In this project we have implemented the modified JS algorithm and later compared it with other similar functioning algorithms such as AES, DES and Jumbling Salting Algorithm.
Also we have done this by using a throughput value that is considered as measure for comparing the effectiveness of these algorithms. Basically the throughput value indicates the number of Megabytes of image encrypted with respect to time taken to encrypt the image.
Data Link Layer, Error correction and detection like LRC, VRC, CRC, checksum and Hamming coding, Data link protocols, stop and wait ARQ, sliding window ARQ, Petrinet models, HDLC, etc
Web Vulnerability Scanner project ReportVikas Kumar
Online Web Scanner And Admin Finder is a web application vulnerability scanner. It is a web application written in PHP/MYSQL and can be used to test remote, or local, web applications for security vulnerabilities.
Data Link Layer, Error correction and detection like LRC, VRC, CRC, checksum and Hamming coding, Data link protocols, stop and wait ARQ, sliding window ARQ, Petrinet models, HDLC, etc
Web Vulnerability Scanner project ReportVikas Kumar
Online Web Scanner And Admin Finder is a web application vulnerability scanner. It is a web application written in PHP/MYSQL and can be used to test remote, or local, web applications for security vulnerabilities.
BPSC Previous Year Question for Assistant Programmer, Assistant Maintenance Engineer, Assistant Network Engineer by Stack IT job Solution
Book : Stack IT job Solution (A pattern Based IT job solution)
বুয়েট, কুয়েট, রুয়েট, ডুয়েট, পিএসসি, টেলিকম, আইবিএ, এমআইএস
সহ যেকোন প্যার্টানে জব প্রস্তুতির একমাত্র বই।
Order Link: https://stackvaly.com/product/stack-it-job-solution-p3qxo
WhatsApp: 01789741518
Topics covered are Introduction, What’s Inside a Router?, The Internet Protocol (IP): Forwarding and Addressing in the Internet
Routing Algorithms,Routing in the Internet, Broadcast and Multicast Routing
This upload consists of Ph.D dissertation defense slides of the research topic "Efficient VLSI Architectures for Image Enhancement Techniques" of Visvesvaraya Technological University, Belgaum, Karnataka, India.
For suggestions & comments mail me at :
mchanumantharaju@gmail.com
hanu2005@yahoo.com
or contact me at : 9742290764
Extended Visual Cryptography Using WatermarkingShivam Singh
Basically watermarking is used as a secret information to share, which is added with strong encryption and decryption technique using visual cryptography
BPSC Previous Year Question for Assistant Programmer, Assistant Maintenance Engineer, Assistant Network Engineer by Stack IT job Solution
Book : Stack IT job Solution (A pattern Based IT job solution)
বুয়েট, কুয়েট, রুয়েট, ডুয়েট, পিএসসি, টেলিকম, আইবিএ, এমআইএস
সহ যেকোন প্যার্টানে জব প্রস্তুতির একমাত্র বই।
Order Link: https://stackvaly.com/product/stack-it-job-solution-p3qxo
WhatsApp: 01789741518
Topics covered are Introduction, What’s Inside a Router?, The Internet Protocol (IP): Forwarding and Addressing in the Internet
Routing Algorithms,Routing in the Internet, Broadcast and Multicast Routing
This upload consists of Ph.D dissertation defense slides of the research topic "Efficient VLSI Architectures for Image Enhancement Techniques" of Visvesvaraya Technological University, Belgaum, Karnataka, India.
For suggestions & comments mail me at :
mchanumantharaju@gmail.com
hanu2005@yahoo.com
or contact me at : 9742290764
Extended Visual Cryptography Using WatermarkingShivam Singh
Basically watermarking is used as a secret information to share, which is added with strong encryption and decryption technique using visual cryptography
Visual Cryptography Industrial Training ReportMohit Kumar
A visual cryptography scheme (VCS) is a kind of secret sharing scheme which allows the encoding of a secret image into shares distributed to participants. The beauty of such a scheme is that a set of qualified participants is able to recover the secret image without any cryptographic knowledge and computation devices. An extended visual cryptography scheme (EVCS) is a kind of VCS which consists of meaningful shares (compared to the random shares of traditional VCS).
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
An improved color image encryption algorithm with pixel permutation and bit s...eSAT Journals
Abstract Today the transmission of multimedia data including image and video is growing in telecommunications. Security is one of the main issues in transferring such sensitive information. Powerful image encryption algorithm is the solution for this problem. This paper is an implementation of a color image encryption algorithm based on Rubik’s cube technique. The Rubik’s cube technique is used for pixel permutation and a bit substitution method based on DNA sequences are used to change the value of each pixel on the image. Then the time-stamp is appended with encrypted image, which can be used to identify the replay attack. For evaluating the performance of the algorithm a series of tests are performed. These tests include information entropy analysis, correlation analysis, analysis of NPCR and UACI values etc. Index Terms: Cryptography, encryption, decryption, timestamp, replay attack, plaintext, cipher-text, algorithm, chaos.
Unified Approach With Neural Network for Authentication, Security and Compres...CSCJournals
The Present demands of scientific and social life forced image processing based applications to have a tremendous growth. This growth at the same time has given numbers of challenges to researcher to meet the desired objectives of either users or from solution perspectives. Among the various challenges, the most dominating areas are: reduction in required memory spaces for storage or taken transmission time from one location to other, protection of image contents to maintain the privacy and to facilitate the mechanism to identify the malicious modification if there is any either in storage or in transmission channel. Even though there are number of methods proposed by various researchers and are existed as solutions, questions are remain open in terms of quality, cost and complexity. In this paper we have proposed the concept based on neural network to achieve the quality of compression, protection and authentication all together using the ability of universal approximation by learning, one way property and one to one mapping characteristics correspondingly. With the proposed methods not only we can authenticate the image but also positions of malicious activity given in the image can be located with high precision. Proposed methods are very efficient in performance as well as carry the features of simplicity and cost effectiveness.
The main aim of this project is to control the cyber crimes. Cyber security incidents will cause significant financial and reputation impacts. In order to detect malicious activities, the SIEM (Security Information and Event Management) system is built. If any pre-defined use case is triggered, SOC analysts will generate OTRS in real time. So that user will be aware of threats
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMijistjournal
The rapid advancement of internet has made it easier to send the data/image accurate and faster to the destination. But thisadvantage is also accompanied with the disadvantage of modifying and misusing the valuable information through intercepting or hacking.So In order to transfer the data/image to the intended user at destination without anyalterations or modifications, there are many approaches like Cryptography, Watermarking and Steganography. This paper presents the general overview of image watermarking and different security issues. In this paper, Image Watermarking using Least Significant Bit (LSB) algorithm has been used for embedding the message/logo into the image. This work has been implemented through MATLAB.
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMijistjournal
The rapid advancement of internet has made it easier to send the data/image accurate and faster to the destination. But thisadvantage is also accompanied with the disadvantage of modifying and misusing the valuable information through intercepting or hacking.So In order to transfer the data/image to the intended user at destination without anyalterations or modifications, there are many approaches like Cryptography, Watermarking and Steganography. This paper presents the general overview of image watermarking and different security issues. In this paper, Image Watermarking using Least Significant Bit (LSB) algorithm has been used for embedding the message/logo into the image. This work has been implemented through MATLAB.
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...IJCSEA Journal
Using passwords only has rapidly become a security risk. Another approach to security is visual
cryptography (VC), which divides paper documents into several encrypted papers managed by multiple
people. Decryption occurs by stacking these papers, i.e., they cannot be decrypted individually. In our
work, we consider a system for decrypting text encrypted by VC on digital devices. Furthermore, we
propose a method for automatically recognizing encrypted portions using images captured by a digital
device's camera. Our system has several advantages, including no actual text in communication and
enabling users to use different passwords or secret questions at each use. Furthermore, our method is
implementable on wearable glasses-like devices, thus enabling wearers to decrypt text simply by looking at
encrypted portions. We conducted experiments regarding recognition accuracy and performance and
obtained results showing that our proposed method was able to achieve a high recognition rate at a low
cost.
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...IJCSEA Journal
Using passwords only has rapidly become a security risk. Another approach to security is visual cryptography (VC), which divides paper documents into several encrypted papers managed by multiple people. Decryption occurs by stacking these papers, i.e., they cannot be decrypted individually. In our work, we consider a system for decrypting text encrypted by VC on digital devices. Furthermore, we propose a method for automatically recognizing encrypted portions using images captured by a digital device's camera. Our system has several advantages, including no actual text in communication and enabling users to use different passwords or secret questions at each use. Furthermore, our method is implementable on wearable glasses-like devices, thus enabling wearers to decrypt text simply by looking at encrypted portions. We conducted experiments regarding recognition accuracy and performance and obtained results showing that our proposed method was able to achieve a high recognition rate at a low cost.
Millions of active users all around the world are using online social network such as Facebook, Twitter, Tumblr and
LinkedIn. Most of the social networks have weak user to user authentication method, which is based on some basic information like
name, images etc. These weaknesses make it easier to misuse user’s information and do identity cloning attack to form fake profile.
This paper presents a classification and analysis of a detection mechanisms of clone attacks on social network, based on attribute
similarity, friend network similarity, and profile analysis for a time interval and record of Internet Protocol sequences. In this project we
have proposed discrete wavelet transform algorithm for data hiding. For watermarking technique Java static watermarking systems and
algorithms is been used.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
Andreas Schleicher presents at the OECD webinar ‘Digital devices in schools: detrimental distraction or secret to success?’ on 27 May 2024. The presentation was based on findings from PISA 2022 results and the webinar helped launch the PISA in Focus ‘Managing screen time: How to protect and equip students against distraction’ https://www.oecd-ilibrary.org/education/managing-screen-time_7c225af4-en and the OECD Education Policy Perspective ‘Students, digital devices and success’ can be found here - https://oe.cd/il/5yV
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Instructions for Submissions thorugh G- Classroom.pptx
Image encryption using jumbling salting
1. Image Encryption Using Jumbling Salting
Submitted in partial fulfillment of the requirements
Of the degree of
B. E. Computer Engineering
By
SUMEET S. VERMA PID:172115
SWAPNIL S. SONTAKKE PID:172117
YASH S. SOLANKI PID:172128
SURAJ R. MAURYA PID: 182262
Supervisor(s):
MS. PRADNYA RANE
Assistant Professor
Department of Computer Engineering
St. Francis Institute of Technology
(Engineering College)
University of Mumbai
2020-2021
2.
3. Image Encryption Using Jumbling Salting
Submitted in partial fulfillment of the requirements
Of the degree of
B. E. Computer Engineering
By
SUMEET S. VERMA PID:172115
SWAPNIL S. SONTAKKE PID:172117
YASH S. SOLANKI PID:172128
SURAJ R. MAURYA PID: 182262
Supervisor(s):
MS. PRADNYA RANE
Assistant Professor
Department of Computer Engineering
St. Francis Institute of Technology
(Engineering College)
University of Mumbai
2020-2021
4. CERTIFICATE
This is to certify that the project entitled “Image Encryption Using Jumbling Salting” is a
bonafide work of “Sumeet Verma (172115), Yash Solanki (172128), Swapnil Sontakke
(172117), and Suraj Maurya (182262)” submitted to the University of Mumbai in partial
fulfillment of the requirement for the award of the degree of B.E. in Computer Engineering
Ms. Pradnya Rane
Guide
Dr. Kavita Sonawane Dr. Sincy George
Head of Department Principal
i
5. Project Report Approval for B.E.
This project report entitled Image Encryption Using Jumbling Salting by Sumeet
Verma, Yash Solanki, Swapnil Sontakke, Suraj Maurya is approved for the degree
of B.E. in Computer Engineering.
Examiners
1. Ms. Pradnya Rane
2 Mr. K. S. Sakure
Date: 29-05-2021
Place: Mumbai
ii
6. Declaration
I declare that this written submission represents my ideas in my own words
and where others' ideas or words have been included, I have adequately cited and
referenced the original sources. I also declare that I have adhered to all principles
of academic honesty and integrity and have not misrepresented or fabricated or
falsified any idea/data/fact/source in my submission. I understand that any
violation of the above will be cause for disciplinary action by the Institute and can
also evoke penal action from the sources which have thus not been properly cited
or from whom proper permission has not been taken when needed.
-----------------------------------------
(Sumeet Verma PID172115)
-----------------------------------------
(Yash Solanki PID 172128)
---------------------------------------
(Swapnil Sontakke PID172117)
---------------------------------------
(Suraj Maurya PID 182262)
Date: 29/05/2021
iii
7. Abstract
Today almost all digital services like internet communication, medical and
military imaging systems, multimedia system requires reliable security in storage
and transmission of digital images. Due to faster growth in multimedia technology,
internet and cell phones, there is a need for security in digital images.
Therefore, there is a need for image encryption techniques in order to hide
images from such attacks. In this system we use JS (Jumbling Salting) algorithm in
order to hide the original image. Such Encryption technique helps to avoid
intrusion attacks. In cryptanalysis, a dictionary attack or brute force attack are the
most common ways of guessing the key values. Then, we perform digital image
processing, obtain the date that can use the JS encryption algorithm, combine both
approaches. It provides a new access to satisfy high level security of interactive
information requirements in the fields of aerospace, military, confidential, financial
and economic, national security and so on.
In order to augment the security aspect regarding images, we are devising JS
algorithm which will be responsible for preventing intrusion or brute force attacks
on the images. As JS algorithm deals with randomization, the image encryption
technique forms a highly secured form of encrypted image.
iv
8. TABLE OF CONTENTS
Chapter
No.
Topic Page
No.
1. Introduction 1
1.1 Description 2
1.2 Problem Formulation 2
1.3 Motivation 3
1.4 Proposed Solution 3
1.5 Scope of the project 4
2. Review of Literature 5
3. System Analysis 7
3.1 Functional Requirements 9
3.2 Non-Functional Requirements 7
3.3 Specific Requirements 8
3.4 Use-Case Diagrams and Description 9
4. Analysis Modeling 10
4.1 Data Modeling 10
4.2 Activity Diagram 11
4.3 Functional Modeling 12
4.4 Time Line Chart 13
5. Design 15
5.1 Architecture Design 15
5.2 User interface Design 18
6. Implementation 24
v
9. 6.1 Algorithms / Methods Used 24
6.2 Working of the project 26
7. Testing 28
7.1 Test cases 28
7.2 Type of Testing used 29
8. Results And Discussions 30
9. Conclusions & Future Scope 31
Appendix
Literature Cited
Acknowledgement
vi
10. LIST OF TABLES
Table No. Table Name Page No.
1 Hardware Requirements 7
2 Software Requirements 8
3 Time Line Chart 13
4 Test Case 28
vii
11. LIST OF FIGURES
Figure No. Figure Name. Page No.
1 Aadhaar UIDAI 1
2 Use Case Diagram for User 9
3 ER Diagram 10
4 Activity Diagram for Admin 11
5 DFD Diagram for User 12
6 System Block Diagram 15
7 Process array in JS algorithm 16
8 Character set of JS algorithm 17
9 Salt array format in JS algorithm 17
10 Sign up page 18
11 Login page 18
12 Main 19
13 Different algorithm 19
14
Encryption using JS
20
15 Encryption using DES 20
16
Encryption using AES
21
17
Encryption using MJS
21
18 Decryption using JS 22
19 Decryption using DES 22
20 Decryption using AES 23
21 Decryption using MJS 23
22 Final output 30
viii
12. 1. Introduction
Information technology today, driven by technological development, the transfer of
image information security has become the most pressing concern. In the transfer process, the
contents of the information may be intercepted by others to attack; hence people's privacy
would be threatened. These are related to the computer network has a close relationship.
JS algorithm however takes a lot of space and time for both the encryption and
decryption which is due to the various randomization techniques but on the other hand this
makes the algorithm fully secured.
Jumbling Salting algorithm’s Encryption as well as the Decryption time is large. The
additional overhead of jumbling and salting process increases due to the value of processing
time. The encryption and decryption time rises due to the process of randomization.
However, The AES can be chosen as it is advanced encryption standard for any data
encryption technique. JS algorithm also encrypts large data string or a large file. The
encryption time of JS above algorithm is higher than existing algorithms due to the extra
overhead of characters which is added (in Jumbling and salting procedure). The size of cipher
generated in case of JS encryption is higher than existing algorithms.
Image Encryption Using Jumbling Salting 1
13. 1.2 Description
1.2 Description
JS algorithm has two techniques namely jumbling, salting. In the jumbling part, the
image undergoes “addition” and “selection” sub- processes. Addition process is generating a
value required for determining the number of characters to be added to the original block.
Selection deals with selecting characters to be added to the binary matrix from predefined
character set. In general, there are N numbers of character set in the provided array. Reverse
process is reversing the output of selection process on some predefinedcondition.
The condition can be implemented by any mathematical techniques like even odd, prime
number or any divisibility condition etc. In salting part, random salt is added to the jumbled
block. Selection of salt is based on timestamp value of the uploading time.
1.2 Problem Formulation
Being an important aspect of security, image is an authentication[11][6]
technique which
provides the claimant access to system resources. The probability of attacking the image is
considerably high. Although image encryption provides solution to prevent many attack shave
proven this image encryption technique to be futile. To overcome the problem of securing
encrypted image, we are developing JS technique which will provide additional security to the
stored images.
1.3 Motivation
Images excessively contribute to communication in this era of multimedia. When a user
transfers images over an unsecured communication network, then the absolute protection is a
challenging issue to conserve the confidentiality of images. Encryption is a method of
retaining the secrecy of images. The Internet and information technology are sprouting swiftly.
As a result, people are widely using interactive media in communication. For instance; image,
audio, and video. Images occupy the copious fraction of multimedia. Images play a significant
role in communication, for example; military, national-security agencies and diplomatic
affairs. Since, these images may carry highly confidential information, so these images entail
extreme protection when users collect somewhere over an unreliable repository. Furthermore,
when people wish to transfer images over an insecure network, then it becomes crucial to
provide an absolute protection. In brief, an image requires protection against various security
attacks the primary intention of keeping images protected is to maintain.
2
14. Chapter 1 Introduction
Confidentiality, integrity and authenticity. Different techniques are available for making images
secure and one technique is encryption. Generally, Encryption is a procedure that transforms an
image into a cryptic image by using a key. Furthermore, a user can retrieve the initial image by
applying a decryption method on the cipher image, which is usually a reverse execution of the
encryption process.
1.4 Proposed Solution
To ensure secured transmission of image, by encrypting it with JS algorithm.
The model for encryption and decryption of an image is designed with the objectives to
have confidentiality and security in transmission of the image-based data, with the help of
suitable user- defined download key.
1.5 Scope of the Project
1.5.1 Application
There are a number of sectors with their own specific needs for image encryption and
specialist services are provided to these users.
Biometrics
Fig.1 Aadhaar UIDAI
Image encryption, indeed, is necessary for future multimedia [2]
Internet applications.
Password codes to identify individual users will likely be replaced with biometric images of
Fingerprints and retinal scans such as AADHAAR based applications. However, such
3
15. 1.5.2 Multimedia application
information will likely be sent over a network. When such images are sent over a network, an
eavesdropper may duplicate or reroute the information. By encrypting these images, the
Content still has some degree of added security. Furthermore, by encrypting non-critical
images as well, an eavesdropper is less likely to be able to distinguish between important and
non-important information.
1.5.2 Multimedia applications:
Image encryption can be used to protect intellectual properties. One of concerns of the
entertainment industry is that movies and videos in digital format are vulnerable to
unauthorized access, theft, and replication. Entertainment industry has lost billion dollars due
to the illegal copies[6]
. Recently, new technologies have been developed which allows
multimedia can be delivered to millions of household very quickly. In the future,
entertainment industry will utilize Internet and satellites for multimedia distributions. The
threat of unauthorized access during transmission over networks and the threat of illegal copy
increase significantly. Image encryption, therefore, can be used to minimize these problems
1.5.3 Scope
There has been an explosive growth of using computers, networks, communications
and multimedia applications. Today, Internet users demand not only text but also audio,
images, and video. Recently, the convergence of computers, networks, communications, and
multimedia applications, have been took place[2][7].
The information revolution is entering a new
area where consumer products will combine the functions of telephone, personal computer,
and television. In order to satisfy users demands, future consumer electronics devices, such as
videophone, should be able to transmit images and video over wireless communications
networks. Besides bandwidth and error resiliency issues present in applications, the presence
of a network has prompted new problems with security and privacy. Having a secure and
reliable means for communicating with images is a necessity for many networks.
4
16. 2. Review of Literature
1. Research of Image Encryption Algorithm Base on Chaos Theory[14]
.
Using Chaos Theory, chaotic sequence is generated by Logistics Chaos Mapping. Image
encryption is realized by gray value of substitutes and pixel position scrambling. The chaotic
system that constitutes the three distinct one dimensional chaotic maps. The suggested
technique applies the Logistic map as a controller to choose the Tent map or a Sine map to
generate random sequences[11]
. Thereafter, the imparted algorithm utilizes the substitution-
permutation network (SPN) structure to obtain the confusion and diffusion property. This
scheme uses 240 bit key for large key space. Mainly, this key contains all parameter settings
and the initial values of the new chaotic system, and excessive sensitivity in key changes for
encryption and decryption.
Advantages:
• Chaotic system provides an excellent security against the brute force attack.
• Extreme key sensitivity and chaotic behavior.
Disadvantages:
• Sensitive dependence on initial conditions.
• Choosing the input parameters is highly complex.
2. Image Encryption and Decryption using Blowfish algorithm[15]
The Blowfish algorithm is the 64-bit symmetric block cipher that repeats simple function 16
times and applies a variable key length range from 32 to 448 bits. The offered system follows
the two processes; the first is a key expansion, and the second is a data encryption.
Furthermore, the Blowfish algorithm includes two exclusive or operations that are performed
after 16 rounds and a swap operation. The aftermaths corroborate that blowfish technique is
fast and secure.
Advantages:
• Blowfish algorithm is fast and secure.
• Blowfish is not subject to any patents and is therefore freely available for anyone to use. This
has contributed to its popularity in cryptographic software.
Disadvantages:
• Blowfish can’t provide authentication and non-repudiation as two people have same key.
• It also has weakness in decryption process over other algorithms in terms of time
consumption and serially in throughput.
5
17. 3. Digital Image Encryption based on Advanced Encryption Standard Usage Mining
Using Artificial[16]:
Using AES algorithm implemented on MATLAB, performing digital image processing,
obtaining the date that can use AES Encryption algorithm & combining both approaches.
Advantages:
• As the AES encryption algorithm is fast and has the advantages of strong ability to resist
attacks. So this kind of algorithm is widely used in data encryption
Disadvantages:
• AES algorithm takes more time to encrypt image as compared with the Jumbling Salting
Algorithm.
4. SD-EI: A cryptographic technique to encrypt images[17]
This approach depends on the three methods of cryptography: (1) Bits rotation and reversal,
(2) Extended Hill Cipher, (3) Modified MSA Randomization. Furthermore, the proposed
system utilizes four stages to encrypt an image. At first stage, the algorithm generates a
unique number from the symmetric key. In the second stage, bit’s rotation and reversal are
done, based on the length of a symmetric key[8][9].
Afterward, in the third stage, the system
applies Extended Hill Cipher technique for the encryption. Thereafter, in the fourth stage, the
scheme uses the modified MSA randomization approach for substitution. The empirical
results corroborate that SD-AEI encoding procedure is dominant on the SD-EI due to
additional randomization.
Advantages:
• SD-EI technique can be used to encrypt and secure images, which are to be kept secret or
where steganography have already been applied to hide data in it.
• SD-EI technique is less scrambled.
Disadvantages:
• It is very difficult to decode the image without knowing the algorithm of SD-EI and the
authorization password.
• This image encryption method consists of two stages, among which first stage is Bits Rotation
Reversal stage and second stage is Extended Hill Cipher stage. For both stages, only one
alphanumeric password is needed.
6
18. 3.1 Functional Requirements
3. System Analysis
The system will have the ability to encrypt and decrypt the image securely using JS
technique and will be able to prevent from attacks with the help of this newly improvised
image encryption technique and algorithms like AES for encrypted image protection. While
transferring the image present in jumbled form reaches the user and using decryption key, he
will get the access to that image avoiding any of the attacker/hacker. The functionalities of the
application would be easier to understand for the user.
3.2 Non-Functional Requirements
It is efficient to transfer the image in a secured platform. The system is mainly
designed for the situations where the security matters. The user will get rid of attacks on the
image and issues related to transfer of images. The rest of the security concern will be done by
the system or application.
3.3 Specific Requirements
This section discusses the hardware and software requirements for the design and
development of Software for Image Encryption Using Jumbling Salting.
The hardware used for the development of the project is:
Table 1. Hardware Requirements
Components Specifications
Screen Resolution 640 X 480 display 5400 RPM hard disk
System/Processor Intel® Core ™ Duo or more than CPU
@ 2.20 GHz.
Memory 2 GB of RAM
Hard Disk 500 GB of HDD or higher recommended
Supported Arch X86 and x64
7
19. 3.3 Specific Requirement
The software used for the development of the project is:
Table 2. Software Requirements
Components Specifications
Operating System Microsoft Windows XP Professional
Microsoft Windows Server 2003
Windows Vista
Windows 2010 (64-bit)
Database SQL Server 2008 R2 (64-bit)
Supported Browsers Microsoft Internet Explorer 8.0
Google chrome
Mozilla Firefox
8
20. Chapter 3 System Analysis
3.4 Use-Case Diagrams
Fig. 2. Use Case Diagram for User
Description:
User can login the system and upload the file that has to be encrypted. Receiverenters the
secret key also can download the file later.
Database stores the login details along with the user uploaded file.
9
21. 4.1 ER Diagram
4. Analysis Modeling
The ER diagram represents domains or objects as entities and its further functions as
attributes. The ER diagram represents the relationship between the different objects or entities
through various conditions or actions. It has many relationships between entities i.e. one-to-
one, one-to-many and many-to-many.
Description:
Fig. 3. ER Diagram
User panel has the user profile which is associated with user and the file.
User profile has various attributes such as name, email-id, mobile no and address.
10
22. Chapter 4 Analysis Modeling
4.2 Activity Diagram:
Fig. 4. Activity Diagram for Admin (Sender)
Description: Admin has to login first to access all the features such as Add User, View User, Edit
User, and Select User to send the file.
11
23. 4.3 DFD
4.3 DFD:
Fig. 5. DFD Diagram for User
Description:
The User has to login the system to view shared files and decrypt them using the aforementioned
secret key shared by the admin.
The user can also download the decrypted images from the system.
12
24. Chapter 4 Analysis Modeling
4.4 Time Line Chart
Months → AUGUST SEPTEMBER OCTOBER NOVEMBER
Particulars ↓
W
1
W
2
W
3
W
4
W
1
W
2
W
3
W
4
W
1
W
2
W
3
W
4
W
1
W
2
W
3
W
4
1)Gathering initial
requirements
Decide the project topic
Identify needs and
constraints
Determine goals and
scope
Establish
specification
Milestone : product specification complete
2) Feasibility
Technical
feasibility
Economic
feasibility
Application (code)
feasibility
Operational feasibility
Milestone : feasibility study complete
3)Requirement
Determination
Determine inputs
Determine outputs
Process control
Synopsis
13
25. Milestone : synopsis is ready
Months → DECEMBER
JANUARY
FEBRUARY
MARCH
APRIL MAY
Particulars ↓
W
1
W
2
W
3
W
4
W
1
W
2
W
3
W
4
W
1
W
2
W
3
W
4
W
1
W
2
4)Analysis and
Design
Phase 1
Phase 2
Phase 3
Milestone : Design specification complete
5) Development
Developing
Interface
Developing
Modules
Milestone : Development phases complete
6) Testing
Testing
Connectivity
System testing and load
testing
Milestone : Testing phase complete
7)Implementation
Building Prototype
Building Interface
8) Evaluation
Documentation and
recommendation
Milestone : Implementation and Evaluation phases complete
Description: We have now completed with gathering initial requirements, Feasibility analysis of the project and
Requirements determination.
14
26. 5. Design
5.1 Architectural Design
Fig. 6 System Block Diagram
Image to Image Matrix Conversion
A color image with resolution N*M (where n = no of pixels in height and m = no of pixels in width)
is converted into an 3 dimensional image matrix of order (N, M, 3) where each column has grey
scaled values (i.e. 0-255) of RGB colors respectively.
Jumbling block:
Jumbling process includes sub- processes viz. addition and selection. Process array is given to
Jumbling block. Jumbling block pre-pends some characters from the character set and jumbling
them with the help modulus function. Modulus is the mathematical function which returns reminder
of a division operation. Jumbling block itself is a combination of sub-blocks:
15
27. 5.1 Architecture Design
Addition Sub-block:
This block generates principle random value “l” and updating the size of a Process Array. The
original size of process array P [ ] is ‘x’ which is now updated to (x + l).
The Fig.7. illustrates the position of Process array P [ ]
Process Array [x + l]
Fig. 7. Process array in JS algorithm
16
28. Chapter 5 Design
Selection sub-block:
This block is about selecting pixels values from predefined set A. The size of pixel array is large
and the predefined set for a particular image. Selection is based on the random values which are
generated “l” times. Practically the size of Process array is large enough to select the different pixel
values.
The character set of general Process array is shown in Fig. 8. below:
Fig. 8. Character set of JS algorithm
Salting block
The objective of salting block is to add random pixel values along with jumbled version of the pixel
values. The criteria of selection of salt are user’s sign-up timestamp value along with the users
download key. The salt is added in order to make the encryption more complicated thereby making
it difficult for the attacker to obtain it. The timestamp value is chosen for adding salt in the jumbled
version of the image, as it is unique value. For every user, the timestamp value is different so is the
download key. We have chosen servers value as timestamp value.
The general form of salt array is shown in Fig. 9 below:
Y Y Y Y D D M M H H m m s s
Fig. 9. Salt array format in JS algorithm
Where:
Y = Year, M= Month
D = Date
h = Hours in 24 hours format
m = minutes
s= seconds
17
29. 5.2 User Interface Design
5.2 User Interface Design
Fig. 10. Sign up page
Fig. 11. Login page
18
35. 6. Implementation
6.1 Algorithms Used
Input: Image in 1-dimension Image Matrix form. ==> (500*500)*3 == 7.5L elements where 500*500
is the resolution of the image and 3 grey scaled images each of RGB format.
Output: Image in Jumbled- salted form.
STEP 1:
INITIALIZE 'x' to 0;
STEP 2:
STORE the length of Image in 1-dimension matrix in variable “x”;
STEP 3:
CREATE an Process array P [ ] such that P [length =x];
STEP 4:
STORE each pixel value in an array block;
// P {0, 1, 2... x-1) = { pixels in process array with
index }
/* implementation of Jumbling Process */
Function jumbling (P [ ])
{
// implementation of jumbling technique: Addition
Process
STEP 5:
Label 1: CALL Random () function;
// Random function returns any random value from
predefined set of integers within the limit provided by
programmer.
SET ‘l’ as principle random value; (where l>x and l<limit, where limit is set by programmer)
If (l >= x)
STORE random number value in ‘l’ generated from
random () function;
Else
Goto Label 1;
Break;
End If
STEP 6:
UPDATE an array P [ ] of size (x + l)
STEP 7:
DEFINE the set of pixel values A.
//Size (A) = M;
// M = any large value;
24
36. Chapter 6 Implementation
//implementation of jumbling technique: Selection
Process
/* this process selects pixel Values from given pixel value set.
All these are added with process array. These process is also made randomized */
STEP 8:
CALL random ( ) function 'l' times;
// At each iteration, random value is generated by random
function which acts as an index of the pixel value in pixel value set.
STEP 9:
FILL the process array with Pixel values
STEP 10:
STORE the original length of an array in variable say
“FIX”
For i = 0 to (x+l-1)
While (l! =0)
SET j to 0;
j= (FIX modulus l);
Create 'temp' variable;
Swap (P[i], P[j]);
//output of above modulus function is an index integer
within the range 0 to (x + l - 1), Hence we must swap output
value with the same index integer with index 0th position
value.
l= l-1; // decrement l
End While
End For
}
// end of jumbling function
/* implementation of Salting Technique */
Function salting( P[ ] )
{
STEP 12:
STORE current Timestamp value of the server;
STEP 13:
OBTAIN the length of timestamp say ‘t’. (YYYYDDMMHHmmss)i.e.14
Append The download key provided by the user.len(16 char)
STEP 14:
CREATE Salt [size=t] array which stores random salt values;
Salt [ ] = {values obtained from Timestamp value};
STEP 15:
UPDATE an array P of size (x + l + t + 16)
FILL the process array with Jumbled pixel values of size
(x + l) and salt values of size t+16.
25
37. 6.2 Working of the project
Return (P);
}
// end of salting function
6.2 Working of the project (code for mentioned algorithms)
public partial class Add_New_User : System.Web.UI.Page
{
protected void Page_Load(object sender, EventArgs e)
{
if (Session["a_id"] == "")
{
Response.Redirect("Login.aspx?msg=logout");
}
btnCancel.Visible = false;
if (Request.QueryString["action"] == "edit" &&this.IsPostBack == false)
{
btnCancel.Visible = true;
stringuser_id = Request.QueryString["user_id"];
string query1 = "select * from User_Master where user_id='" + user_id + "'";
DataTabledt = Database.Getdata(query1);
txtfull_name.Text = Convert.ToString(dt.Rows[0]["full_name"]);
txtcontact_no.Text = Convert.ToString(dt.Rows[0]["contact_no"]);
txtaddress.Text = Convert.ToString(dt.Rows[0]["address"]);
}
}
protected void btnSave_Click(object sender, EventArgs e)
{
if (Request.QueryString["action"] == "edit")
{
stringuser_id = Request.QueryString["user_id"];
string query2 = "update User_Master set full_name='" + txtfull_name.Text +
"',contact_no='" + txtcontact_no.Text + "',address='" +
txtaddress.Text + "' where user_id='" + user_id + "'";
Database.InsertData_direct(query2);
Response.Redirect("Manage_Users.aspx?msg=update")
}
else
{
stringselect_id = "select * from User_Master '"+txt.Text+"'";
DataTabledt = Database.Getdata(select_id);
if (dt.Rows.Count> 0)
{
Alert.Show("User Already Exists");
}
else {
26
38. Chapter 6 Implementation
var chars =
"QWERTYUIOPLKJHGFDSAZXCVBNMqwertyuioplkjhgfdsazxcvbnm0987654321";
varstringargs = new char[8];
var random = new Random();
for (inti = 0; i<stringargs.Length; i++)
{
stringargs[i] = chars[random.Next(chars.Length)];
}
string password = new String(stringargs);
string query = "Insert Into User_Master values('" + txtfull_name.Text + "','" +
txtcontact_no.Text + "','" + txt.Text + "','" + txtaddress.Text + "','" + password + "') ";
Database.InsertData_direct(query);
27
39. 7. Testing
The aim of testing is to prove that the developed system addresses the pre-defined business
requirements and will perform reliably and efficiently when running live.
7.1 Test cases
Table 4. Test Cases
Sr.
No.
Case Pre-Condition Action
Taken
Expected
Output
Actual
Output
Pass
/
Fail
1 Admin/User
Login
Admin/User has
to start the
system to the
login page
Input is checked
with the present
credentials for
the user.
If data entered is
correct login will be
successful otherwise
error message is
displayed.
If data entered is
correct login will
be successful
otherwise error
message is
displayed.
Pass
2 Upload
Image
Select the
image from
the device
The image from
the computer
system gets
uploaded.
Image is
uploaded.
Image is
uploaded.
Pass
3 Encrypt
Image
Select the image
to encrypt
Image is
encrypted
within the
master file
Encrypted
image is formed.
Encrypted
image is
formed.
Pass
4 Decrypt
Image
User has to get
access to the
image by
providing the
secret key.
Secret key is
checked within
the database for
that particular
user
The image is
decrypted
successfully and is
downloaded in the
user’s system
The image is
decrypted
successfully and
is downloaded in
the user’s system
Pass
5 Exiting the
application
User has to click
on the Log Out
button from the
User panel
The web
application is
closed.
The user is logged
out successfully.
The user is logged
out successfully.
Pass
6 Other file
formats
Admin uploads
different format
file
File is
checked.
File is
successfully
uploaded
File cannot be
uploaded.
Pass
28
40. Chapter 7 Testing
7.2 Type of testing use:
Regression Testing: Regression testing focuses on finding defects after a major code change has
occurred. Specifically, it seeks to uncover software regression, or old bugs that have come back. Such
regressions occur whenever software functionality that was previously working correctly stops
working as intended.
Stability Testing:
Stability testing checks to see if the software can continuously function well in or above an
acceptable period. This activity of non-functional software.
Usability Testing:
Usability testing is needed to check if the user interface is easy to use and understand. It approaches
towards the use of the application.
Unit Testing
The minimal software components (module) are tested.
Each unit(basic component) of the software is tested to verify that the detailed design for the unit has
been correctly implemented.
Testing is done on the following levels:
• Testing is done at class level, and the minimal unit tests include the constructors and
destructors.
• In Black Box Testing specification based testing is done to find that each module gives
specific output for particular input integration testing.
• The interfaces and interaction between integrated components are tested.
• Progressively larger group of tested software components corresponding to elements of the
architectural design are integrated and tested until the software works as a system.
29
41. 8. Results and Discussions
• In this system, we mainly concentrated on encrypting and decrypting the original image. This
system is designed as a web application which encrypts and decrypts the original image.
• Normally, after encrypting the image, the original image may lose its resolution. In the
implemented approach, the image remains unchanged in its resolution as well in size.
• The speed of encrypting the image is high such that the image’s visual quality is not changed and
the image is encrypted securely.
• For the encryption and decryption phase, JS algorithm is used and implemented in Java
programming language.
• The concatenation approach is used in this system in which the image is converted into bytes
format and this data is concatenated at the end of the master file. Since this approach is used, there
is no change in visual quality of the jumbled image.
Final Output:
Fig.22 Final output
In this project (fig.22) we have implemented the modified JS algorithm and later compared it with
other similar functioning algorithms such as AES, DES and Jumbling Salting Algorithm.
Also we have done this by using a throughput value that is considered as measure for comparing the
effectiveness of these algorithms. Basically the throughput value indicates the number of Megabytes of
image encrypted with respect to time taken to encrypt the image.
30
42. 9. Conclusions
This system puts forward the method that uses the JS algorithm with the key control to encrypt
the image. This method incorporates a variety of characteristics, and with simple design. JS
algorithm reduces the probability of decrypting the image. Due to the various randomization
techniques, it builds an encrypted image which is almost difficult to decrypt. To decipher this
encrypted image is a difficult task.
JS algorithm however takes a lot of space and time for both the encryption and decryption which
is due to the various randomization techniques but on the other hand this makes the algorithm fully
secured.
Jumbling Salting algorithm’s Encryption as well as the Decryption time is large. The additional
overhead of jumbling and salting process increases due to the value of processing time. The
encryption and decryption time rises due to the process of randomization.
The existing system uses JS algorithm for text encryption technique. This developed system will
now be able to transfer images in a secured way so that the image cannot be intercepted by the
intruder. It is done by encrypting the image and obtaining a random length secret key and hence we
get a jumbled image. The decryption of the image from the jumbled form will be done using JS
technique because the encrypted image will not be altered visually even after the encryption process
is done. The final output image can be obtained by entering the secret key so that the intruder cannot
detect the presence of the secret image and thus confidentiality and privacy is assured and achieved.
In this way, we can securely transfer the jumbled image in a secret way, only the sender and receiver
will know that the jumbled image contains the original image which needs to be transferred to the
receiver.
31
43. Future Scope
1. Image Encryption for Defense
If the image is encrypted in a more efficient manner using jumbling salting algorithm, it can be used for
defence purpose. Various images captured by satellite for national security which is used by our defence
forces can use JS algorithm to provide better efficiency and security in the domain of image security.
2. Encryption in printed media
If the data is embedded in an image, the image printed, then scanned and stored in a file can the
embedded image be recovered? This would require a special form of an encryption- decryption
mechanism to which could allow for in accuracies in the printing and scanning equipment.
32
45. Alert.Show("User Already Exists");
}
else {
var chars =
"QWERTYUIOPLKJHGFDSAZXCVBNMqwertyuioplkjhgfdsazxcvbnm0987654321";
varstringargs = new char[8];
var random = new Random();
for (inti = 0; i<stringargs.Length; i++)
{
stringargs[i] = chars[random.Next(chars.Length)];
}
string password = new String(stringargs);
string query = "Insert Into User_Master values('" + txtfull_name.Text + "','" +
txtcontact_no.Text + "','" + txtemail_id.Text + "','" + txtaddress.Text + "','" + password + "') ";
Database.InsertData_direct(query);
34
46. References
[1] Applied Cryptography-Protocols Algorithms and Source Code in C John Wiley
Publications,ISBN978-04711-17094
[2] M. Stamp. Information Security: Principles an practice, John Wiley publications, ISBN-
13978-0-471-73848-0.
[3] Ch. SanthoshReddy,Ch. Sowjanya ,Praveena,ProfShaliniL,“Poly-alphabetic Symmetric
Key Algorithm Using Randomized Prime Numbers” International Journal of Scientific and
Research Publications, Volume 2 ,Issue 9,September 2012,ISSN22503153
[4] William Stallings. Cryptography and Network Security: Principles and Practices, Fourth
Edition. Beijing: Electronic Industry Press.2007:229~250
[5] C. Pfleeger,S. Pfleeger, Security in Computing, Third Edition, Prentice Hall PTR, ISBN :
0-13-035548-8
[6] Kahate Atul,2003,"Cryptography and Network Security", Third Edition, TataMcGrawHill
India.
[7] Features of C# [Online], http:// www.tutorialspoint.com/csharp.[Accessed: June 25,
2015].
[8] Features an overview of C# [Online], http://www.slideshare.net.[Accessed: June 25
2015].
[9] C# and .net technology [Online] https://www.msdn.microsoft.com.[Accessed: June 25
2015].
[10] Daemen, J., and Rijmen, V. "Rijndael: The Advanced Encryption Standard r. Dobb's
Journal, March 2001,pp.137-139.
[11] "A Performance Comparison of Data Encryption Algorithms," IEEE Information and
Communication Technologies, 2005. ICICT 2005. First International Conference, 2006-02- 27,
PP.84-89
[12] TingyuanNie, ChuanwangSonga, XulongZhi (2010), “Performance Evaluation of DES
and Blowfish Algorithms”, Proceedings of 2010IEEE.
[13] The Pledge of Independence, Declaration of PurnaSwaraj, Lahore Congress, January
26, 1930 [Online], http://www.knowindia.gov.in, [Accessed: June 25,2015].
[14] Liu Bo, Liu Na, Li Jianxia and Liang Wei, "Research of image encryption algorithm base
on chaos theory," Proceedings of 2011 6th International Forum on Strategic Technology, Harbin,
Heilongjiang, 2018, pp. 1096-1098, doi: 10.1809/IFOST.2018.6021211.
35
47. [15]
Anjaneyulu, G.S.G.N. &Kurmi, P.K. & Jain, R..(2015). Image encryption and decryption using
blowfish algorithm with randomnumber generator. 6. 7164-7170.
[16] Gamido, Heidilyn&Sison, Ariel & Medina, Ruji. (2018). Implementation of Modified
AES as Image Encryption Scheme. 301-308. 10.11591/ijeei.v6i3.490.
[17] Dey, Somdip. (2012). SD-EI: A cryptographic technique to encrypt images. Proceedings
2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec
2012. 28-32. 10.1109/CyberSec.2012.6246123.
[18] MayureshVartak, Rishabh Reddy, PrathameshChuri, “Image Encryption using Jumbling-
Salting Algorithm” International Journal of Innovative Technology and Exploring Engineering
(IJITEE) ISSN: 2278-3075, Volume-8 Issue-12S, October 2019.
36
48. Acknowledgement
It gives us great pleasure in presenting this project report titled: “IMAGE ENCRYPTION
USING JUMBLING SALTING.
On this momentous occasion, we wish to express our immense gratitude to the range of
people who provided invaluable support in the completion of this project. Their guidance and
encouragement has helped in making this project a great success. We express our gratitude to our
project guide Prof. Pradnya Rane who provided us with all the guidance and encouragement
and making the lab available to us at any time. We also would like to deeply express our sincere
gratitude to Project coordinators.
We are eager and glad to express our gratitude to the Head of the Computer Engineering
Dept. Dr.Kavita Sonawane, for her approval of this project. We are also thankful to her for
providing us the needed assistance, detailed suggestions and also encouragement to do the
project. We would like to deeply express our sincere gratitude to our respected principal Dr.
Sincy George and the management of St. Francis Institute of Technology, Borivali for
providing such an ideal atmosphere to build up this project with well- equipped library with all
the utmost necessary reference materials and up to date IT Laboratories.
We are extremely thankful to all staff and the management of the college for providing us
all the facilities and resources required.
Submitted by:
“Sumeet Verma”
“Yash Solanki”
“Swapnil Sontak”
“Suraj Maurya”
37