern cryptography targeted towards providing data confidentiality still pose some limitations. The security of public-key cryptography is based on unproven assumptions associated with the hardness /complicatedness of certain mathematical problems. However, public-key cryptography is not unconditionally secure: there is no proof that the problems on which it is based are intractable or even that their complexity is not polynomial. Therefore, public-key cryptography is not immune to unexpectedly strong computational power or better cryptanalysis techniques. The strength of modern cryptography is being weakened and with advances of big data, could gradually be suppressed. Moreover, most of the currently used public-key cryptographic schemes could be cracked in polynomial time with a quantum computer. This paper presents a renewed focus in fortifying the confidentiality of big data by proposing a quantum-cryptographic protocol. A framework was constructed for realizing the protocol, considering some characteristics of big data and conceptualized using defined propositions and theorems.
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATAijcisjournal
Modern cryptography targeted towards providing data confidentiality still pose some limitations. The security of public-key cryptography is based on unproven assumptions associated with the hardness complicatedness of certain mathematical problems. However, public-key cryptography is not unconditionally secure: there is no proof that the problems on which it is based are intractable or even that their complexity is not polynomial. Therefore, public-key cryptography is not immune to unexpectedly strong computational power or better cryptanalysis techniques. The strength of modern cryptography is being weakened and with advances of big data, could gradually be suppressed. Moreover, most of the currently used public-key cryptographic schemes could be cracked in polynomial time with a quantum computer. This paper presents a renewed focus in fortifying the confidentiality of big data by proposing a quantum-cryptographic protocol. A framework was constructed for realizing the protocol, considering some characteristics of big data and conceptualized using defined propositions and theorems.
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION acijjournal
In today’s internet world is full of data steals and hackers. So, there is a essential to design a system that
assists the internet users to interchange their secret and private data safely across the web. Informationhiding
process in a Steganography system starts by identifying medium’s redundant bits. The encryption
process creates a stego medium by replacing these redundant bits with data from the hidden message.
So, we propose a method for encrypting the image, which has two phases. In the first phase, Perform
Circular Shift Operations on the image pixels and the number of rotations have been calculated based on
the length of the password. In the second phase, the first phase has undergone some bitwise operations
with a carriage image, by doing this; breaking of the cipher text is difficult.
Secure Grayscale Image Encryption Using Symmetric Block Cipher with Enhanced ...IRJET Journal
This document presents an abstract for a research paper that proposes a new symmetric block cipher algorithm for encrypting grayscale images. The algorithm aims to improve security by introducing unpredictability through a combination of additive and multiplicative ciphers. It is shown to achieve a high avalanche effect of 98.48%, indicating strong encryption. The algorithm maintains a uniform histogram in encrypted images. It is concluded that the algorithm excels in both security and efficiency, making it suitable for applications requiring protected image transfers.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Public key steganography using lsb method with chaotic neural networkIAEME Publication
This document summarizes a research paper that proposes a public key steganography method using least significant bit (LSB) insertion with a chaotic neural network. The method embeds a secret image into a cover image using LSB insertion with a public chaotic map-generated key. A chaotic neural network is then used to merge the cover and secret images. The document provides background on steganography, chaotic maps, neural networks, and LSB insertion. It also reviews related work using neural networks for steganography and iris image protection.
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...ijtsrd
The document discusses enhancing text security using steganography and cryptographic techniques. It begins by introducing steganography and cryptography as techniques for securing data transfer. It then reviews various literature on combining these techniques. The document outlines different steganography techniques including least significant bit and transform domain methods. It also describes symmetric and public key cryptography systems. The key proposal is that combining cryptography and steganography provides multiple layers of security by encrypting data then hiding it within a cover file, such as an image. Encrypting the data first using cryptography before applying steganography makes the hidden data more secure and difficult to extract without the proper keys.
This document provides a survey of metamorphic cryptography techniques. It begins with an introduction to cryptography and steganography individually, explaining how cryptography encrypts messages and steganography hides messages. It then discusses the benefits of combining these approaches in metamorphic cryptography, including providing multiple layers of security. Two examples of metamorphic cryptography techniques are described: one using static parsing steganography to hide bits of a secret message in cover image pixels, and another combining AES encryption with discrete cosine transform to hide encrypted text in an image. The document concludes that non-metamorphic approaches are less secure because they rely on single methodologies and simpler encoding algorithms.
Data security and protection is one of the most common technologies used in the field of computer science. This is because of its great importance in all fields related to daily life, whether political, economic, and other aspects change. In this research paper, a new intelligent system that concentrates on image and text encryption and decryption is proposed. Furthermore, the image recognition rate is increased. In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. The proposed technique relies on using square root of public key as private key. XOR operation for colored images encryption and decryption is performed. By calculating signal to noise ratio (PSNR), mean square error (MSE), and bit error rate (BER), the most important things that we address how to provide data security for large data based on encryption techniques and increase the security of multimedia data and texture date and address the problem of time and accuracy in image matching. the results show that the quality of images after decryption is good.
With the growth of cloud technologies, computing
resources and cloud storage have become the most
demanding online services. There are several companies
desiring to outsource their data storage and resources as
well. While storing private and sensitive data on a third
party data center, it is necessary to consider security and
privacy which become major issues. In this paper, a novel
Double Encryption with Single Decryption (DESD) crypto
technique is proposed to secure the data in cloud storage.
The proposed technique comprises of encryption and
decryption phases where in the encryption phase the data is
randomly partitioned into multiple fragments. Double
encryption is done on each fragment by prime numbers, as
well as Invertible Non-linear Function (INF). These
multiple encrypted data are stored at the multiple cloud
storages with the help of cloud service provider (CSP).
After all verification process the data user collects the key
from the data owner and decrypts the gathered data from
the cloud with the knowledge of inverse INF. The proposed
crypto technique provides more security and privacy to
cloud data and any illegitimate users cannot retrieve the
original data. The performance of the proposed DESD
technique is compared with AES and Triple DES
techniques and the experimental results are plotted which
shows the proposed technique is efficient and faster.
Securing sensitive and important information from intruders is a tedious task in the 21st century. In order to protect information different ciphering techniques has been used. Quantum Cryptography has taken a new path in the field of crypto systems where all the presently used crypto systems are classified as classical cryptography systems. Classical cryptography systems use mathematical formulas where quantum cryptography uses the principles of photon polarization and heisenberg uncertainty principle. As the south
asian region is developing rapidly in almost all the sectorsthe need of securing information has become a difficult task. Therefore, the need of starting extensive research on quantum cryptography for the south asian region to safeguard information from intruders has been the purpose of this study. Comparative study of the growth of the telecommunication sector in the south asian region and how quantum
cryptography could assist in securing information has been discussedas results.In the end, details of the need to research on quantum cryptography in the south asian region to overcome future predicted cyber threats are also discussed.
Cryptographic Algorithms For Secure Data CommunicationCSCJournals
Personal privacy is of utmost importance in the global networked world. One of the best tools to help people safeguard their personal information is the use of cryptography. In this paper we present new cryptographic algorithms that employ the use of asymmetric keys. The proposed algorithms encipher message into nonlinear equations using public key and decipher by the intended party using private key. If a third party intercepted the message, it will be difficult to decipher it due to the multilevel ciphers of the proposed application.
Home security is of paramount importance in today's world, where we rely more on technology, home
security is crucial. Using technology to make homes safer and easier to control from anywhere is
important. Home security is important for the occupant’s safety. In this paper, we came up with a low cost,
AI based model home security system. The system has a user-friendly interface, allowing users to start
model training and face detection with simple keyboard commands. Our goal is to introduce an innovative
home security system using facial recognition technology. Unlike traditional systems, this system trains
and saves images of friends and family members. The system scans this folder to recognize familiar faces
and provides real-time monitoring. If an unfamiliar face is detected, it promptly sends an email alert,
ensuring a proactive response to potential security threats.
In the era of data-driven warfare, the integration of big data and machine learning (ML) techniques has
become paramount for enhancing defence capabilities. This research report delves into the applications of
big data and ML in the defence sector, exploring their potential to revolutionize intelligence gathering,
strategic decision-making, and operational efficiency. By leveraging vast amounts of data and advanced
algorithms, these technologies offer unprecedented opportunities for threat detection, predictive analysis,
and optimized resource allocation. However, their adoption also raises critical concerns regarding data
privacy, ethical implications, and the potential for misuse. This report aims to provide a comprehensive
understanding of the current state of big data and ML in defence, while examining the challenges and
ethical considerations that must be addressed to ensure responsible and effective implementation.
More Related Content
Similar to Image Encryption Techniques Using Fractal Function : A Review
This document discusses message transfer using steganography. Steganography is used to hide information like text, images or videos within other media files such as images, videos or music. The document discusses how steganography can be used to securely transfer messages between two parties by hiding the messages within digital files like images without the server being able to decrypt the messages. It discusses how the least significant bits of pixels can be modified to embed secret data without significantly affecting the cover image. Different encryption techniques for embedding the data are also discussed. The document concludes that steganography can help protect messages not only from intruders but also from server-side attacks by making it difficult for the server to detect and decrypt embedded messages.
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...Editor IJCATR
with the arrival of the information age and much more important information systems and communication in human
everyday life, necessity immunization information and communication strategy were also raised. The easiest way to meet this
necessity is conventional encryption algorithms. Encryption is a right tool for data protection in an unsecure channel. To this end, from
two-method symmetric key encryption and public-key cryptography are used. In this paper we examine text cryptography, one of the
most important topics in cryptography. A unique attribute of this kind of encryption has been of interest to many researchers in this
field. This paper, considering the symmetric encryption algorithm, provides a text encryption algorithm using a 128-bit key. The
proposed algorithm uses a 128-bit key, the text data using the XOR operator to convert the encrypted information. Therefore, the aim
of this method is to provide a convenient method for symmetrically encrypting data not to be easily decoded, and finally, the results of
the tests show that the proposed method is better in terms of security and speed of execution
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYcsandit
Digital communication witnesses a noticeable and continuous development in many
applications in the Internet. Hence, a secure communication sessions must be provided. The
security of data transmitted across a global network has turned into a key factor on the network
performance measures. Cryptography and steganography are two important techniques that are
used to provide network security. In this paper, we conduct a comparative study of
steganography and cryptography. We survey a number of methods combining cryptography and
steganography techniques in one system. Moreover, we present a classification of these
methods, and compare them in terms of the algorithm used for encryption, the steganography
technique and the file type used for covering the information.
This document presents an adaptive steganography technique based on an enhanced cipher hiding method for secure data transfer. It combines cryptography and audio steganography. The secret message is first encrypted using a modified least significant bit algorithm and 2's complement operations. The encrypted data is then embedded into the least significant bits of an audio file. Keys are generated and sent with the stego audio to the receiver. The receiver uses the keys to extract the encrypted data from the audio and decrypt it back to the original message. The technique aims to provide better security for data transmission over unsecured networks by taking advantage of both cryptography and steganography.
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document discusses image encryption using a chaotic artificial neural network. It begins by introducing image encryption and its importance for securely transmitting valuable data over the internet. It then provides background on encryption techniques and discusses how image encryption works. The document outlines chaotic cryptography and why characteristics of chaos make it suitable for cryptography. It also discusses artificial neural networks and how they can be used for image encryption. In particular, it describes using a feedforward neural network with hidden layers to encrypt images.
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
Rapid growth of digital communication and multimedia application increases the need of security and it becomes an important issue of communication and storage of multimedia. Image Encryption is one of the techniques that are used to ensure high security. Various fields such as medical science military in which image encryption can be used. Recent cryptography provides necessary techniques for securing information and protective multimedia data. In last some years, encryption technology has been developed quickly and many image encryption methods have been used to protect confidential image data from illegal way in. Within this paper survey of different image encryption techniques have been discussed from which researchers can get an idea for efficient techniques to be used.
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...IJNSA Journal
In today’s day and age when everything is done with the aid of computing technology, the need for confidential communication has drastically increased. Not only the sensitive data such as top intelligent secrets of our nation but personal information of common people needs to be secure. Several combinations of cryptography and steganography techniques in different ways are used by researchers over the past to protect the data being transmitted. Cryptography uses mathematical algorithms to convert the data into an incomprehensible form and Steganography, on the other hand hides the data in a carrier such as image, data, audio or video. Cryptography provides necessary mechanisms for providing accountability, accuracy and confidentiality in public communication mediums such as the Internet and steganography is used in other fields such as copyright, preventing e-document forging etc. We are of the opinion that this security mechanism can further be increased by incorporating the use of Huffman coding in order to reduce the data length. This paper is an effort in the direction to hide, secure and compress the data. It explains the executed procedure by applying various encryption techniques one by one and our aim is to get the best security out of the existing ones. The proposed technique is implemented in MATLAB2016a and the results shown in this paper that our technique is better approach then the conventional techniques.
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATAijcisjournal
Modern cryptography targeted towards providing data confidentiality still pose some limitations. The security of public-key cryptography is based on unproven assumptions associated with the hardness /complicatedness of certain mathematical problems. However, public-key cryptography is not unconditionally secure: there is no proof that the problems on which it is based are intractable or even that their complexity is not polynomial. Therefore, public-key cryptography is not immune to unexpectedly strong computational power or better cryptanalysis techniques. The strength of modern cryptography is being weakened and with advances of big data, could gradually be suppressed. Moreover, most of the currently used public-key cryptographic schemes could be cracked in polynomial time with a quantum computer. This paper presents a renewed focus in fortifying the confidentiality of big data by proposing a quantum-cryptographic protocol. A framework was constructed for realizing the protocol, considering some characteristics of big data and conceptualized using defined propositions and theorems.
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATAijcisjournal
Modern cryptography targeted towards providing data confidentiality still pose some limitations. The security of public-key cryptography is based on unproven assumptions associated with the hardness complicatedness of certain mathematical problems. However, public-key cryptography is not unconditionally secure: there is no proof that the problems on which it is based are intractable or even that their complexity is not polynomial. Therefore, public-key cryptography is not immune to unexpectedly strong computational power or better cryptanalysis techniques. The strength of modern cryptography is being weakened and with advances of big data, could gradually be suppressed. Moreover, most of the currently used public-key cryptographic schemes could be cracked in polynomial time with a quantum computer. This paper presents a renewed focus in fortifying the confidentiality of big data by proposing a quantum-cryptographic protocol. A framework was constructed for realizing the protocol, considering some characteristics of big data and conceptualized using defined propositions and theorems.
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION acijjournal
In today’s internet world is full of data steals and hackers. So, there is a essential to design a system that
assists the internet users to interchange their secret and private data safely across the web. Informationhiding
process in a Steganography system starts by identifying medium’s redundant bits. The encryption
process creates a stego medium by replacing these redundant bits with data from the hidden message.
So, we propose a method for encrypting the image, which has two phases. In the first phase, Perform
Circular Shift Operations on the image pixels and the number of rotations have been calculated based on
the length of the password. In the second phase, the first phase has undergone some bitwise operations
with a carriage image, by doing this; breaking of the cipher text is difficult.
Secure Grayscale Image Encryption Using Symmetric Block Cipher with Enhanced ...IRJET Journal
This document presents an abstract for a research paper that proposes a new symmetric block cipher algorithm for encrypting grayscale images. The algorithm aims to improve security by introducing unpredictability through a combination of additive and multiplicative ciphers. It is shown to achieve a high avalanche effect of 98.48%, indicating strong encryption. The algorithm maintains a uniform histogram in encrypted images. It is concluded that the algorithm excels in both security and efficiency, making it suitable for applications requiring protected image transfers.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Public key steganography using lsb method with chaotic neural networkIAEME Publication
This document summarizes a research paper that proposes a public key steganography method using least significant bit (LSB) insertion with a chaotic neural network. The method embeds a secret image into a cover image using LSB insertion with a public chaotic map-generated key. A chaotic neural network is then used to merge the cover and secret images. The document provides background on steganography, chaotic maps, neural networks, and LSB insertion. It also reviews related work using neural networks for steganography and iris image protection.
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...ijtsrd
The document discusses enhancing text security using steganography and cryptographic techniques. It begins by introducing steganography and cryptography as techniques for securing data transfer. It then reviews various literature on combining these techniques. The document outlines different steganography techniques including least significant bit and transform domain methods. It also describes symmetric and public key cryptography systems. The key proposal is that combining cryptography and steganography provides multiple layers of security by encrypting data then hiding it within a cover file, such as an image. Encrypting the data first using cryptography before applying steganography makes the hidden data more secure and difficult to extract without the proper keys.
This document provides a survey of metamorphic cryptography techniques. It begins with an introduction to cryptography and steganography individually, explaining how cryptography encrypts messages and steganography hides messages. It then discusses the benefits of combining these approaches in metamorphic cryptography, including providing multiple layers of security. Two examples of metamorphic cryptography techniques are described: one using static parsing steganography to hide bits of a secret message in cover image pixels, and another combining AES encryption with discrete cosine transform to hide encrypted text in an image. The document concludes that non-metamorphic approaches are less secure because they rely on single methodologies and simpler encoding algorithms.
Data security and protection is one of the most common technologies used in the field of computer science. This is because of its great importance in all fields related to daily life, whether political, economic, and other aspects change. In this research paper, a new intelligent system that concentrates on image and text encryption and decryption is proposed. Furthermore, the image recognition rate is increased. In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. The proposed technique relies on using square root of public key as private key. XOR operation for colored images encryption and decryption is performed. By calculating signal to noise ratio (PSNR), mean square error (MSE), and bit error rate (BER), the most important things that we address how to provide data security for large data based on encryption techniques and increase the security of multimedia data and texture date and address the problem of time and accuracy in image matching. the results show that the quality of images after decryption is good.
With the growth of cloud technologies, computing
resources and cloud storage have become the most
demanding online services. There are several companies
desiring to outsource their data storage and resources as
well. While storing private and sensitive data on a third
party data center, it is necessary to consider security and
privacy which become major issues. In this paper, a novel
Double Encryption with Single Decryption (DESD) crypto
technique is proposed to secure the data in cloud storage.
The proposed technique comprises of encryption and
decryption phases where in the encryption phase the data is
randomly partitioned into multiple fragments. Double
encryption is done on each fragment by prime numbers, as
well as Invertible Non-linear Function (INF). These
multiple encrypted data are stored at the multiple cloud
storages with the help of cloud service provider (CSP).
After all verification process the data user collects the key
from the data owner and decrypts the gathered data from
the cloud with the knowledge of inverse INF. The proposed
crypto technique provides more security and privacy to
cloud data and any illegitimate users cannot retrieve the
original data. The performance of the proposed DESD
technique is compared with AES and Triple DES
techniques and the experimental results are plotted which
shows the proposed technique is efficient and faster.
Securing sensitive and important information from intruders is a tedious task in the 21st century. In order to protect information different ciphering techniques has been used. Quantum Cryptography has taken a new path in the field of crypto systems where all the presently used crypto systems are classified as classical cryptography systems. Classical cryptography systems use mathematical formulas where quantum cryptography uses the principles of photon polarization and heisenberg uncertainty principle. As the south
asian region is developing rapidly in almost all the sectorsthe need of securing information has become a difficult task. Therefore, the need of starting extensive research on quantum cryptography for the south asian region to safeguard information from intruders has been the purpose of this study. Comparative study of the growth of the telecommunication sector in the south asian region and how quantum
cryptography could assist in securing information has been discussedas results.In the end, details of the need to research on quantum cryptography in the south asian region to overcome future predicted cyber threats are also discussed.
Cryptographic Algorithms For Secure Data CommunicationCSCJournals
Personal privacy is of utmost importance in the global networked world. One of the best tools to help people safeguard their personal information is the use of cryptography. In this paper we present new cryptographic algorithms that employ the use of asymmetric keys. The proposed algorithms encipher message into nonlinear equations using public key and decipher by the intended party using private key. If a third party intercepted the message, it will be difficult to decipher it due to the multilevel ciphers of the proposed application.
Similar to Image Encryption Techniques Using Fractal Function : A Review (20)
Home security is of paramount importance in today's world, where we rely more on technology, home
security is crucial. Using technology to make homes safer and easier to control from anywhere is
important. Home security is important for the occupant’s safety. In this paper, we came up with a low cost,
AI based model home security system. The system has a user-friendly interface, allowing users to start
model training and face detection with simple keyboard commands. Our goal is to introduce an innovative
home security system using facial recognition technology. Unlike traditional systems, this system trains
and saves images of friends and family members. The system scans this folder to recognize familiar faces
and provides real-time monitoring. If an unfamiliar face is detected, it promptly sends an email alert,
ensuring a proactive response to potential security threats.
In the era of data-driven warfare, the integration of big data and machine learning (ML) techniques has
become paramount for enhancing defence capabilities. This research report delves into the applications of
big data and ML in the defence sector, exploring their potential to revolutionize intelligence gathering,
strategic decision-making, and operational efficiency. By leveraging vast amounts of data and advanced
algorithms, these technologies offer unprecedented opportunities for threat detection, predictive analysis,
and optimized resource allocation. However, their adoption also raises critical concerns regarding data
privacy, ethical implications, and the potential for misuse. This report aims to provide a comprehensive
understanding of the current state of big data and ML in defence, while examining the challenges and
ethical considerations that must be addressed to ensure responsible and effective implementation.
Cloud Computing, being one of the most recent innovative developments of the IT world, has been
instrumental not just to the success of SMEs but, through their productivity and innovative contribution to
the economy, has even made a remarkable contribution to the economic growth of the United States. To
this end, the study focuses on how cloud computing technology has impacted economic growth through
SMEs in the United States. Relevant literature connected to the variables of interest in this study was
reviewed, and secondary data was generated and utilized in the analysis section of this paper. The findings
of this paper revealed that there have been meaningful contributions that the usage of virtualization has
made in the commercial dealings of small firms in the United States, and this has also been reflected in the
economic growth of the country. This paper further revealed that as important as cloud-based software is,
some SMEs are still skeptical about how it can help improve their business and increase their bottom line
and hence have failed to adopt it. Apart from the SMEs, some notable large firms in different industries,
including information and educational services, have adopted cloud computing technology and hence
contributed to the economic growth of the United States. Lastly, findings from our inferential statistics
revealed that no discernible change has occurred in innovation between small and big businesses in the
adoption of cloud computing. Both categories of businesses adopt cloud computing in the same way, and
their contribution to the American economy has no significant difference in the usage of virtualization.
Energy-constrained Wireless Sensor Networks (WSNs) have garnered significant research interest in
recent years. Multiple-Input Multiple-Output (MIMO), or Cooperative MIMO, represents a specialized
application of MIMO technology within WSNs. This approach operates effectively, especially in
challenging and resource-constrained environments. By facilitating collaboration among sensor nodes,
Cooperative MIMO enhances reliability, coverage, and energy efficiency in WSN deployments.
Consequently, MIMO finds application in diverse WSN scenarios, spanning environmental monitoring,
industrial automation, and healthcare applications.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication. IJCSIT publishes original research papers and review papers, as well as auxiliary material such as: research papers, case studies, technical reports etc.
With growing, Car parking increases with the number of car users. With the increased use of smartphones
and their applications, users prefer mobile phone-based solutions. This paper proposes the Smart Parking
Management System (SPMS) that depends on Arduino parts, Android applications, and based on IoT. This
gave the client the ability to check available parking spaces and reserve a parking spot. IR sensors are
utilized to know if a car park space is allowed. Its area data are transmitted using the WI-FI module to the
server and are recovered by the mobile application which offers many options attractively and with no cost
to users and lets the user check reservation details. With IoT technology, the smart parking system can be
connected wirelessly to easily track available locations.
Welcome to AIRCC's International Journal of Computer Science and Information Technology (IJCSIT), your gateway to the latest advancements in the dynamic fields of Computer Science and Information Systems.
Computer-Assisted Language Learning (CALL) are computer-based tutoring systems that deal with
linguistic skills. Adding intelligence in such systems is mainly based on using Natural Language
Processing (NLP) tools to diagnose student errors, especially in language grammar. However, most such
systems do not consider the modeling of student competence in linguistic skills, especially for the Arabic
language. In this paper, we will deal with basic grammar concepts of the Arabic language taught for the
fourth grade of the elementary school in Egypt. This is through Arabic Grammar Trainer (AGTrainer)
which is an Intelligent CALL. The implemented system (AGTrainer) trains the students through different
questions that deal with the different concepts and have different difficulty levels. Constraint-based student
modeling (CBSM) technique is used as a short-term student model. CBSM is used to define in small grain
level the different grammar skills through the defined skill structures. The main contribution of this paper
is the hierarchal representation of the system's basic grammar skills as domain knowledge. That
representation is used as a mechanism for efficiently checking constraints to model the student knowledge
and diagnose the student errors and identify their cause. In addition, satisfying constraints and the number
of trails the student takes for answering each question and fuzzy logic decision system are used to
determine the student learning level for each lesson as a long-term model. The results of the evaluation
showed the system's effectiveness in learning in addition to the satisfaction of students and teachers with its
features and abilities.
In the realm of computer security, the importance of efficient and reliable user authentication methods has
become increasingly critical. This paper examines the potential of mouse movement dynamics as a
consistent metric for continuous authentication. By analysing user mouse movement patterns in two
contrasting gaming scenarios, "Team Fortress" and "Poly Bridge," we investigate the distinctive
behavioral patterns inherent in high-intensity and low-intensity UI interactions. The study extends beyond
conventional methodologies by employing a range of machine learning models. These models are carefully
selected to assess their effectiveness in capturing and interpreting the subtleties of user behavior as
reflected in their mouse movements. This multifaceted approach allows for a more nuanced and
comprehensive understanding of user interaction patterns. Our findings reveal that mouse movement
dynamics can serve as a reliable indicator for continuous user authentication. The diverse machine
learning models employed in this study demonstrate competent performance in user verification, marking
an improvement over previous methods used in this field. This research contributes to the ongoing efforts to
enhance computer security and highlights the potential of leveraging user behavior, specifically mouse
dynamics, in developing robust authentication systems.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
Image segmentation and classification tasks in computer vision have proven to be highly effective using neural networks, specifically Convolutional Neural Networks (CNNs). These tasks have numerous
practical applications, such as in medical imaging, autonomous driving, and surveillance. CNNs are capable
of learning complex features directly from images and achieving outstanding performance across several
datasets. In this work, we have utilized three different datasets to investigate the efficacy of various preprocessing and classification techniques in accurssedately segmenting and classifying different structures
within the MRI and natural images. We have utilized both sample gradient and Canny Edge Detection
methods for pre-processing, and K-means clustering have been applied to segment the images. Image
augmentation improves the size and diversity of datasets for training the models for image classification
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
This research aims to further understanding in the field of continuous authentication using behavioural
biometrics. We are contributing a novel dataset that encompasses the gesture data of 15 users playing
Minecraft with a Samsung Tablet, each for a duration of 15 minutes. Utilizing this dataset, we employed
machine learning (ML) binary classifiers, being Random Forest (RF), K-Nearest Neighbors (KNN), and
Support Vector Classifier (SVC), to determine the authenticity of specific user actions. Our most robust
model was SVC, which achieved an average accuracy of approximately 90%, demonstrating that touch
dynamics can effectively distinguish users. However, further studies are needed to make it viable option
for authentication systems. You can access our dataset at the following
link:https://github.com/AuthenTech2023/authentech-repo
This paper discusses the capabilities and limitations of GPT-3 (0), a state-of-the-art language model, in the
context of text understanding. We begin by describing the architecture and training process of GPT-3, and
provide an overview of its impressive performance across a wide range of natural language processing
tasks, such as language translation, question-answering, and text completion. Throughout this research
project, a summarizing tool was also created to help us retrieve content from any types of document,
specifically IELTS (0) Reading Test data in this project. We also aimed to improve the accuracy of the
summarizing, as well as question-answering capabilities of GPT-3 (0) via long text
In the realm of computer security, the importance of efficient and reliable user authentication methods has
become increasingly critical. This paper examines the potential of mouse movement dynamics as a
consistent metric for continuous authentication. By analysing user mouse movement patterns in two
contrasting gaming scenarios, "Team Fortress" and "Poly Bridge," we investigate the distinctive
behavioral patterns inherent in high-intensity and low-intensity UI interactions. The study extends beyond
conventional methodologies by employing a range of machine learning models. These models are carefully
selected to assess their effectiveness in capturing and interpreting the subtleties of user behavior as
reflected in their mouse movements. This multifaceted approach allows for a more nuanced and
comprehensive understanding of user interaction patterns. Our findings reveal that mouse movement
dynamics can serve as a reliable indicator for continuous user authentication. The diverse machine
learning models employed in this study demonstrate competent performance in user verification, marking
an improvement over previous methods used in this field. This research contributes to the ongoing efforts to
enhance computer security and highlights the potential of leveraging user behavior, specifically mouse
dynamics, in developing robust authentication systems.
Image segmentation and classification tasks in computer vision have proven to be highly effective using neural networks, specifically Convolutional Neural Networks (CNNs). These tasks have numerous
practical applications, such as in medical imaging, autonomous driving, and surveillance. CNNs are capable
of learning complex features directly from images and achieving outstanding performance across several
datasets. In this work, we have utilized three different datasets to investigate the efficacy of various preprocessing and classification techniques in accurssedately segmenting and classifying different structures
within the MRI and natural images. We have utilized both sample gradient and Canny Edge Detection
methods for pre-processing, and K-means clustering have been applied to segment the images. Image
augmentation improves the size and diversity of datasets for training the models for image classification.
This work highlights transfer learning’s effectiveness in image classification using CNNs and VGG 16 that
provides insights into the selection of pre-trained models and hyper parameters for optimal performance.
We have proposed a comprehensive approach for image segmentation and classification, incorporating preprocessing techniques, the K-means algorithm for segmentation, and employing deep learning models such
as CNN and VGG 16 for classification.
- The document presents 6 different models for defining foot size in Tunisia: 2 statistical models, 2 neural network models using unsupervised learning, and 2 models combining neural networks and fuzzy logic.
- The statistical models (SM and SHM) are based on applying statistical equations to morphological foot data.
- The neural network models (MSK and MHSK) use self-organizing Kohonen maps to cluster foot data and model full and half sizes.
- The fuzzy neural network models (MSFK and MHSFK) incorporate fuzzy logic into the neural network learning process to better account for uncertainty in foot sizes.
The security of Electric Vehicle (EV) charging has gained momentum after the increase in the EV adoption
in the past few years. Mobile applications have been integrated into EV charging systems that mainly use a
cloud-based platform to host their services and data. Like many complex systems, cloud systems are
susceptible to cyberattacks if proper measures are not taken by the organization to secure them. In this
paper, we explore the security of key components in the EV charging infrastructure, including the mobile
application and its cloud service. We conducted an experiment that initiated a Man in the Middle attack
between an EV app and its cloud services. Our results showed that it is possible to launch attacks against
the connected infrastructure by taking advantage of vulnerabilities that may have substantial economic and
operational ramifications on the EV charging ecosystem. We conclude by providing mitigation suggestions
and future research directions.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
Low power architecture of logic gates using adiabatic techniquesnooriasukmaningtyas
The growing significance of portable systems to limit power consumption in ultra-large-scale-integration chips of very high density, has recently led to rapid and inventive progresses in low-power design. The most effective technique is adiabatic logic circuit design in energy-efficient hardware. This paper presents two adiabatic approaches for the design of low power circuits, modified positive feedback adiabatic logic (modified PFAL) and the other is direct current diode based positive feedback adiabatic logic (DC-DB PFAL). Logic gates are the preliminary components in any digital circuit design. By improving the performance of basic gates, one can improvise the whole system performance. In this paper proposed circuit design of the low power architecture of OR/NOR, AND/NAND, and XOR/XNOR gates are presented using the said approaches and their results are analyzed for powerdissipation, delay, power-delay-product and rise time and compared with the other adiabatic techniques along with the conventional complementary metal oxide semiconductor (CMOS) designs reported in the literature. It has been found that the designs with DC-DB PFAL technique outperform with the percentage improvement of 65% for NOR gate and 7% for NAND gate and 34% for XNOR gate over the modified PFAL techniques at 10 MHz respectively.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
New techniques for characterising damage in rock slopes.pdf
Image Encryption Techniques Using Fractal Function : A Review
1. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 2, April 2017
DOI:10.5121/ijcsit.2017.9205 53
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL
FUNCTION: A REVIEW
Shafali Agarwal
1
Department of Computer Applications, JSS Academy of Technical Education, Noida,
India
ABSTRACT
An increasing demand of secure data transmission over internet leads to the challenge of implementing a
consistent cryptosystem. In 2004, USA navy published the patent which highlights the importance of fractal
as an encryption/decryption key in a cryptosystem [1]. Fractal possess butterfly effect i.e. sensitivity to
initial condition, due to which small change in input produces a major change in output. This paper
summarizes the various recent image encryption techniques in which fractal key is used to encrypt/decrypt
followed by substitution, scrambling and diffusion techniques to provide strong cryptosystem. The
algorithms covered both private key encryption as well as public key encryption technique in the paper. The
analysed algorithms include a set of fractal function such as Mandelbrot set, Julia set, Hilbert curve, 3D
fractal, multi-fractal, IFS and chaotic function to generate a complex key used in the encryption process.
Corresponding performance of each algorithm is analysed by PSNR test, key space, sensitivity analysis and
correlation coefficient value between the adjacent pixels of both images (Original image and encrypted
image) which shows significant improvement in performance over the traditional encryption methods.
KEYWORDS
Image Encryption, fractal, chaotic function, Scrambling, NIST test suite
1. INTRODUCTION
Now a days, a huge amount of data in terms of text, image, audio and video has to transmit over
the network. An image carries lot of information compared to text hence importance of secure
transmission of an image increases. Because of sensitivity of image data, enormous size, high
correlation among pixels of images and strong redundancy of uncompressed data traditional
encryption methods are not suitable to achieve strong level of security of transmitted data. The
requirement of such a system arises so that illegal acquisition, modification, alteration, copying
and unauthorized accessing can be prevent and data must be transferred with original contents. In
some systems, image transmission is an important tool to pass detailed information like medical
imaging, military communication, scientific observation, health care, multimedia, picture
messaging application on cell phone, biological data etc. An efficient, strong and reliable
encryption method is required to achieve a secure transmission of confidential data over the
network.
Image encryption is a technique used to convert original image into another image which is not
identifiable by unauthorized user [2, 3]. This is a method of transferring the information
embedded in a digital image to a non-recognizable form so that no one can access the data except
those having details of decryption method with key required to decrypt the data.
2. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 2, April 2017
54
An important tool in image encryption is scrambling deals with change in position of the pixels
and helps to minimize the correlation coefficient value[4]. If correlation coefficient between
original image and encrypted image is zero or near to zero, hacker will beunable to guess the
encryption method or key.Recently authors [5] used DNA sequences as a secret key and
implemented permutation process using Hao’s fractal representation. They also used diffusion
and scrambling to make the encryption process more secure and complicated. There are
remarkable methods available to achieve this such as steganography, water marking and
cryptography. The effectiveness of an image encryption algorithm can be analysed in terms of
parameters like histogram analysis, adjacent pixel correlation analysis, mean value analysis, key
space analysis, encryption speed and number of pixels change rate (NPCR) and unified average
changing intensity (UACI) tests. In the paper [6], authors conducted all the above given tests to
measure the security and performance issues of an image encryption algorithm using a key image
which is a binary image of same size as of original image (Introduction). This paper focuses on
reviewing cryptography methods using fractal & chaos to encrypt/decrypt the digital images.
2. PRELIMINARIES
2.1 Cryptography
Cryptography: The art of converting plain image into an unidentifiable cipher image is known as
cryptography. The basic terms used in cryptography [7]:
1. Plain image: An original Image which is to be transmitted from sender side to receiver
side over a network.
2. Cipher image: After applying an encryption technique, obtained coded image is known as
cipher image.
3. Encryption: A method used to transform a plain image to cipher image is known as
encryption.
4. Decryption: The process of restoring plain image from cipher image at receiver side is
known as decryption.
A cryptosystem uses two different keys to encrypt/decrypt the data known as public key and
private key. On the basis of these keys, cryptography can be categorized broadly in two
categories:
1. Private Key Cryptography: Private key/symmetric key encryption deals with the same
key used to encrypt and decrypt the data. At the time of transmission, sender uses the
secret/private key to encrypt the data. The encrypted data with secret key is then
transmitted to the receiver so that decryption process can executed using the shared secret
key at receiver side. In this cryptosystem shared key has to be transmitted from one
location to another required a secure transmission channel so that an unauthorised person
should not be able to access the key. Figure 1 represents the working of public key
cryptosystem.
This is the area in which researchers are doing continuous research to generate a secure
shared cryptographic key and a strong key transmission process to establish a highly
reliable and acceptable cryptosystem.
3. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 2, April 2017
55
Figure 1. Private Key Cryptosystem
2. Public Key Cryptography: Public key/asymmetric key encryption method was discovered
by R. Rivest, A. Shamir and L. Adieman in August 1977 issue of Scientific Americans
[8,9]. The idea of public key cryptography is to encrypt the image using public key of
receiver at sender side and transmit it to the receiver. On the other hand, receiver used its
private key to decrypt the cipher image and translate it in plain image. The entire working
of public key cryptosystem is depicted in figure 2.The technique ensures that cipher
image is originated using public key of owner of paired private key whereas at receiver
side, private key of that particular paired key is used to decrypt the data without
compromising the security of the system. Security lies in the fact that public key may be
used by anyone to encrypt the data and private key kept private to the owner of paired
key.
Figure2. Public Key Cryptosystem
Diffie Hellman established one of the earliest example of public key exchange protocol in the
field of cryptography [10]. In which key exchange notion established a secure channel between
sender and receiver so that both parties can exchange data over that network without having prior
knowledge of each other. With the help of exchanged data both sender and receiver produced
their private keys which is further used in encryption/decryption process.
2.2 Fractal in Cryptography
Fractals [11] are non-regular geometric shapes that have the same degree of non-regularity on all
scales. French mathematician Gaston Julia in 1918 investigated the iteration process of complex
function and attained a Julia set and gave a direction to the fractal world [12]. Later Benoit
Mandelbrot in 1979 studied a very complex & perturbed structure that is known as Mandelbrot
set [13]. Researchers have done incredible research to unveil the geometrical and functional
ambiguity of both the sets[14][15]. The definition of Mandelbrot set is given in [16] as “The
Mandelbrot set is the set of values of c in the complex plane for which the orbit of 0 under
iteration of the complex quadratic polynomial zn+1=zn
2
+c remains bounded”. Similarly Julia Set is
the set of points K whose orbits are bounded under the iteration is called the Julia set. We choose
the initial point 0, as 0 is the only critical point of the given function [17, 18].
Fractal images exhibits the randomness property, appropriate to design a secure and reliable
cryptosystem. Fractal based cryptosystem is designed using complex number rather than the
prime numbers, thus the generation of private key and public key is carried out using complex
numbers arithmetic. The chaotic nature of fractal leads to the sensitiveness of the key value
towards initial value, makes it difficult to produce accurate key by intruder. Additional advantage
4. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 2, April 2017
56
of using fractal as key is the key size which generally impact on the number of guesses that an
attacker would need to make in order to find the key e.g. brute force attack i.e. it determines the
feasibility of a collision attack. In previous traditional techniques, key size depends on the existed
prime numbers in the given range. In case of using the fractal key, the exchange key space
depends on size of the keys, which extend the key space, shrink the key size and make it more
complex [19].
A project was carried out in 2003 to encrypt a message with the help of random numbers and
Mandelbrot set fractal. At that time fractal was not so much popular in cryptography system.
Author succeed to encrypt the data but unable to decode the same. A perfect decoder required a
mapper so that no number came out twice [20].A new approach of encryption using fractal
geometry is discussed by the author in which a fractal is generated by using some initial
parameters and then use it to encrypt a predetermined length of message by using fractal orbits to
corresponding alphabet mapping [21].A novel Image encryption technique using single as well as
multi-fractal images is proposed in the paper [22]. The information about source image is hidden
in the complex structure of used fractal. The structure of the underlying system consists of three
main processing sub-blocks: key generator (depends on the selected fractal and shift values),
delay and multiplexing block. It has been noticed from the correlation result that to increase the
pixel confusion, a non-linear multiplexing with one bit delay is required. Sometimes encrypting
compressed images gives a reduced time outcome as well as good quality image reconstruction. A
stream cipher encryption algorithm implemented on a compressed image in which a fractal
dictionary encoding method is used in the image compression to achieve good quality image
reconstruction [23]. This is followed by a data pre-processing step before performing actual
encryption on the plain text. To introduce perturbation in the stream cipher, diffusion is realised
to a certain extent.
3. LITERATURE REVIEW OF FRACTAL BASED IMAGE ENCRYPTION
TECHNIQUES
In 2004, secretary of the navy of USA published the patent which shows the importance of fractal
as an encryption key in the encryption process [1]. A symmetric key encryption method is used to
encrypt/decrypt image data with the help of fractal key. In the whole process image data as well
as encryption key will be represented in the form of 2D matrix.
Process: The encryption procedure can be explained in two parts. One part is concerned with the
generation of fractal key whereas actual encryption of given image takes place in next step.
Key Generation Method:
1. Initially select a fractal and fractal key matrix size (square matrix) which must be aligned
with the data matrix.
2. Choose fractal initial condition such as starting location within fractal image, resolution,
bailout etc. to compute fractal.
3. Obtain a fractal image using fractal initial conditions, sampled it and then map it to
fractal key matrix.
4. Compute rank of matrix. If it is full rank then proceed otherwise reiterate it with different
fractal parameters.
Encryption/Decryption Method:
1. After generating fractal key, form a two dimensional matrix of buffered data which is to
be encrypted.
5. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 2, April 2017
57
2. Apply matrix multiplication between fractal key matrix and data matrix and obtain
encrypted data using function:
E=P*K (1)
Where P=the buffered data matrix (J*N);
K=the fractal key matrix (N*N);
E=the encrypted data matrix (J*N).
3. Transmit the encrypted data, encrypted data matrix dimension and fractal initialization
values to the receiver.
4. At the receiver end, receiver regenerate fractal key and its inverse fractal key matrix so
that it can be multiply with encrypted data matrix using function:
P=E*K-1
(2)
Where K-1
is the inverse fractal key matrix, such that P is the matrix of decrypted,
original, buffered data of dimension J*N.
Once the required data is decrypted, sometimes reformatting is essential to get the original data.
Performance Analysis
In the proposed method fractal is used as an encryption key, provides a more secure medium to
generate key. Author used 2D matrix multiplication operation to generate cipher data, mark it
widely acceptable for any kind of data i.e. text, image etc. which can be convertible into 2D
matrix form.
Key exchange is a method used in a public key cryptographic system, in which sender and
receiver exchanged secret key or few parameters over a public channel. In 2007, Alia and Samsud
in proposed a key exchange protocol utilized the intrinsic relationship between Mandelbrot set
and Julia set [24].
1. Authors used c and x as global variables and known to the public, e and n as private
variables for the sender and k and d as private variables for the receiver.
2. Using Mandelbrot set function system generated corresponding public keys for sender
( ) and receiver ( d).
3. These public keys are then exchanged between both parties.
4. Private keys are produced with the help of information retained on the respective side
itself and received other’s public key ( ) and ( d) using Julia function.
5. As a resultant, private keys ( ) e and ( ) d are generated on both sides. So security
lies in the fact that no need to transmit private keys over the network.
At sender side,
Mandelfn: = c*f( )
f( )= *c*e, =c (3)
Juliafn: = c*f( )
f( )= *e, =( d) (4)
Similarly both functions will work for receiver side also.
Performance Analysis
Key size plays an important role to prevent brute force attack. If we consider 128 bits size key,
Diffie- Hellman protocol depends on the number of primes existed in 2128
possible key values
whereas key space in fractal key exchange protocol based on the size of the key.
6. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 2, April 2017
58
Authors utilized the same concept of key exchange between the sender and receiver and
generated private key secretly. Following this process by creating cipher text at sender side using
Juliafn with input parametersk and d. After receiving cipher text, receiver also used the same
Juliafn with input parameter n and e and decrypt the message to the original [25].
Performance Analysis
A detailed comparative analysis is carried out by the authors to depict the importance of recent
fractal based cryptosystem over traditional RSA based cryptosystem. The proposed algorithm is
better resulted in terms of key generation time and execution time (encryption as well as
decryption).
The proposed cryptosystem used key based on fractal image to encrypt the plain image in the
paper [26]. The main advantage to use fractal key is its small key storage requirement and
robustness to the attack.
Encryption and Decryption Process:
1. Fractal image is converted into three matrices representing R, G & B layers of pixels of
the image.
2. Fractal key is generated using the given equation-
= ( , , , ) ∗ ,
(5)
3. To calculate it, grid of coloured pixels is constructed with spacing δ.
4. Now for each grey pixel, add all the pixels from the grid with let suppose δ = 4.
5. Identify one black pixel with appropriate weight and calculate distance between black
pixel and each of the grey pixel.
6. The distance value would be different for each pixel, hence a stronger key will be
generated.
7. Repeat the process for all three layers of the image to be encoded.
8. Perform encryption of plain image with the generated fractal key using given equation:
e’ij= (eij+d’ij)mod 256 (6)
9. In decryption process, first key is generated using fractal parameters and then reverse the
modulo operation to get decrypted image:
eij= (e’ij–d’ij)mod 256 (7)
Performance Analysis
In the proposed method, δ must be chosen wisely so that algorithm could lead to a secure
encrypted image. It must not be so close as well as not extremely large (such as size of an image).
Author also performed PSNR test in the interval δ ∈ {20, 120] to test the efficiency of the
proposed cryptosystem and concluded that the improved result are possible for δ = 1023.
A new cryptographic system based on fractal generated by IFS transformation proposed by the
author in 2009 [27]. To increase the security of the given system, double enciphering and
deciphering method was applied to the data. The main purpose to fractal based image coder is to
utilize self-similar property of the IFS. In this way, determine a subset of the whole image and
approximate it using contractive affine transformation to the object.
7. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 2, April 2017
59
Encryption Process
1. At first level of enciphering, author assumes the total number of chosen characters n=29.
2. Divide complete message into the length of three m=3 represented by pipi+1pi+2.
3. Calculate numeric value of each unit using pin2
+pi+1n+pi+2 (first level of enciphering code
in integer value).
Note: In the given method, sender and receiver must be agreed upon the classical encryption
method as well as order of affine IFS maps.
Fractal based on IFS can be used as a secret key to encrypt the p unit data of length m at a time in
n letter alphabet if fGCD(D,nm)= 1, where D= determinant of m*m matrix.
To perform next level enciphering, first specify the encryption key which is the set of contractive
affine transformation B(X)=AX+b, depends on the arrangement of the elements in IFS invertible
map. Apply random iterated algorithm to generate attractor A that is nothing a representation of
unique fixed point of contractive form of B.
Decryption Process:
After receiving attractor A by receiver, It works on range block (Rb) refers to a big block of an
image and domain block (Db) which was generated by partitioning an image into non-overlapping
block of fixed size. The objective of deciphering algorithm is to express Rb as a set of
transformation to be applied on a particular Db. Ultimately find out affine IFS transformation B
using inverse problem. At last perform algebraic calculation to find the values of p1, p2 and p3 and
combine the result to frame the actual message.
Performance Analysis
The possibility of high security enhanced with the proposed IFS fractal based encryption
techniques. The complex visual property hides maximum amount of data in an image without
degrading the quality of it.
The paper is designed to implement asymmetric cryptographic approach to encrypt digital
Images. Author utilized the complex mathematical structure and deterministic nature of fractal to
propose a new public key cryptosystem based on IFS [28]. The paper is explained mainly in three
parts:
• Key Generation
• Encryption
• Decryption
In key generation process, take matrix H, g and p (prime numbers) variables, which are known to
the public. In first step generate numbers (x, y, s) and (x’, y’, r) as receiver and sender private
keys. Now calculate Fs=gs
(mod p) and Fr = gr
(mod p) and exchange between sender and receiver
as public key. After receiving Fr, a shared private key n=(Fs)r
(mod p) is generated by receiver,
used as a number of iterations in generating fractal attractor Wn
.
At last receiver and sender calculate their public keys (u, v, 1) =Wn
(x, y, 1) and (u’, v’, 1)=Wn
(x’,
y’, 1) with the help of Wn
and exchanged it.
In encryption process, sender uses its fractal attractor Wn
and its private key (x’, y’) to encrypt the
given text sent to the receiver.
8. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 2, April 2017
60
To decrypt, receiver receives cipher text and uses his private key (x, y) and fractal attractor Wn
to
recover the text from the cipher text.
Performance Analysis
Authors proposed and analysed the fractal based cryptosystem using RSA system. According to
study, the proposed system is more efficient in terms of key generation time, key space and time
required for encryption as well as decryption [29].
Mandelbrot set is one of the complex fractal with infinite boundaries. Author utilized the
randomness of Mandelbrot set and generated encryption key using Mandelbrot set and Hilbert
curve transformation [30].
Process started with the formation of three matrices of each layer of a colour image i.e. red, green
and blue. The value range of each pixel in matrix is [0, 255].
The used encryption function is:-
T(x, y) = (O(x, y)+ k(x, y)) mod 256 (8)
Here T represents the image after encryption and k represents encryption key.
To generate an encryption key, apply Hilbert curve transformation to the Mandelbrot set, which
makes key more secure and sensitive. Authors calculated interval distance ‘r’ from one point to
another in the matrix and then checked the distance between points H(xn,yn) and i(x, y). If the
distance value is multiple of ‘r’, then the value of H(xn,yn) is multiplied by the real distance. The
equations are-
∀ ' ∈ ( )*, + )*, , )* ∃'.,*: ∀0 ∈ 11, 2], ∀ 3 ∈ 11, 2]
K(x,y)= ∑ 5(0 , 3 ) ∗ (5, )
6
7
Where p =(n*n)/r, d(H,i) = 8(0 − 0): ∗ (3 − 3):
(9)
Where n represents number of columns = number of rows (assuming matrix size n*n)
Performance Analysis
In this paper, a comparative performance analysis is carried out with the paper proposed by
Rozouvan[26].
The range of interval distance r in current experiment is [1, 65025], whereas in paper [26], it was
[0, 254]. PSNR value rapidly increases when r crossed its critical value. In the experiment
implemented by Rozouvan, the critical value of r was 150, whereas Yuan-Yuan Sun et al.
achieved a remarkable improvement in the critical value of interval distance r i.e. 40,000.
Author proposed a cryptosystem based on hash algorithm MD5 and fractal [31]. This system is
suitable to encrypt/decrypt text file, image file and audio file.
Encryption Process:
1. Author starts the encryption process by guessing a variable length key.
2. Selected key is used to generate 128 bits message digest using MD5 hash algorithm (one
way hash function).
9. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 2, April 2017
61
3. This message digest worked as a seed to generate a fractal using Julia set algorithm.
4. At last generated fractal will be used as chaos to encrypt the given data through XOR
operation on each block of data.
Decryption Process
1. In decryption process, selected key is transmitted to the receiver end with encrypted data.
2. Evaluate message digest using the hash algorithm i.e. MD5.
3. Generate fractal using message digest as a seed in Julia set algorithm.
4. Perform XOR operation with the cipher file to get back the original data file.
Performance Analysis
Author utilized the usual feature i.e. sensitive to initial condition and pseudo randomness of
fractal images. They also performed signal to noise ratio test and concluded that higher the cipher
text value gives better confusion to crack the code.
Author proposed a method to improve the performance of DES algorithm by using 3D fractal
images as a key [32]. The method works according to the following steps-
1. Author selected a colour fractal image and used diamond square algorithm to take
midpoint depends on points in four directions and then apply Brownian self-similarity
method to increase randomness by adding some random number to the average of these
four points.
2. Convert this 2D image into 3D image to increase key space so that choice of control
points makes counterfeit impossible and make the key more differentiable and random.
3. Clip as many different keys from the resultant image as you want.
4. Split to be encrypted plaintext according to the length of key.
5. Convert plaintext into binary representation.
6. Each individual key clipped from the 3D image encrypted the plaintext segment using
DES algorithm and generated cipher text.
7. At the receiver end, fractal parameters were passed and generated the same secret key to
decrypt the data.
Performance Analysis
With the Introduction of fractal in the key generation, a modified DES is applied to the system,
resulting high randomness and more secure cryptosystem is achieved.
Author utilized the Infiniteness and chaotic behaviour of Julia set and complex structure of
Hilbert curve to implement the cryptosystem [4]. The complete process is described as follows:
Encryption Process
The security of the proposed cryptosystem lies in the fact that the final cipher image is generated
in two steps:
1. Apply escape time algorithm to generate Julia set image
2. Use boundary of the Julia set image because it is observed that tiny perturbation can
cause drastic change in Julia Image at the boundary.
3. Convert image into two dimensional array in the form of R, G and B matrix.
10. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 2, April 2017
62
4. Scramble each matrix with Hilbert curve to a key image matrix using scramble function
as:
bi & ai, i=1, 3, 5, 7
ai = (10)
ci & ai, i=0, 2, 4, 6
5. Encrypt plain Image with scrambled image using modulo operation:
e’ij= (eij+dij)mod l (11)
Where eij – pixel value of (i, j) coordinate of plain image
dij - pixel value of (i, j) coordinate of scrambled image
l – length of used colours in image i.e. 256
6. Apply diffusion to temporary cipher image using following function:
qi = (pi+ pi+1+ qi-1)mod l (12)
Where qi and qi-1 are pixel values in the cipher Image, pi&pi+1 are the pixel values in the
temporary cipher Image. Finally obtain encrypted image which is to be transmitted to the receiver
side.
Decryption Process
1. At receiver side, same key will be use to decrypt the received cipher image. Decryption
process is just opposite of the encryption method. The procedure starts with the diffusion
using the equation:
Pi = (qi–pi+1-qi-1)mod l (13)
2. In next step, modulo operation decryption takes place with the help of following
equation:
eij = (e’ij–dij) mod l (14)
3. At last unscramble the matrices to obtain the plain image.
Performance Analysis
In the paper, authors obtained cipher image by applying Hilbert scrambling and diffusion process
which makes the proposed cryptography more secure in terms of key sensitivity, chosen plain
image attack and entropy attack. Even the given system passed sp800-22 test suit and proved the
randomness of obtained cipher image.
The authors have used the strong connection between Mandelbrot set and Julia set to create a
shared private key on sender as well as receiver side. The proposed algorithm focused on superior
Mandelbrot set and superior Julia set to obtain a highly secure and complex cryptosystem [33].
1. Authors used c as global variables and known to the public, e and n as private variables
for the sender and k and d as private variables for the receiver.
2. Using Superior Mandelbrot set function supMS system generated corresponding public
keys for sender ( ) and receiver ( d).
3. These public keys are then exchanged between both parties.
4. Private keys are produced with the help of information retained on the respective side
itself and received other’s public key ( ) and ( d) using Superior Julia set function
supJS.
11. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 2, April 2017
63
5. As a resultant, private keys ( ) e and ( ) d are generated on both sides which do
not need to transfer over the network.
At sender side,
supMS: ( ) * *
n n
f z z c e
= ; c, z Є Z and 0
z c
=
1 * ( ) (1 )*
n n n
z s f z s z
+ = + − (15)
supJS: ( ) * *
n n
f z z c e
= ; c, z Є Z and 0 n
z z e
= (at receiver side)
( ) * *
n n
f z z c e
= ; c, z Є Z and 0 k
z z d
= (at sender side) (16)
Equation (17) is common to both sides:
1 * ( ) (1 )*
n n n
z s f z s z
+ = + − (17)
Note: Superior Mandelbrot set and superior Julia set are obtained by applying Mann iteration to
the Mandelbrot set and Julia set function respectively [34].
Performance Analysis
The given algorithm also utilized the property of fractal in terms of randomness, highly sensitive
to initial condition and key size. The use of fractal as an encryption/decryption key provides a
wide range of available keys as compared to traditional Diffie-Hellman algorithm [10].
Authors have applied wavelet transform, fractal based encryption key and substitution of pixels
through chaos function to design a cryptosystem used in social networking [35]. The advantages
of wavelet transform to reduce the image size, consequently minimized the calculation time of
proposed method as well. The complexity of the system is enhanced by applying two levels of
encryption using fractal and chaos function.
Encryption and Decryption Process
1. The process starts with the image size reduction by approximately one quarter using
“Haar” wavelet transform method.
2. Derive three matrices having data corresponding to rounded absolute value, decimal
digits and sign value of resultant image respectively.
3. Initially apply encryption method expounded by Rojouvan in [26] to achieve first level of
encryption of the extracted image.
4. In next step, chaotic function is used to obtain final encrypted image in two parts:
• The replacement of rows and columns take place using a logistic function:
xn+1=4xn(1-xn) (18)
The given process repeated until a new x0 is obtained such that the following equation
satisfied:
l=mod(x0* 104
, M) (19)
Where M denotes the number of rows or columns of an image matrix and l must be a
distinct value and lies in the range [0, M-1].
• In second step of encryption process, Chan chaotic sequence is generated. After
processing image pixels with Chan chaotic sequence, an encrypted image is
obtained which has to be transmitted over the network.
12. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 2, April 2017
64
5. After receiving encrypted image, receiver apply XOR operation to decrypt the image
using chaotic function.
6. Use fractal key to decrypt the image derived from previous step followed by using
inverse of Haar wavelet transform function to execute final decryption step.
7. As a resultant decrypt original image obtained after executing steps 5 and 6.
Performance Analysis
The strength of proposed encryption algorithm tested using PSNR test, which indicates smaller
the value of special parameter δ, gets the lower PSNR value results stronger encryption method.
Next parameter to evaluate the strength of algorithm is the correlation between adjacent pixels of
original image and encrypted image which may help hacker to decrypt the image. A test driven on
both images and concluded that the correlation between original image pixels and encrypted
image pixels is nearly to zero so no explicit relation exists between these two images. A well-
known advantage of using fractal as encryption key is sensitiveness to its initial condition protects
hacking of encryption key.
In a symmetric key encryption, host system has to transmit secret key through the communication
channel, which is insecure and can be prone to hack by unauthorized user even though it is
encrypted. To avoid exchange of key, author proposed a model to generate a real time
encryption/decryption keys using quaternion Julia fractal image [36]. The various steps used in
the given system are:
Initially host system established a connection with the receiver using SSL protocol.At the time of
connection establishment, few parameters were initialized such as z, c&t=1.
At the transmitter side:
1. Construct a 3D plane inside a cube and compute Julia set for the parameter.
2. Checked intersection points of Julia set and the 3D plane.
3. Used curve fitting techniques to prepare curves and their corresponding polynomial
equations.
4. Either choose block data or stream data to encrypt for time t.
5. Perform encryption of data with the pseudo random values from the prepared curve.
6. Transmit the encrypted data.
7. Set t = t+1
Further initialize z, n&c for new timestamp value, which is also used to check authenticity of the
transmitting host. One important feature of this method is the use of AES symmetric encryption
method but with different keys from the real time symmetric key generator for each block of data
to be transmitted.
At the receiver end:
Receiver send either positive acknowledgement or negative acknowledgement to the transmitter
based on the following fact that if receiving host is able to decrypt the encrypted data
successfully, it sends positive acknowledgement to the transmitter. On successful completion of
process, both host simultaneously update their time stamp by adding the number of iteration used
in the last Julia set. In case of failure, a negative acknowledgement sent to the transmitter. Once
response is received by transmitting host, a new session starts with updated timestamp.
Performance Analysis
Fractal images exhibit a complex mathematical structure and show chaotic behaviour. Due to
which an infinite number of quaternion Julia set images can be generated within the given time
13. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 2, April 2017
65
interval, make it impossible to identify parameters from the image.Three degree of randomness of
symmetric key make it difficult to cryptanalysis and key prediction. Julia image intersect 3D
plane at a random angle resulting in entirely different point of intersection. Also author verified
that the proposed method proves all cryptography properties i.e. confidentiality, authenticity,
integrity and non-repudiation.
A symmetric key stream cryptography algorithm is proposed by the authors in which cipher
image incorporates both logistic chaotic map and Tent map [37]. The main feature lies in the use
of secret key derived from the biometric images. The compete method can be described into three
steps: key generation from biometric image, encryption and decryption. The detail is as:
Key Generation
1. Consider a biometric image BI in a matrix form r*c.
2. Merge pixel values horizontally using function-
+;( , ) = +;( , ) ⊕ Ψ, 1 ≤ i ≤ r & 1 ≤ ≤ B
3. Divide the resultant matrix into h*h blocks and calculate the rounded mean value of each
block (M).
4. Calculate the median value of main diagonal of each block (N).
5. Obtain secret key after performing BitXoringM and N.
Encryption Process
1. Convert source image to 1D pixel vector and encrypt pixel by pixel to its corresponding
cipher pixel.
2. The used encryption function is-
C7 = D(E7 ⊕ C7 ) ≫> HI2 J10K ∗ LMNOP
QRS TUV
O
WX YH 256
Where rounds are calculated using the function-
HI2 O = M]O ^RT _:` + C7 PYH 256
3. Repeat the above step for all pixels and then convert cipher pixels into 2D array to get
decrypt image.
Decryption Process
1. At receiver side, same biometric image is used to derive the same secret key used to
encrypt the image.
2. Perform all encryption function in reverse to obtain actual source image.
Performance Analysis
Author used somewhat a different way to derive a secret key from a biometric image and
performed NIST statistical tests to confirm the randomness of generated key. The cipher image
14. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 2, April 2017
66
relies on the secret key, previous pixel’s encryption information and used logistic chaotic map or
Tent map. Authors also carried out the security and performance analysis of given algorithm
using histogram analysis, adjacent pixel correlation analysis, Information entropy analysis and
key sensitivity analysis.
A highly complex and secure algorithm is proposed by the authors which used Haar wavelet to
achieve lossless reconstructionafter transforming the image from time domain to wavelet domain
[38]. An additional complexity is introduced by the use of multi chaotic mapping which is
obtained after combing all three sub-chaos matrices. The process is:
Encryption and Decryption Process:
1. The process starts with the execution of DWT on the source image and then recombine all four
coefficient matrices to obtain scrambled matrix.
2. A secret key is obtained by combining all three subchaotic matrices generated with the help of
few initial parameters.
3. Perform BitXOR operation between scrambled image and multichaotic matrix and got an
encrypted image.
4. Perform all operation in reverse order to get the original decrypted image.
Performance Analysis
Author executed many statistical analysis tests and compared the performance with the existing
algorithms. The results showed that the proposed algorithm has better NPCR and UACI values
than the previous one. Further analysis proves that the given method has high range key space,
high key sensitive and ability to resist attacks.
The authors derived encryption key from the chaotic function such as logistic mapping and
Hannon mapping [39]. The detailed process is as:
Encryption and Decryption Process:
1. Select an input image to be encrypted.
2. Construct two chaotic sequences using logistic mapping and arranged them in ascending
order.
3. Rearrange the pixel positions in original image to increase the complexity.
4. Extract pixel position from the fractal key using Hannon map.
5. Perform XOR operation between the pixel values of fractal key and original image and
get the encrypted image.
6. At receiver side, just execute all operations in reverse order to obtain the source image.
Performance Analysis
Author utilized the random behaviour and sensitiveness of chaotic system to obtained a secure
cryptosystem. The analysis report of many statistical tests (histogram analysis, key space analysis,
information entropy and correlation coefficient analysis) proved it a suitable cryptosystem for real
world applications.
4. CONCLUSION
The paper examined numerous essential and used widely image encryption algorithms using
different fractal function such as Mandelbrot set, Julia set, IFS and Quaternion Julia set. The main
16. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 2, April 2017
68
[22] Abd-El-Hafiz1 S. K., Radwan A. G.Haleem S. H. A., Barakat M. L., 2014 “A fractal-based image
encryption system”IET Image Processing, Vol. 8, Issue 12, pp. 742–752 doi:10.1049/iet-
ipr.2013.0570
[23] Sun YY, Xu R., Chen L., Hu X., 2014 “Image Compression and Encryption Scheme Using Fractal
Dictionary and Julia Set”, IET Image Processing, Vol. 9, Issue. 3, pp. 173–183 doi:10.1049/iet-
ipr.2014.0224
[24] Alia, M. A. and Samsudin A. B., 2007 “New Key Exchange Protocol Based on Mandelbrot and Julia
Fractal Sets”, International Journal of Computer Science and Network Security, VOL.7 No.2, pp 302-
307.
[25] Alia, M. A. and Samsudin A. B., 2007“A new public-key cryptosystem based on mandelbrot and julia
fractal sets”. Asian Journal of Information Technology, 6(5): pp 567-575.
[26] Rozouvan V., 2009 “Modulo image encryption with fractal keys”, Optics and Lasers in Engineering,
47(1), pp.1-6.
[27] Nadia M. G. AL-Saidi and Said M. R. M., 2009“A New Approach in Cryptographic Systems Using
Fractal Image Coding”, Journal of Mathematics and Statistics, 5 (3):ISSN 1549-3644, pp183-189.
[28] Nadia M. G. AL-Saidi and Said M. R. M., 2010 “A New Public Key Cryptosystem Based on IFS”,
International Journal of Cryptology Research, 2(1): pp 1-13.
[29] Nadia M. G. AL-Saidi and Said M. R. M., et al., 2011“Efficiency Analysis for Public Key Systems
Based on Fractal Functions”, Journal of Computer Science, 7 (4): pp 526-532, ISSN 1549-3636.
[30] Sun YY, Kong RQ, Wang XY,et al.,2010 “An Image Encryption Algorithm Utilizing Mandelbrot
Set”. International Workshop on Chaos-Fractal Theories and Applications, pp170–173.
[31] Shaw J., Saha O., Chaudhuri A.,2012 “An Approach for Secured Transmission of Data using Fractal
based Chaos” IJCA Proceedings on National Conference on Communication Technologies & its
impact on Next Generation Computing, CTNGC(4): pp 13-17.
[32] Hala B. Wahab A., Sarab S. A., 2013 “Modify Symmetric Block Cipher Algorithm Using Generated
Digital 3D Fractal Image”, Iraqi Journal of Science, Vol 54, No.4, pp: 955-964.
[33] Negi A., Agarwal S., 2014 “A Key Agreement Protocol Based on Superior Fractal Sets”, Journal of
Mathematical and Computational Science, Vol 4, No 2, pp 471-478, ISSN: 1927-5307.
[34] Mann W. R., 1953“Mean value methods in iterations”, Proc. Amer. Math. Soc., 4, pp 506-510.
[35] Sattari S., Akkasi A., Lari R. A., et al., 2015“Cryptography in social networks using wavelet
transform, fractals and chaotic functions”, International Research Journal of Applied and Basic
Sciences, Science Explorer Publications, ISSN 2251-838X / Vol, 9 (9): 1627-1635.
[36] Feasibility Study on Random Number Generators for Symmetric Key Cryptography, Chapter 6, pp
156-204.
[37] Ali M. Meligy, HossamDiab, Marwa S. El-Danaf,2016“Chaos Encryption Algorithm using Key
Generation from Biometric Images”, International Journal of Computer Applications (0975 – 8887)
Volume 149 – No.11.
[38] Wang W., Tan H., Pang Y., Li Z., Ran P. and Wu J.,2016 “A Novel Encryption Algorithm Based on
DWT and Multichaos Mapping”, Hindawi Publishing Corporation Journal of Sensors Volume Article
ID 2646205, 7 pages,http://dx.doi.org/10.1155/2016/2646205.
[39] Kashanian H., Davoudi M. and Khorramfar H., 2016 “Image Encryption using chaos functions and
fractal key”, International Journal of Advanced Biotechnology and Research (IJBR) ISSN 0976-2612,
Online ISSN 2278–599X, Vol-7, Special Issue-Number4, pp1075-1082.
AUTHOR
Shafali Agarwal has received MCA degree from UPTU, Lucknow in 2004 and M.Phil in
Computer Science from Alagappa University, Karaikudi, Tamil Nadu in 2013. She got her
Ph.D. in Computer Science from Singhania University, India in 2014. She has served as a
faculty member in department of Computer Applications in JSSATE, Noida till June,
2016. She has published more than 10 research papers in various International journals and
conferences indexed in springer, ACM, Scopus, Thomson Reuters, google scholar and in many more. Her
research interest includes fractal, cryptography and image processing.