SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 876
LOSSLESS ENCRYPTION USING BITPLANE AND EDGEMAP CRYPT
ALGORITHMS
R.Pravallika1
1Assistant Professor & ECE Dept. Of Lingaya’s Institute of Management And Technology
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Cryptography places the major role in information
security. It is used in several cases mainly exploded with the
arrival and rise of internet. Cryptography has become
essential part of today’s information system, and it is being
exploited in many areas like remote access, onlineordersand
payments, email and messaging security etc. Cryptography is
nothing but the encrypt or decrypt the data/image. Its
dependent upon the key image technique. Thekey imagesizeis
either same or less than the original image. Using keyimage of
bit plane or edge map generated from another image (hiding
image). The key image is selected from the grayscale image or
color image for new/existing grayscale image. In this paper
I’m considering the color images using lossless encryption.
Lossless means without lost any information of image.
Two types of lossless image encryption algorithms are there
1. Bit plane Crypt algorithm.
2. Edge map Crypt algorithm.
In this process we are sent the images or videos one
person/path to another person/path. Those images or videos
may contain secured information. For providing high security
for these images or videos becomes an important issue for
individuals, business, governments as well, automobile,
medical, Construction and the Fashion industry require
designs, scanned data, building plans and blue-prints to be
safe guarded against espionage etc.
Key Words: Cryptography, key image, Bit plane slicing.
1. INTRODUCTION
Visual surveillance systems and networks make
remote video monitoring available for homeland security
purpose and also easy to transmit and share videos and
image data. With the ubiquitous deployment of visual
surveillance systems in many important areas such as
airports, commercial centres and also military strategic
places, large amounts of videos and images with security
information are generated,transmittedandstored[3].Image
encryption is an effective approach to protect images or
videos by transforming them into completely different
formats. Several data encryption algorithms like Data
Encryption Standard (DES) and Advanced Encryption
standard (AES) are proposed for encrypting images [14].
Image encryption can be accomplished by block-based
transformation algorithm which is based on the pixel value
rotation of image [6]. A few approaches to exploit the spatial
and cross-plane correlation among pixels are discussed, as
well as the possibility of exploiting the correlation between
colour bands.
Using a concept of a binary “key-image”, with the same size
of the original image to be encrypted. The bit plane crypt
algorithm generates the key-image by extractinga binary bit
plane from another new or existing image. The other
algorithm is an edge map obtained from a new or existing
image using a specific edge detector with a specified
threshold [8]. The algorithms decompose the original image
into its binary into its binary bit planes. The bit planes are
encrypted by performing an XOR operation with the key
image one by one. And then the order of all bit planes is
inverted. And combine all bit planes.Theresultingencrypted
image can be obtained by applyinga scramblingalgorithmto
the image/Video. Image security is a major challenge in
storage and transmission applications [10]. For example,
medical images with a patient’s records may be shared
among the doctors in different branches of a health service
organization over networks for different clinical purposes.
These images and videos may contain private information.
Providing high security fortheseimagesandvideosbecomes
an important issue for individuals, business and
governments as well.
2. METHODOLOGY:
In cryptography procedure first of all considers the original
image using that generates the key image it’s given to
encrypt algorithm and its produce the output. Output of
encrypt algorithm is considered as a input for decryption
technique given to corresponding decryption algorithm and
generates the original image.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 877
Fig: Flowchart of cryptography
Fig: Bit plane Crypt Encryption algorithm
Input: The original image is to be encrypted.
Step 1: Consider the new image or existing image with the
same size of the original image. That new image isconverted
into bit plane images.
Step 2: Obtain the key image by extract rTH bit plane of the
image in Step 1.
Step 3: Consider i= {1 (R),
2 (G),
3 (B)}.
Step 4: Decompose the original image i into binary Bit
planes.
Step 5: Perform the XOR operation between the key- Image
and each bit plane in S
Step 6: Invert the order of all bit planes.
Step 7: Combine all bit planes together to obtain the image.
Step 8: Scramble the resulting image using a selected
Scrambling method to generate the resulting Encrypted
image.
Output: The encrypted image.
The 8 bit-planes of a gray-scale image (the one on left).
There are eight because the original image uses eight bits
per pixel. A bit plane of a digital discrete signal (such as
image or sound) is a set of bits corresponding to a given bit
position in each of the binary numbers representing the
signal. Bit plane is sometimes used as synonymous
to Bitmap; however, technically the former refers to the
location of the data in memory and the latter to the data
itself. One aspect of using bit-planes is determining whether
a bit-plane is random noise or contains significant
information. One methodfor calculatingthisiscompare each
pixel (X,Y) to three adjacent pixels (X-1,Y), (X,Y-1) and (X-
1,Y-1). If the pixel is the same as at least two of the three
adjacent pixels, it is not noise. A noisy bit-plane will have
49% to 51% pixels that are noise.
Fig: Bit plane Decrypt Decryption algorithm
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 878
Fig: Edge map Crypt Encryption algorithm
First generate the key-image from another new/ existing
image with the same size as the original image using specific
edge detector with a selected thresholdvalue.Thekeyimage
is considered as the edge map. The edge map is frequently
used in image enhancement, compression,segmentation and
recognition.
Input : The original 2D or 3D image to be encrypted.
Step 1: Choose any or existing image with the same size of
the original image.
Step 2 : Obtain the key-image by extract the rth bit plane of
the image in Step 1.
Step 3 : Calculate the edge map from the existing image with
the same size of the original image.
Step 4 : Decompose the original image or each componentof
the 3D image into its binary bit planes.
Step 5 : Perform the XOR operation between the edgemap of
the key-image and each bit plane in Step 4.
Step 6 : Invert the order of all bit planes.
Step 7 : Combine all bit planes together to obtain the image.
Step 8 : Scramble the resulting image or components in Step
7 using a selected scrambling method to generate the
resulting encrypted image.
Output : The encrypted edge map image.
ENTROPY:
Entropy is a quantity which is used todescribethe`business'
of an image, i.e. the amount of information which must be
coded for by a compression algorithm. Low entropy images,
such as those containing a lot of black sky, have very little
contrast and large runs of pixels with the same orsimilar DN
values. An image that is perfectly flat will have an entropy of
zero. Consequently, they can be compressed to a relatively
small size. On the other hand, highentropyimagessuchasan
image of heavily cratered areas on the moon have a great
deal of contrast from one pixel to the next and consequently
cannot be compressed as much as low entropy images.
SIMULATION RESULTS
Fig: Result of Bit plane Encryption, Decryption And
Entropy Value.
Fig: Result of Edge map encryption, Decryption And
Entropy Value
3. CONCLUSION:
In this paper, two algorithms are implemented for lossless
encryption. To generate key image an either a Biplane Crypt
or an Edge map Crypt algorithm. Both algorithmsareeasy to
implement in software as well as hardware because they
operate at the binary levels. In these algorithms we are used
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 879
Watermarking and scrambling techniques. Here
watermarking technique reduces the noise levels in the
original images and simultaneouslyreconstructstheoriginal
image. Finally entropy is calculated to obtain the efficiency.
These two algorithms produced lossless encryption for all
type of formats like jpeg, bmp and so on. They are also
suitable for multimedia applications and real time
application such as mobile phone services and wireless
networks etc.
REFERENCES
[1].N. Madhumidha and Dr.S. Chandramathi Bonfring
International Journal of Advances in Image Processing, Vol.
2, Special Issue 1, Part 2, February 2012 63 ISSN.
[2]. Abdul Razzaque and Narendra Thakur International
Journal of Engineering Research & Technology(IJERT)Vol.1
Issue 5, July - 2012 ISSN: 2278-0181
[3]. Koo Kang in IEEE transactions on image processing, vol.
20, no. 1, January 2011 .
[4]. Jayanta Kumar Pal1, J. K. Mandal2 andKousik Dasgupta3
in (IJNSA), Vol.2, No.4, October 2010.
[5]. Debasish Jena1, Sanjay Kumar Jena2 in 978-0-7695-
3516-6/08 $25.00 © 2008 IEEE DOI
10.1109/ICACC.2009.109
[6]. Gonzalez R. C. , Woods R. E. and Eddins S. L. , 2009 .
Digital Image processing Using MATLAB. Gatesmark
PublishingA Division of Gatesmark, LLC..
[7]. M.J. Wainwright. “Sparse Graph Codes for Side
Information and Binning”, IEEE Signal Processing Magazine,
vol. 24 no.5, pp. 47-57, 2007.
[8]. D. Schonberg, S. Draper and K. Ramchandran, “On
Compression of Encrypted Images” Image Processing, 2006
IEEE International Conference on pp.269¡272, October2006.
[9]. Pei, S.C. and Ding, J.J. “Reversible Integer Color
Transform with Bit-Constraint” Image Processing, 2005. ICIP
2005. IEEE Int. Conf. on, vol. 3, 2005.
[10]. M. Johnson, P. Ishwar, V. Prabhakaran, D. Schonberg
and K. Ramchandran, “On Compressing Encrypted Data”
IEEE Tranaction on Signal Processing vol.52 no.10 pp.
2992¡3006, October 2004.
[11]. John Blesswin, Rema, Jenifer Josel 978-1-4244-9799-
71111$26.00 ©20 11 IEEE , in Proc. Eurographics,
Saarbrucken, Germany, Sep. 2002, pp. 341-348.
[12]. F.R. Kschischang, B.J. Frey, and H.-A. Loeliger, “Factor
graphs and the sum-product algorithm,” IEEE Trans. Inform.
Theory, vol. 47, no. 2, pp. 498-519, Feb. 2001.
[13]. Schnorr, C. P. and Jakobsson, M., 2000. Security of
signed ElGamal encryption. Springer Berlin Heidelberg.
[14]. National Institute of Standards and Technology, “Data
Encryption Standard
(DES),”http://csrc.nist.gov/publications/fips/fips46-
3/fips46- 3.pdf, 1999.
Author Details
R.PRAVALLIKA, LIMT-B.Tech, LBRC-
M.Tech, working as Assistant Professor
in ECE from Lingaya’s Institute Of
Management And Technology, Via
Nunna, Vijayawada, Krishna- District ,
Andhra Pradesh.

More Related Content

What's hot

A0540106
A0540106A0540106
A0540106
IOSR Journals
 
Secure IoT Systems Monitor Framework using Probabilistic Image Encryption
Secure IoT Systems Monitor Framework using Probabilistic Image EncryptionSecure IoT Systems Monitor Framework using Probabilistic Image Encryption
Secure IoT Systems Monitor Framework using Probabilistic Image Encryption
IJAEMSJORNAL
 
IRJET - Cryptanalysis of a Text Encryption Scheme based on Bit Plane Extraction
IRJET - Cryptanalysis of a Text Encryption Scheme based on Bit Plane ExtractionIRJET - Cryptanalysis of a Text Encryption Scheme based on Bit Plane Extraction
IRJET - Cryptanalysis of a Text Encryption Scheme based on Bit Plane Extraction
IRJET Journal
 
A secured data transmission system by reversible data hiding with scalable co...
A secured data transmission system by reversible data hiding with scalable co...A secured data transmission system by reversible data hiding with scalable co...
A secured data transmission system by reversible data hiding with scalable co...
IAEME Publication
 
Background differencing algorithm for moving object detection using system ge...
Background differencing algorithm for moving object detection using system ge...Background differencing algorithm for moving object detection using system ge...
Background differencing algorithm for moving object detection using system ge...
eSAT Publishing House
 
Canny Edge Detection Algorithm on FPGA
Canny Edge Detection Algorithm on FPGA Canny Edge Detection Algorithm on FPGA
Canny Edge Detection Algorithm on FPGA
IOSR Journals
 
"Approaches for Energy Efficient Implementation of Deep Neural Networks," a P...
"Approaches for Energy Efficient Implementation of Deep Neural Networks," a P..."Approaches for Energy Efficient Implementation of Deep Neural Networks," a P...
"Approaches for Energy Efficient Implementation of Deep Neural Networks," a P...
Edge AI and Vision Alliance
 
A Novel Background Subtraction Algorithm for Dynamic Texture Scenes
A Novel Background Subtraction Algorithm for Dynamic Texture ScenesA Novel Background Subtraction Algorithm for Dynamic Texture Scenes
A Novel Background Subtraction Algorithm for Dynamic Texture Scenes
IJMER
 
IRJET- Image Encryption based on Non-Subsampled Contourlet Transform with Dif...
IRJET- Image Encryption based on Non-Subsampled Contourlet Transform with Dif...IRJET- Image Encryption based on Non-Subsampled Contourlet Transform with Dif...
IRJET- Image Encryption based on Non-Subsampled Contourlet Transform with Dif...
IRJET Journal
 
IRJET- Full Body Motion Detection and Surveillance System Application
IRJET-  	  Full Body Motion Detection and Surveillance System ApplicationIRJET-  	  Full Body Motion Detection and Surveillance System Application
IRJET- Full Body Motion Detection and Surveillance System Application
IRJET Journal
 
IRJET- A Novel Technique of Image Steganography
IRJET- A Novel Technique of Image SteganographyIRJET- A Novel Technique of Image Steganography
IRJET- A Novel Technique of Image Steganography
IRJET Journal
 
76201950
7620195076201950
76201950
IJRAT
 
Human Action Recognition using Contour History Images and Neural Networks Cla...
Human Action Recognition using Contour History Images and Neural Networks Cla...Human Action Recognition using Contour History Images and Neural Networks Cla...
Human Action Recognition using Contour History Images and Neural Networks Cla...
IRJET Journal
 
IRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure TransmissionIRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET Journal
 
3D Volumetric Data Generation with Generative Adversarial Networks
3D Volumetric Data Generation with Generative Adversarial Networks3D Volumetric Data Generation with Generative Adversarial Networks
3D Volumetric Data Generation with Generative Adversarial Networks
Preferred Networks
 
Gi3511181122
Gi3511181122Gi3511181122
Gi3511181122
IJERA Editor
 
Digital image processing using matlab
Digital image processing using matlab Digital image processing using matlab
Digital image processing using matlab
Amr Rashed
 
A novel technique of visual cryptography for maintaining the security of visu...
A novel technique of visual cryptography for maintaining the security of visu...A novel technique of visual cryptography for maintaining the security of visu...
A novel technique of visual cryptography for maintaining the security of visu...
IAEME Publication
 
Cross-Year Multi-Modal Image Retrieval Using Siamese Networks by Margarita Kh...
Cross-Year Multi-Modal Image Retrieval Using Siamese Networks by Margarita Kh...Cross-Year Multi-Modal Image Retrieval Using Siamese Networks by Margarita Kh...
Cross-Year Multi-Modal Image Retrieval Using Siamese Networks by Margarita Kh...
Paris Women in Machine Learning and Data Science
 

What's hot (19)

A0540106
A0540106A0540106
A0540106
 
Secure IoT Systems Monitor Framework using Probabilistic Image Encryption
Secure IoT Systems Monitor Framework using Probabilistic Image EncryptionSecure IoT Systems Monitor Framework using Probabilistic Image Encryption
Secure IoT Systems Monitor Framework using Probabilistic Image Encryption
 
IRJET - Cryptanalysis of a Text Encryption Scheme based on Bit Plane Extraction
IRJET - Cryptanalysis of a Text Encryption Scheme based on Bit Plane ExtractionIRJET - Cryptanalysis of a Text Encryption Scheme based on Bit Plane Extraction
IRJET - Cryptanalysis of a Text Encryption Scheme based on Bit Plane Extraction
 
A secured data transmission system by reversible data hiding with scalable co...
A secured data transmission system by reversible data hiding with scalable co...A secured data transmission system by reversible data hiding with scalable co...
A secured data transmission system by reversible data hiding with scalable co...
 
Background differencing algorithm for moving object detection using system ge...
Background differencing algorithm for moving object detection using system ge...Background differencing algorithm for moving object detection using system ge...
Background differencing algorithm for moving object detection using system ge...
 
Canny Edge Detection Algorithm on FPGA
Canny Edge Detection Algorithm on FPGA Canny Edge Detection Algorithm on FPGA
Canny Edge Detection Algorithm on FPGA
 
"Approaches for Energy Efficient Implementation of Deep Neural Networks," a P...
"Approaches for Energy Efficient Implementation of Deep Neural Networks," a P..."Approaches for Energy Efficient Implementation of Deep Neural Networks," a P...
"Approaches for Energy Efficient Implementation of Deep Neural Networks," a P...
 
A Novel Background Subtraction Algorithm for Dynamic Texture Scenes
A Novel Background Subtraction Algorithm for Dynamic Texture ScenesA Novel Background Subtraction Algorithm for Dynamic Texture Scenes
A Novel Background Subtraction Algorithm for Dynamic Texture Scenes
 
IRJET- Image Encryption based on Non-Subsampled Contourlet Transform with Dif...
IRJET- Image Encryption based on Non-Subsampled Contourlet Transform with Dif...IRJET- Image Encryption based on Non-Subsampled Contourlet Transform with Dif...
IRJET- Image Encryption based on Non-Subsampled Contourlet Transform with Dif...
 
IRJET- Full Body Motion Detection and Surveillance System Application
IRJET-  	  Full Body Motion Detection and Surveillance System ApplicationIRJET-  	  Full Body Motion Detection and Surveillance System Application
IRJET- Full Body Motion Detection and Surveillance System Application
 
IRJET- A Novel Technique of Image Steganography
IRJET- A Novel Technique of Image SteganographyIRJET- A Novel Technique of Image Steganography
IRJET- A Novel Technique of Image Steganography
 
76201950
7620195076201950
76201950
 
Human Action Recognition using Contour History Images and Neural Networks Cla...
Human Action Recognition using Contour History Images and Neural Networks Cla...Human Action Recognition using Contour History Images and Neural Networks Cla...
Human Action Recognition using Contour History Images and Neural Networks Cla...
 
IRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure TransmissionIRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure Transmission
 
3D Volumetric Data Generation with Generative Adversarial Networks
3D Volumetric Data Generation with Generative Adversarial Networks3D Volumetric Data Generation with Generative Adversarial Networks
3D Volumetric Data Generation with Generative Adversarial Networks
 
Gi3511181122
Gi3511181122Gi3511181122
Gi3511181122
 
Digital image processing using matlab
Digital image processing using matlab Digital image processing using matlab
Digital image processing using matlab
 
A novel technique of visual cryptography for maintaining the security of visu...
A novel technique of visual cryptography for maintaining the security of visu...A novel technique of visual cryptography for maintaining the security of visu...
A novel technique of visual cryptography for maintaining the security of visu...
 
Cross-Year Multi-Modal Image Retrieval Using Siamese Networks by Margarita Kh...
Cross-Year Multi-Modal Image Retrieval Using Siamese Networks by Margarita Kh...Cross-Year Multi-Modal Image Retrieval Using Siamese Networks by Margarita Kh...
Cross-Year Multi-Modal Image Retrieval Using Siamese Networks by Margarita Kh...
 

Similar to Lossless Encryption using BITPLANE and EDGEMAP Crypt Algorithms

IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET-  	  Hybrid Approach to Text & Image Steganography using AES and LSB Te...IRJET-  	  Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET Journal
 
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET Journal
 
Effective Compression of Digital Video
Effective Compression of Digital VideoEffective Compression of Digital Video
Effective Compression of Digital Video
IRJET Journal
 
IRJET- GSVD Algorithm for Image Encryption
IRJET-  	  GSVD Algorithm for Image EncryptionIRJET-  	  GSVD Algorithm for Image Encryption
IRJET- GSVD Algorithm for Image Encryption
IRJET Journal
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
IRJET Journal
 
IRJET- Homomorphic Image Encryption
IRJET-  	  Homomorphic Image EncryptionIRJET-  	  Homomorphic Image Encryption
IRJET- Homomorphic Image Encryption
IRJET Journal
 
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
IRJET Journal
 
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET Journal
 
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUEACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
IRJET Journal
 
Implementation for Data Hiding using Visual Cryptography
Implementation for Data Hiding using Visual Cryptography           Implementation for Data Hiding using Visual Cryptography
Implementation for Data Hiding using Visual Cryptography
IRJET Journal
 
Information hiding in edge location of video using amalgamate fft and cubic s...
Information hiding in edge location of video using amalgamate fft and cubic s...Information hiding in edge location of video using amalgamate fft and cubic s...
Information hiding in edge location of video using amalgamate fft and cubic s...
IAEME Publication
 
Frequency Domain Approach of Image Steganography
Frequency Domain Approach of Image SteganographyFrequency Domain Approach of Image Steganography
Frequency Domain Approach of Image Steganography
AM Publications,India
 
Encryption of Decomposed Image by using ASCII Code based Carrier Signal
Encryption of Decomposed Image by using ASCII Code based Carrier SignalEncryption of Decomposed Image by using ASCII Code based Carrier Signal
Encryption of Decomposed Image by using ASCII Code based Carrier Signal
IRJET Journal
 
IRJET - Steganography based on Discrete Wavelet Transform
IRJET -  	  Steganography based on Discrete Wavelet TransformIRJET -  	  Steganography based on Discrete Wavelet Transform
IRJET - Steganography based on Discrete Wavelet Transform
IRJET Journal
 
IRJET- Image Processing using Steganography
IRJET-  	  Image Processing using SteganographyIRJET-  	  Image Processing using Steganography
IRJET- Image Processing using Steganography
IRJET Journal
 
Hybrid DCT-DWT Digital Image Steganography
Hybrid DCT-DWT Digital Image SteganographyHybrid DCT-DWT Digital Image Steganography
Hybrid DCT-DWT Digital Image Steganography
IRJET Journal
 
DCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video SequenceDCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video Sequence
IJERA Editor
 
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share Images
IRJET Journal
 
IRJET- Low Band Width High Secured Image Transmission in Robust Channels
IRJET-  	  Low Band Width High Secured Image Transmission in Robust ChannelsIRJET-  	  Low Band Width High Secured Image Transmission in Robust Channels
IRJET- Low Band Width High Secured Image Transmission in Robust Channels
IRJET Journal
 
Reversible Image Data Hiding with Contrast Enhancement
Reversible Image Data Hiding with Contrast EnhancementReversible Image Data Hiding with Contrast Enhancement
Reversible Image Data Hiding with Contrast Enhancement
IRJET Journal
 

Similar to Lossless Encryption using BITPLANE and EDGEMAP Crypt Algorithms (20)

IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET-  	  Hybrid Approach to Text & Image Steganography using AES and LSB Te...IRJET-  	  Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
 
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
 
Effective Compression of Digital Video
Effective Compression of Digital VideoEffective Compression of Digital Video
Effective Compression of Digital Video
 
IRJET- GSVD Algorithm for Image Encryption
IRJET-  	  GSVD Algorithm for Image EncryptionIRJET-  	  GSVD Algorithm for Image Encryption
IRJET- GSVD Algorithm for Image Encryption
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
IRJET- Homomorphic Image Encryption
IRJET-  	  Homomorphic Image EncryptionIRJET-  	  Homomorphic Image Encryption
IRJET- Homomorphic Image Encryption
 
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
 
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
 
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUEACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
 
Implementation for Data Hiding using Visual Cryptography
Implementation for Data Hiding using Visual Cryptography           Implementation for Data Hiding using Visual Cryptography
Implementation for Data Hiding using Visual Cryptography
 
Information hiding in edge location of video using amalgamate fft and cubic s...
Information hiding in edge location of video using amalgamate fft and cubic s...Information hiding in edge location of video using amalgamate fft and cubic s...
Information hiding in edge location of video using amalgamate fft and cubic s...
 
Frequency Domain Approach of Image Steganography
Frequency Domain Approach of Image SteganographyFrequency Domain Approach of Image Steganography
Frequency Domain Approach of Image Steganography
 
Encryption of Decomposed Image by using ASCII Code based Carrier Signal
Encryption of Decomposed Image by using ASCII Code based Carrier SignalEncryption of Decomposed Image by using ASCII Code based Carrier Signal
Encryption of Decomposed Image by using ASCII Code based Carrier Signal
 
IRJET - Steganography based on Discrete Wavelet Transform
IRJET -  	  Steganography based on Discrete Wavelet TransformIRJET -  	  Steganography based on Discrete Wavelet Transform
IRJET - Steganography based on Discrete Wavelet Transform
 
IRJET- Image Processing using Steganography
IRJET-  	  Image Processing using SteganographyIRJET-  	  Image Processing using Steganography
IRJET- Image Processing using Steganography
 
Hybrid DCT-DWT Digital Image Steganography
Hybrid DCT-DWT Digital Image SteganographyHybrid DCT-DWT Digital Image Steganography
Hybrid DCT-DWT Digital Image Steganography
 
DCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video SequenceDCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video Sequence
 
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share Images
 
IRJET- Low Band Width High Secured Image Transmission in Robust Channels
IRJET-  	  Low Band Width High Secured Image Transmission in Robust ChannelsIRJET-  	  Low Band Width High Secured Image Transmission in Robust Channels
IRJET- Low Band Width High Secured Image Transmission in Robust Channels
 
Reversible Image Data Hiding with Contrast Enhancement
Reversible Image Data Hiding with Contrast EnhancementReversible Image Data Hiding with Contrast Enhancement
Reversible Image Data Hiding with Contrast Enhancement
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
heavyhaig
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
mahammadsalmanmech
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
Ratnakar Mikkili
 

Recently uploaded (20)

RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
 

Lossless Encryption using BITPLANE and EDGEMAP Crypt Algorithms

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 876 LOSSLESS ENCRYPTION USING BITPLANE AND EDGEMAP CRYPT ALGORITHMS R.Pravallika1 1Assistant Professor & ECE Dept. Of Lingaya’s Institute of Management And Technology ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Cryptography places the major role in information security. It is used in several cases mainly exploded with the arrival and rise of internet. Cryptography has become essential part of today’s information system, and it is being exploited in many areas like remote access, onlineordersand payments, email and messaging security etc. Cryptography is nothing but the encrypt or decrypt the data/image. Its dependent upon the key image technique. Thekey imagesizeis either same or less than the original image. Using keyimage of bit plane or edge map generated from another image (hiding image). The key image is selected from the grayscale image or color image for new/existing grayscale image. In this paper I’m considering the color images using lossless encryption. Lossless means without lost any information of image. Two types of lossless image encryption algorithms are there 1. Bit plane Crypt algorithm. 2. Edge map Crypt algorithm. In this process we are sent the images or videos one person/path to another person/path. Those images or videos may contain secured information. For providing high security for these images or videos becomes an important issue for individuals, business, governments as well, automobile, medical, Construction and the Fashion industry require designs, scanned data, building plans and blue-prints to be safe guarded against espionage etc. Key Words: Cryptography, key image, Bit plane slicing. 1. INTRODUCTION Visual surveillance systems and networks make remote video monitoring available for homeland security purpose and also easy to transmit and share videos and image data. With the ubiquitous deployment of visual surveillance systems in many important areas such as airports, commercial centres and also military strategic places, large amounts of videos and images with security information are generated,transmittedandstored[3].Image encryption is an effective approach to protect images or videos by transforming them into completely different formats. Several data encryption algorithms like Data Encryption Standard (DES) and Advanced Encryption standard (AES) are proposed for encrypting images [14]. Image encryption can be accomplished by block-based transformation algorithm which is based on the pixel value rotation of image [6]. A few approaches to exploit the spatial and cross-plane correlation among pixels are discussed, as well as the possibility of exploiting the correlation between colour bands. Using a concept of a binary “key-image”, with the same size of the original image to be encrypted. The bit plane crypt algorithm generates the key-image by extractinga binary bit plane from another new or existing image. The other algorithm is an edge map obtained from a new or existing image using a specific edge detector with a specified threshold [8]. The algorithms decompose the original image into its binary into its binary bit planes. The bit planes are encrypted by performing an XOR operation with the key image one by one. And then the order of all bit planes is inverted. And combine all bit planes.Theresultingencrypted image can be obtained by applyinga scramblingalgorithmto the image/Video. Image security is a major challenge in storage and transmission applications [10]. For example, medical images with a patient’s records may be shared among the doctors in different branches of a health service organization over networks for different clinical purposes. These images and videos may contain private information. Providing high security fortheseimagesandvideosbecomes an important issue for individuals, business and governments as well. 2. METHODOLOGY: In cryptography procedure first of all considers the original image using that generates the key image it’s given to encrypt algorithm and its produce the output. Output of encrypt algorithm is considered as a input for decryption technique given to corresponding decryption algorithm and generates the original image.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 877 Fig: Flowchart of cryptography Fig: Bit plane Crypt Encryption algorithm Input: The original image is to be encrypted. Step 1: Consider the new image or existing image with the same size of the original image. That new image isconverted into bit plane images. Step 2: Obtain the key image by extract rTH bit plane of the image in Step 1. Step 3: Consider i= {1 (R), 2 (G), 3 (B)}. Step 4: Decompose the original image i into binary Bit planes. Step 5: Perform the XOR operation between the key- Image and each bit plane in S Step 6: Invert the order of all bit planes. Step 7: Combine all bit planes together to obtain the image. Step 8: Scramble the resulting image using a selected Scrambling method to generate the resulting Encrypted image. Output: The encrypted image. The 8 bit-planes of a gray-scale image (the one on left). There are eight because the original image uses eight bits per pixel. A bit plane of a digital discrete signal (such as image or sound) is a set of bits corresponding to a given bit position in each of the binary numbers representing the signal. Bit plane is sometimes used as synonymous to Bitmap; however, technically the former refers to the location of the data in memory and the latter to the data itself. One aspect of using bit-planes is determining whether a bit-plane is random noise or contains significant information. One methodfor calculatingthisiscompare each pixel (X,Y) to three adjacent pixels (X-1,Y), (X,Y-1) and (X- 1,Y-1). If the pixel is the same as at least two of the three adjacent pixels, it is not noise. A noisy bit-plane will have 49% to 51% pixels that are noise. Fig: Bit plane Decrypt Decryption algorithm
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 878 Fig: Edge map Crypt Encryption algorithm First generate the key-image from another new/ existing image with the same size as the original image using specific edge detector with a selected thresholdvalue.Thekeyimage is considered as the edge map. The edge map is frequently used in image enhancement, compression,segmentation and recognition. Input : The original 2D or 3D image to be encrypted. Step 1: Choose any or existing image with the same size of the original image. Step 2 : Obtain the key-image by extract the rth bit plane of the image in Step 1. Step 3 : Calculate the edge map from the existing image with the same size of the original image. Step 4 : Decompose the original image or each componentof the 3D image into its binary bit planes. Step 5 : Perform the XOR operation between the edgemap of the key-image and each bit plane in Step 4. Step 6 : Invert the order of all bit planes. Step 7 : Combine all bit planes together to obtain the image. Step 8 : Scramble the resulting image or components in Step 7 using a selected scrambling method to generate the resulting encrypted image. Output : The encrypted edge map image. ENTROPY: Entropy is a quantity which is used todescribethe`business' of an image, i.e. the amount of information which must be coded for by a compression algorithm. Low entropy images, such as those containing a lot of black sky, have very little contrast and large runs of pixels with the same orsimilar DN values. An image that is perfectly flat will have an entropy of zero. Consequently, they can be compressed to a relatively small size. On the other hand, highentropyimagessuchasan image of heavily cratered areas on the moon have a great deal of contrast from one pixel to the next and consequently cannot be compressed as much as low entropy images. SIMULATION RESULTS Fig: Result of Bit plane Encryption, Decryption And Entropy Value. Fig: Result of Edge map encryption, Decryption And Entropy Value 3. CONCLUSION: In this paper, two algorithms are implemented for lossless encryption. To generate key image an either a Biplane Crypt or an Edge map Crypt algorithm. Both algorithmsareeasy to implement in software as well as hardware because they operate at the binary levels. In these algorithms we are used
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 879 Watermarking and scrambling techniques. Here watermarking technique reduces the noise levels in the original images and simultaneouslyreconstructstheoriginal image. Finally entropy is calculated to obtain the efficiency. These two algorithms produced lossless encryption for all type of formats like jpeg, bmp and so on. They are also suitable for multimedia applications and real time application such as mobile phone services and wireless networks etc. REFERENCES [1].N. Madhumidha and Dr.S. Chandramathi Bonfring International Journal of Advances in Image Processing, Vol. 2, Special Issue 1, Part 2, February 2012 63 ISSN. [2]. Abdul Razzaque and Narendra Thakur International Journal of Engineering Research & Technology(IJERT)Vol.1 Issue 5, July - 2012 ISSN: 2278-0181 [3]. Koo Kang in IEEE transactions on image processing, vol. 20, no. 1, January 2011 . [4]. Jayanta Kumar Pal1, J. K. Mandal2 andKousik Dasgupta3 in (IJNSA), Vol.2, No.4, October 2010. [5]. Debasish Jena1, Sanjay Kumar Jena2 in 978-0-7695- 3516-6/08 $25.00 © 2008 IEEE DOI 10.1109/ICACC.2009.109 [6]. Gonzalez R. C. , Woods R. E. and Eddins S. L. , 2009 . Digital Image processing Using MATLAB. Gatesmark PublishingA Division of Gatesmark, LLC.. [7]. M.J. Wainwright. “Sparse Graph Codes for Side Information and Binning”, IEEE Signal Processing Magazine, vol. 24 no.5, pp. 47-57, 2007. [8]. D. Schonberg, S. Draper and K. Ramchandran, “On Compression of Encrypted Images” Image Processing, 2006 IEEE International Conference on pp.269¡272, October2006. [9]. Pei, S.C. and Ding, J.J. “Reversible Integer Color Transform with Bit-Constraint” Image Processing, 2005. ICIP 2005. IEEE Int. Conf. on, vol. 3, 2005. [10]. M. Johnson, P. Ishwar, V. Prabhakaran, D. Schonberg and K. Ramchandran, “On Compressing Encrypted Data” IEEE Tranaction on Signal Processing vol.52 no.10 pp. 2992¡3006, October 2004. [11]. John Blesswin, Rema, Jenifer Josel 978-1-4244-9799- 71111$26.00 ©20 11 IEEE , in Proc. Eurographics, Saarbrucken, Germany, Sep. 2002, pp. 341-348. [12]. F.R. Kschischang, B.J. Frey, and H.-A. Loeliger, “Factor graphs and the sum-product algorithm,” IEEE Trans. Inform. Theory, vol. 47, no. 2, pp. 498-519, Feb. 2001. [13]. Schnorr, C. P. and Jakobsson, M., 2000. Security of signed ElGamal encryption. Springer Berlin Heidelberg. [14]. National Institute of Standards and Technology, “Data Encryption Standard (DES),”http://csrc.nist.gov/publications/fips/fips46- 3/fips46- 3.pdf, 1999. Author Details R.PRAVALLIKA, LIMT-B.Tech, LBRC- M.Tech, working as Assistant Professor in ECE from Lingaya’s Institute Of Management And Technology, Via Nunna, Vijayawada, Krishna- District , Andhra Pradesh.