SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5209
SURVEY OF HIGHLY SECURED METHODS FOR IMAGE TRANSMISSION
USING IMAGE SEGMENTATION, PERMUTATION AND MULTI
ENCRYPTION TECHNIQUE
Pratibha Pradhan1, Rasmiranjan Samantray2
1,2Central College of Engineering and Management, Kabir Nagar, Raipur, Chhattisgarh Swami Vivekanand
Technical University, Raipur, Chhattisgarh, India
----------------------------------------------------------------***-------------------------------------------------------------
Abstract - In recent years, several encryption schemes
have been proposed to protect data from unauthorized
access. It is not suitable to use traditional encryption
algorithms for image encryption which were proposed
for textual data. The encryption schemes used for images
are computationally expensive and power hungry, hence
not suitable for mobile phone devices. The protection of
multimedia data is becoming very important. The
protection of this multimedia data can be done with
encryption. There are so many different techniques are
used to protect confidential image data from an
unauthorized access.
Keywords: Encryption, Decryption, Segmentation, Key.
INTRODUCTION:
With the advent of technological development
multimedia transfer is growing every day. Mobile phones
are the major way of transferring multimedia data these
days. One of the most debatable critical issues of this age
is the prevention of illegal access and sharing of
multimedia data particularly the images, as digital
images carry a large amount of information. This
security issue has attracted the attention of many
researchers in last two decades. There are different ways
to secure data which include encryption and water
marking [1]. Encryption is done by converting data into
such a form that it cannot be read by unauthorized user.
The protection of this multimedia data can be done with
encryption. Encryption has long been used by militaries
and governments to facilitate secret communication. An
authorized recipient can easily decrypt the message with
the key provided by the originator to recipients but to
unauthorized users.
Encryption:
In cryptography, encryption is the process of encoding a
message or information in such a way that only
authorized parties can access it and those who are not
authorized cannot. Encryption does not itself prevent
interference, but denies the intelligible content to a
would-be interceptor. In an encryption scheme, the
intended information or message, referred to as
plaintext, is encrypted using an Encryption algorithm – a
cipher – generating cipher text that can be read only if
decrypted. For technical reasons, an encryption scheme
usually uses a pseudo random encryption key generated
by an algorithm. It is in principle possible to decrypt the
message without possessing the key, but, for a well-
designed encryption scheme, considerable
computational resources and skills are required.
Encryption has long been used by militaries and
governments to facilitate secret communication. It is
now commonly used in protecting information within
many kinds of civilian systems. For example, the
Computer Security Institute reported that in 2007, 71%
of companies surveyed utilized encryption for some of
their data in transit, and 53% utilized encryption for
some of their data in storage Encryption is also used to
protect data in transit, for example data being
transferred via networks (e.g. the Internet, ecommerce),
mobile telephones, wireless microphones, wireless
intercom systems, Bluetooth devices and bank automatic
teller machines. There have been numerous reports of
data in transit being intercepted in recent years [2]. Data
should also be encrypted when transmitted across
networks in order to protect against eavesdropping of
network traffic by unauthorized users.
LITERATURE SURVEY
Entire idea behind the proposed algorithm is built upon
scrambling of image pixels based on random number
generators. Authors in [3] presented similar work on
image the Authors in [4] have mentioned the positive
consequences of using a shuffle based technique. The
proposed algorithm design also considered the author in
[5] mentioning the downside of using linear congruently
generator as the PRNG which includes statistical
determinism due to the mechanical nature of the
algorithm. Authors in [6] have talked about using linear
congruential generator of order k>1 to generate random
numbers which mimics true random generators. Authors
in [7] presented an image encryption technique based on
shuffling of pixel blocks with the help of chaotic map
which predicts pixel positions. In this paper we propose
a shuffle algorithm with minimal compression issues,
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5210
loss of data and also an undemanding encryption and
decryption of image files.
Nowadays, information security is becoming more
important in data storage and transmission. Images are
widely used in several processes. Therefore, the
protection of image data from unauthorized access is
important. Image encryption plays a significant role in
the field of information hiding.
Images are different from texts in many aspects such as
high correlation among pixels and high redundancy.
Thus, a variety of new image encryption schemes have
been proposed [8]. Although we may use the traditional
encryption algorithms to encrypt images directly, it is
not a good idea for two reasons. The first is the image
size is often larger than text. Consequently, the
traditional encryption algorithms need longer time to
directly encrypt the image data, the second, is the
decrypted text must be equal to the original text, but this
requirement is not necessary for image data. Due to the
characteristic of human perception, a decrypted image
containing small distortion is usually acceptable.
According to image encryption techniques try to convert
an image to another one that is hard to understand. On
the other side, image decryption retrieves the original
image from the encrypted one. Most of these proposed
algorithms concentrate on dividing the image into
different blocks which result in a stronger encryption
algorithm with less correlation between the shares [9].
PROPOSED METHODOLOGY:
Pixel- Shuffling:
This section entails the core idea of the working
algorithm. The image encryption methodology adapted
in the algorithm majorly depends on shuffling the pixels
according to the random numbers that are generated
using the techniques covered in the previous sections.
The basic operation in shuffling involves swapping two
pixels to remove them from their original position. This
process is repeated multiple times, in row & column
order to have maximum displacement for each pixel.
a) Row Shuffle
The initial step of the algorithm after pseudo random
number generation is to shuffle the pixels. This process
starts with the row having the zero index being
exchanged with the row number that is in the zeroth
index of the random number array. Hence in our case the
zeroth row gets exchanged with the third row and the
current state of the image is saved. Now, the row pointer
moves to the second row (or the first row index) and the
corresponding random row number is taken from the
random array i.e. the second row is exchanged with the
first row and the state of the matrix is saved again.
(b) Column Shuffle
Similar procedure is followed again but this time, the
columns of the pixel matrix are shuffled instead of the
rows. This leads to the interchanging of the columns in a
fashion that is predicted by the random numbers
generated earlier. Our aim to have a column shuffle
accompanying the row order shuffle is to displace the
pixels in column order also rather than just in row order
ensuring maximum diffusion. After both the row and the
column shuffle are done, the algorithm returns a
randomly shuffled array that has been subjected to a row
wise shuffle and a column wise shuffle at the same time.
Encryption Process:
The encryption block starts by determining the number
of iterations, which defines the number of times whole
algorithm is repeated to get good results. Initially the
counter is initialized at 0 and then it can be increased by
one count after each iteration so that image is visually
not in a condition to get recognized and shows
robustness against cryptographic attacks. The proposed
image encryption scheme shows comparable results and
robustness against attacks with one iteration only, which
in turn reduces the power consumption of the algorithm.
To start shuffling of pixels in the rows, sum of all
elements in rows is computed to get a row vector of 1 ×
256. Then Modulo-2 of this sum is computed to convert
the data in the form of binary numbers. Then shuffling of
pixels is performed by using obtained Modulo-2 vector
sum by right circular shifting pixels at 0s positions and
left circular shifting of pixels at 1s positions. All the
pixels in rows are shuffled using this operation. To start
shuffling of pixels in the columns of already row shuffled
image, sum of all elements in columns is computed to get
a vector of 1×256.ThenModulo-2of this summited
computed to convert the data in the form of 0s and 1s.
Decryption Process:
Number of maximum iterations is denoted which can be
increased by counter of one. ITERmax is kept same in
encryption and decryption blocks of algorithm to repeat
the steps same time in both blocks. Column key vector
(Kc) used to apply zeta function on rows of the final
scrambled image, then row key vector (Kr) is used to
apply zeta function on the columns. Sum of all elements
in columns is computed to get a vector of 1×256. Then
Modulo-2 of this sum is computed to convert the data in
the form of 0s and 1s. Then shuffling of obtained
Modulo-2 vector sum is performed by up circular
shifting of pixels positioned at 0s and down circular
shifting of 1s positions. Sum of all elements in rows is
computed to get a vector of 1×256. Then Modulo-2 of
this sum is computed to convert the data in the form of
0s and 1s. Then shuffling of obtained Modulo-2 vector
sum is performed by right circular shifting of pixels on
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5211
positions of 0s and left circular shifting those at 1s
positions.
Permutation Process:
In this process we are changing the original sequence of
image parts. This process will increase the security
during transmission. In mathematics, the notion of
permutation relates to the act of arranging all the
members of a set into some sequence or order, or if the
set is already ordered, rearranging its elements, a
process called permuting. These differ from
combinations, which are selections of some members of
a set where order is disregarded. Permutations are
studied in almost every branch of mathematics. They are
also appearing in many other fields of science. In
computer science they are used for analysing sorting
algorithms, in quantum physics for describing states of
particles and in biology for describing RNA sequences.
Permutation can be defined as bisections from a set onto
itself. All permutations of a set with n elements from a
symmetric group denoted Sn, where the group operation
is function composition.
RESULT ANALYSIS:
In this section, we present the experimental results to
exemplify the efficiency and performance of the
proposed encryption algorithm. The complete reverse
algorithm has also been tested to ensure uniformity
between the source image and the decrypted image. The
result from permutation based image encryption
algorithm using block cipher approach 2015 is
shown below-
SENSITIVITY VALUES FOR THE TESTED IMAGES
Example NPCR UACI
A 0.9957 0.1483
B 0.9929 0.2224
C 0.9952 0.1454
Than permutation based image encryption algorithm
using block cipher approach 2015 result is implemented
by Energy Efficient Image Encryption Algorithm in
2017 and the given result is as shown below –
NPCR AND UACI OF ENCRYPTED IMAGES
Image Name NPCR UACI
Cameraman 99.5956 33.5811
Lena 99.5859 33.4201
Checkerboard 99.6201 33.7082
Football 99.6078 33.6101
Rice 99.7120 33.7791
CONCLUSION:
In this paper we proposed an image encryption
algorithm based on seed values acquired from multiple
pseudo random number generators which were
comprehensible and had a straight forward
implementation. The presented technique provides high
security and confidentiality in transmission of image
data over networks or storage of the same. The
encryption method in our work has been tested on
different image formats with best possible seed values
and packs immense flexibility due to variable number of
parameters that can be used as a deciding factor for the
encryption process. The algorithm performs the
operation in linear time, much faster than the existing
image encryption techniques. The approach used is a
simple, efficient and yet effective way to achieve image
encryption using pre-existing technology. It is easy to
comprehend and can be translated into techniques to
implement image encryption on handheld devices or as a
module. which could be integrated into a bigger system.
REFERENCES:
[1] K. Loukhaoukha, J.-Y. Chouinard, and A. Berdai, “A
secure image encryption algorithm based on rubik’s
cube principle,” Journal of Electrical and Computer
Engineering, vol. 2012, p. 7, 2012.
[2] X. Chai, Y. Chen, and L. Broyde, “A novel chaos-based
image encryption algorithm using dna sequence
operations,” Optics and Lasers in Engineering, vol. 88,
pp. 197–213, 2017.
[3] X. Chai, “An image encryption algorithm based on bit
level brownian motion and new chaotic systems,”
Multimedia Tools and Applications, vol. 76, no. 1, pp.
1159–1175, 2017.
[4] W. Wang, H. Tan, Y. Pang, Z. Li, P. Ran, and J. Wu, “A
novel encryption algorithm based on dwt and multichaos
mapping,” Journal of Sensors, vol. 2016, 2016.
[5] G. Ye, H. Zhao, and H. Chai, “Chaotic image encryption
algorithm using wave-line permutation and block
diffusion,” Nonlinear Dynamics, vol. 83, no. 4, pp. 2067–
2077, 2016.
[6] A. Jain and N. Rajpal, “A robust image encryption
algorithm resistant to attacks using dna and chaotic
logistic maps,” Multimedia Tools and Applications, vol.
75, no. 10, pp. 5455–5472, 2016. [7] Y. Liu, J. Wang, J.
Fan, and L. Gong, “Image encryption algorithm based on
chaotic system and dynamic s-boxes composed of dna
sequences,” Multimedia Tools and Applications, vol. 75,
no. 8, pp. 4363–4382, 2016.
Author Profile
Pratibha Pradhan received the B.E
degree in Electronics and
Telecommunication Engineering from
the Chhattisgarh Swami Vivekananda
Technical University (CSVTU), Bhilai,
India, in 2017, and pursuing her M.Tech.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5212
Degree in Digital Electronics in CSVTU, Bhilai, India. Her
research interests include cryptography, Image
Processing.
Rasmiranjan Samantray is Assistant
Professor in CCEM Raipur, India. He is a
BE in Electronics and Telecommunication
Engineering, M.Tech. in Communication
System Engineering From KIIT University
Bhubaneswar.

More Related Content

What's hot

An improved color image encryption algorithm with pixel permutation and bit s...
An improved color image encryption algorithm with pixel permutation and bit s...An improved color image encryption algorithm with pixel permutation and bit s...
An improved color image encryption algorithm with pixel permutation and bit s...eSAT Journals
 
An improved color image encryption algorithm with
An improved color image encryption algorithm withAn improved color image encryption algorithm with
An improved color image encryption algorithm witheSAT Publishing House
 
A new partial image encryption method for document images using variance base...
A new partial image encryption method for document images using variance base...A new partial image encryption method for document images using variance base...
A new partial image encryption method for document images using variance base...IJECEIAES
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...IRJET Journal
 
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...IJCSIS Research Publications
 
11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature mapsAlexander Decker
 
An ideal steganographic scheme in networks using
An ideal steganographic scheme in networks usingAn ideal steganographic scheme in networks using
An ideal steganographic scheme in networks usingeSAT Publishing House
 
An ideal steganographic scheme in networks using twisted payload
An ideal steganographic scheme in networks using twisted payloadAn ideal steganographic scheme in networks using twisted payload
An ideal steganographic scheme in networks using twisted payloadeSAT Journals
 
A Cryptographic Key Generation Using 2D Graphics pixel Shuffling
A Cryptographic Key Generation Using 2D Graphics pixel ShufflingA Cryptographic Key Generation Using 2D Graphics pixel Shuffling
A Cryptographic Key Generation Using 2D Graphics pixel ShufflingIJMTST Journal
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptographyeSAT Journals
 
Implementation for Data Hiding using Visual Cryptography
Implementation for Data Hiding using Visual Cryptography           Implementation for Data Hiding using Visual Cryptography
Implementation for Data Hiding using Visual Cryptography IRJET Journal
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...IOSR Journals
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmIAEME Publication
 
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTIONAN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTIONijcseit
 
Image encryption
Image encryptionImage encryption
Image encryptionrakshit2105
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingijctet
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUEijcisjournal
 

What's hot (20)

An improved color image encryption algorithm with pixel permutation and bit s...
An improved color image encryption algorithm with pixel permutation and bit s...An improved color image encryption algorithm with pixel permutation and bit s...
An improved color image encryption algorithm with pixel permutation and bit s...
 
An improved color image encryption algorithm with
An improved color image encryption algorithm withAn improved color image encryption algorithm with
An improved color image encryption algorithm with
 
A new partial image encryption method for document images using variance base...
A new partial image encryption method for document images using variance base...A new partial image encryption method for document images using variance base...
A new partial image encryption method for document images using variance base...
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
 
11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps
 
An ideal steganographic scheme in networks using
An ideal steganographic scheme in networks usingAn ideal steganographic scheme in networks using
An ideal steganographic scheme in networks using
 
An ideal steganographic scheme in networks using twisted payload
An ideal steganographic scheme in networks using twisted payloadAn ideal steganographic scheme in networks using twisted payload
An ideal steganographic scheme in networks using twisted payload
 
A Cryptographic Key Generation Using 2D Graphics pixel Shuffling
A Cryptographic Key Generation Using 2D Graphics pixel ShufflingA Cryptographic Key Generation Using 2D Graphics pixel Shuffling
A Cryptographic Key Generation Using 2D Graphics pixel Shuffling
 
Ew4301904907
Ew4301904907Ew4301904907
Ew4301904907
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
 
Implementation for Data Hiding using Visual Cryptography
Implementation for Data Hiding using Visual Cryptography           Implementation for Data Hiding using Visual Cryptography
Implementation for Data Hiding using Visual Cryptography
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithm
 
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTIONAN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
 
Ijariie1132
Ijariie1132Ijariie1132
Ijariie1132
 
Image encryption
Image encryptionImage encryption
Image encryption
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarking
 
Fx3610771081
Fx3610771081Fx3610771081
Fx3610771081
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
 

Similar to IRJET-Survey of Highly Secured Methods for Image Transmission using Image Segmentation, Permutation and Multi Encryption Technique

A New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionA New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionIRJET Journal
 
IRJET- Image Encryption based on Non-Subsampled Contourlet Transform with Dif...
IRJET- Image Encryption based on Non-Subsampled Contourlet Transform with Dif...IRJET- Image Encryption based on Non-Subsampled Contourlet Transform with Dif...
IRJET- Image Encryption based on Non-Subsampled Contourlet Transform with Dif...IRJET Journal
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processingIJMIT JOURNAL
 
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...IRJET Journal
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different mediaseSAT Journals
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different mediaseSAT Publishing House
 
IRJET- LS Chaotic based Image Encryption System Via Permutation Models
IRJET- LS Chaotic based Image Encryption System Via Permutation ModelsIRJET- LS Chaotic based Image Encryption System Via Permutation Models
IRJET- LS Chaotic based Image Encryption System Via Permutation ModelsIRJET Journal
 
Encrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image SlicingEncrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image SlicingIRJET Journal
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHYSECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHYIRJET Journal
 
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET Journal
 
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUEACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUEIRJET Journal
 
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...IRJET Journal
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYIRJET Journal
 
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET Journal
 
IRJET- A Review Paper on Chaotic Map Image Encryption Techniques
IRJET-  	  A Review Paper on Chaotic Map Image Encryption TechniquesIRJET-  	  A Review Paper on Chaotic Map Image Encryption Techniques
IRJET- A Review Paper on Chaotic Map Image Encryption TechniquesIRJET Journal
 
Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...IRJET Journal
 
IRJET-Triple Layered Security on Android Based SMS Transaction
IRJET-Triple Layered Security on Android Based SMS TransactionIRJET-Triple Layered Security on Android Based SMS Transaction
IRJET-Triple Layered Security on Android Based SMS TransactionIRJET Journal
 
IMPLEMENTATION OF HAMMING NETWORK ALGORITHM TO DECIPHER THE CHARACTERS OF PIG...
IMPLEMENTATION OF HAMMING NETWORK ALGORITHM TO DECIPHER THE CHARACTERS OF PIG...IMPLEMENTATION OF HAMMING NETWORK ALGORITHM TO DECIPHER THE CHARACTERS OF PIG...
IMPLEMENTATION OF HAMMING NETWORK ALGORITHM TO DECIPHER THE CHARACTERS OF PIG...AM Publications
 

Similar to IRJET-Survey of Highly Secured Methods for Image Transmission using Image Segmentation, Permutation and Multi Encryption Technique (20)

A New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionA New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash Function
 
IRJET- Image Encryption based on Non-Subsampled Contourlet Transform with Dif...
IRJET- Image Encryption based on Non-Subsampled Contourlet Transform with Dif...IRJET- Image Encryption based on Non-Subsampled Contourlet Transform with Dif...
IRJET- Image Encryption based on Non-Subsampled Contourlet Transform with Dif...
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processing
 
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different medias
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different medias
 
IRJET- LS Chaotic based Image Encryption System Via Permutation Models
IRJET- LS Chaotic based Image Encryption System Via Permutation ModelsIRJET- LS Chaotic based Image Encryption System Via Permutation Models
IRJET- LS Chaotic based Image Encryption System Via Permutation Models
 
Encrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image SlicingEncrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image Slicing
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHYSECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
 
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
 
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUEACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
 
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
 
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share Images
 
IRJET- A Review Paper on Chaotic Map Image Encryption Techniques
IRJET-  	  A Review Paper on Chaotic Map Image Encryption TechniquesIRJET-  	  A Review Paper on Chaotic Map Image Encryption Techniques
IRJET- A Review Paper on Chaotic Map Image Encryption Techniques
 
Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...
 
IRJET-Triple Layered Security on Android Based SMS Transaction
IRJET-Triple Layered Security on Android Based SMS TransactionIRJET-Triple Layered Security on Android Based SMS Transaction
IRJET-Triple Layered Security on Android Based SMS Transaction
 
IMPLEMENTATION OF HAMMING NETWORK ALGORITHM TO DECIPHER THE CHARACTERS OF PIG...
IMPLEMENTATION OF HAMMING NETWORK ALGORITHM TO DECIPHER THE CHARACTERS OF PIG...IMPLEMENTATION OF HAMMING NETWORK ALGORITHM TO DECIPHER THE CHARACTERS OF PIG...
IMPLEMENTATION OF HAMMING NETWORK ALGORITHM TO DECIPHER THE CHARACTERS OF PIG...
 
R04405103106
R04405103106R04405103106
R04405103106
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 

Recently uploaded (20)

Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 

IRJET-Survey of Highly Secured Methods for Image Transmission using Image Segmentation, Permutation and Multi Encryption Technique

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5209 SURVEY OF HIGHLY SECURED METHODS FOR IMAGE TRANSMISSION USING IMAGE SEGMENTATION, PERMUTATION AND MULTI ENCRYPTION TECHNIQUE Pratibha Pradhan1, Rasmiranjan Samantray2 1,2Central College of Engineering and Management, Kabir Nagar, Raipur, Chhattisgarh Swami Vivekanand Technical University, Raipur, Chhattisgarh, India ----------------------------------------------------------------***------------------------------------------------------------- Abstract - In recent years, several encryption schemes have been proposed to protect data from unauthorized access. It is not suitable to use traditional encryption algorithms for image encryption which were proposed for textual data. The encryption schemes used for images are computationally expensive and power hungry, hence not suitable for mobile phone devices. The protection of multimedia data is becoming very important. The protection of this multimedia data can be done with encryption. There are so many different techniques are used to protect confidential image data from an unauthorized access. Keywords: Encryption, Decryption, Segmentation, Key. INTRODUCTION: With the advent of technological development multimedia transfer is growing every day. Mobile phones are the major way of transferring multimedia data these days. One of the most debatable critical issues of this age is the prevention of illegal access and sharing of multimedia data particularly the images, as digital images carry a large amount of information. This security issue has attracted the attention of many researchers in last two decades. There are different ways to secure data which include encryption and water marking [1]. Encryption is done by converting data into such a form that it cannot be read by unauthorized user. The protection of this multimedia data can be done with encryption. Encryption has long been used by militaries and governments to facilitate secret communication. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients but to unauthorized users. Encryption: In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot. Encryption does not itself prevent interference, but denies the intelligible content to a would-be interceptor. In an encryption scheme, the intended information or message, referred to as plaintext, is encrypted using an Encryption algorithm – a cipher – generating cipher text that can be read only if decrypted. For technical reasons, an encryption scheme usually uses a pseudo random encryption key generated by an algorithm. It is in principle possible to decrypt the message without possessing the key, but, for a well- designed encryption scheme, considerable computational resources and skills are required. Encryption has long been used by militaries and governments to facilitate secret communication. It is now commonly used in protecting information within many kinds of civilian systems. For example, the Computer Security Institute reported that in 2007, 71% of companies surveyed utilized encryption for some of their data in transit, and 53% utilized encryption for some of their data in storage Encryption is also used to protect data in transit, for example data being transferred via networks (e.g. the Internet, ecommerce), mobile telephones, wireless microphones, wireless intercom systems, Bluetooth devices and bank automatic teller machines. There have been numerous reports of data in transit being intercepted in recent years [2]. Data should also be encrypted when transmitted across networks in order to protect against eavesdropping of network traffic by unauthorized users. LITERATURE SURVEY Entire idea behind the proposed algorithm is built upon scrambling of image pixels based on random number generators. Authors in [3] presented similar work on image the Authors in [4] have mentioned the positive consequences of using a shuffle based technique. The proposed algorithm design also considered the author in [5] mentioning the downside of using linear congruently generator as the PRNG which includes statistical determinism due to the mechanical nature of the algorithm. Authors in [6] have talked about using linear congruential generator of order k>1 to generate random numbers which mimics true random generators. Authors in [7] presented an image encryption technique based on shuffling of pixel blocks with the help of chaotic map which predicts pixel positions. In this paper we propose a shuffle algorithm with minimal compression issues,
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5210 loss of data and also an undemanding encryption and decryption of image files. Nowadays, information security is becoming more important in data storage and transmission. Images are widely used in several processes. Therefore, the protection of image data from unauthorized access is important. Image encryption plays a significant role in the field of information hiding. Images are different from texts in many aspects such as high correlation among pixels and high redundancy. Thus, a variety of new image encryption schemes have been proposed [8]. Although we may use the traditional encryption algorithms to encrypt images directly, it is not a good idea for two reasons. The first is the image size is often larger than text. Consequently, the traditional encryption algorithms need longer time to directly encrypt the image data, the second, is the decrypted text must be equal to the original text, but this requirement is not necessary for image data. Due to the characteristic of human perception, a decrypted image containing small distortion is usually acceptable. According to image encryption techniques try to convert an image to another one that is hard to understand. On the other side, image decryption retrieves the original image from the encrypted one. Most of these proposed algorithms concentrate on dividing the image into different blocks which result in a stronger encryption algorithm with less correlation between the shares [9]. PROPOSED METHODOLOGY: Pixel- Shuffling: This section entails the core idea of the working algorithm. The image encryption methodology adapted in the algorithm majorly depends on shuffling the pixels according to the random numbers that are generated using the techniques covered in the previous sections. The basic operation in shuffling involves swapping two pixels to remove them from their original position. This process is repeated multiple times, in row & column order to have maximum displacement for each pixel. a) Row Shuffle The initial step of the algorithm after pseudo random number generation is to shuffle the pixels. This process starts with the row having the zero index being exchanged with the row number that is in the zeroth index of the random number array. Hence in our case the zeroth row gets exchanged with the third row and the current state of the image is saved. Now, the row pointer moves to the second row (or the first row index) and the corresponding random row number is taken from the random array i.e. the second row is exchanged with the first row and the state of the matrix is saved again. (b) Column Shuffle Similar procedure is followed again but this time, the columns of the pixel matrix are shuffled instead of the rows. This leads to the interchanging of the columns in a fashion that is predicted by the random numbers generated earlier. Our aim to have a column shuffle accompanying the row order shuffle is to displace the pixels in column order also rather than just in row order ensuring maximum diffusion. After both the row and the column shuffle are done, the algorithm returns a randomly shuffled array that has been subjected to a row wise shuffle and a column wise shuffle at the same time. Encryption Process: The encryption block starts by determining the number of iterations, which defines the number of times whole algorithm is repeated to get good results. Initially the counter is initialized at 0 and then it can be increased by one count after each iteration so that image is visually not in a condition to get recognized and shows robustness against cryptographic attacks. The proposed image encryption scheme shows comparable results and robustness against attacks with one iteration only, which in turn reduces the power consumption of the algorithm. To start shuffling of pixels in the rows, sum of all elements in rows is computed to get a row vector of 1 × 256. Then Modulo-2 of this sum is computed to convert the data in the form of binary numbers. Then shuffling of pixels is performed by using obtained Modulo-2 vector sum by right circular shifting pixels at 0s positions and left circular shifting of pixels at 1s positions. All the pixels in rows are shuffled using this operation. To start shuffling of pixels in the columns of already row shuffled image, sum of all elements in columns is computed to get a vector of 1×256.ThenModulo-2of this summited computed to convert the data in the form of 0s and 1s. Decryption Process: Number of maximum iterations is denoted which can be increased by counter of one. ITERmax is kept same in encryption and decryption blocks of algorithm to repeat the steps same time in both blocks. Column key vector (Kc) used to apply zeta function on rows of the final scrambled image, then row key vector (Kr) is used to apply zeta function on the columns. Sum of all elements in columns is computed to get a vector of 1×256. Then Modulo-2 of this sum is computed to convert the data in the form of 0s and 1s. Then shuffling of obtained Modulo-2 vector sum is performed by up circular shifting of pixels positioned at 0s and down circular shifting of 1s positions. Sum of all elements in rows is computed to get a vector of 1×256. Then Modulo-2 of this sum is computed to convert the data in the form of 0s and 1s. Then shuffling of obtained Modulo-2 vector sum is performed by right circular shifting of pixels on
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5211 positions of 0s and left circular shifting those at 1s positions. Permutation Process: In this process we are changing the original sequence of image parts. This process will increase the security during transmission. In mathematics, the notion of permutation relates to the act of arranging all the members of a set into some sequence or order, or if the set is already ordered, rearranging its elements, a process called permuting. These differ from combinations, which are selections of some members of a set where order is disregarded. Permutations are studied in almost every branch of mathematics. They are also appearing in many other fields of science. In computer science they are used for analysing sorting algorithms, in quantum physics for describing states of particles and in biology for describing RNA sequences. Permutation can be defined as bisections from a set onto itself. All permutations of a set with n elements from a symmetric group denoted Sn, where the group operation is function composition. RESULT ANALYSIS: In this section, we present the experimental results to exemplify the efficiency and performance of the proposed encryption algorithm. The complete reverse algorithm has also been tested to ensure uniformity between the source image and the decrypted image. The result from permutation based image encryption algorithm using block cipher approach 2015 is shown below- SENSITIVITY VALUES FOR THE TESTED IMAGES Example NPCR UACI A 0.9957 0.1483 B 0.9929 0.2224 C 0.9952 0.1454 Than permutation based image encryption algorithm using block cipher approach 2015 result is implemented by Energy Efficient Image Encryption Algorithm in 2017 and the given result is as shown below – NPCR AND UACI OF ENCRYPTED IMAGES Image Name NPCR UACI Cameraman 99.5956 33.5811 Lena 99.5859 33.4201 Checkerboard 99.6201 33.7082 Football 99.6078 33.6101 Rice 99.7120 33.7791 CONCLUSION: In this paper we proposed an image encryption algorithm based on seed values acquired from multiple pseudo random number generators which were comprehensible and had a straight forward implementation. The presented technique provides high security and confidentiality in transmission of image data over networks or storage of the same. The encryption method in our work has been tested on different image formats with best possible seed values and packs immense flexibility due to variable number of parameters that can be used as a deciding factor for the encryption process. The algorithm performs the operation in linear time, much faster than the existing image encryption techniques. The approach used is a simple, efficient and yet effective way to achieve image encryption using pre-existing technology. It is easy to comprehend and can be translated into techniques to implement image encryption on handheld devices or as a module. which could be integrated into a bigger system. REFERENCES: [1] K. Loukhaoukha, J.-Y. Chouinard, and A. Berdai, “A secure image encryption algorithm based on rubik’s cube principle,” Journal of Electrical and Computer Engineering, vol. 2012, p. 7, 2012. [2] X. Chai, Y. Chen, and L. Broyde, “A novel chaos-based image encryption algorithm using dna sequence operations,” Optics and Lasers in Engineering, vol. 88, pp. 197–213, 2017. [3] X. Chai, “An image encryption algorithm based on bit level brownian motion and new chaotic systems,” Multimedia Tools and Applications, vol. 76, no. 1, pp. 1159–1175, 2017. [4] W. Wang, H. Tan, Y. Pang, Z. Li, P. Ran, and J. Wu, “A novel encryption algorithm based on dwt and multichaos mapping,” Journal of Sensors, vol. 2016, 2016. [5] G. Ye, H. Zhao, and H. Chai, “Chaotic image encryption algorithm using wave-line permutation and block diffusion,” Nonlinear Dynamics, vol. 83, no. 4, pp. 2067– 2077, 2016. [6] A. Jain and N. Rajpal, “A robust image encryption algorithm resistant to attacks using dna and chaotic logistic maps,” Multimedia Tools and Applications, vol. 75, no. 10, pp. 5455–5472, 2016. [7] Y. Liu, J. Wang, J. Fan, and L. Gong, “Image encryption algorithm based on chaotic system and dynamic s-boxes composed of dna sequences,” Multimedia Tools and Applications, vol. 75, no. 8, pp. 4363–4382, 2016. Author Profile Pratibha Pradhan received the B.E degree in Electronics and Telecommunication Engineering from the Chhattisgarh Swami Vivekananda Technical University (CSVTU), Bhilai, India, in 2017, and pursuing her M.Tech.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5212 Degree in Digital Electronics in CSVTU, Bhilai, India. Her research interests include cryptography, Image Processing. Rasmiranjan Samantray is Assistant Professor in CCEM Raipur, India. He is a BE in Electronics and Telecommunication Engineering, M.Tech. in Communication System Engineering From KIIT University Bhubaneswar.