Abstract :Multimedia data security is becoming important with the continuous increase of digital communications on internet. With the rapid development of various multimedia technologies, more and more multimedia data are generated and transmitted in the medical, commercial, and military fields, which may include some sensitive information which should not be accessed by or can only be partially exposed to the general users. . The encryption algorithms developed to secure text data are not suitable for multimedia application because of the large data size and real time constraint. Therefore, there is a great demand for secured data storage and transmission techniques. Information security has traditionally been ensured with data encryption and authentication techniques. The secrecy of communication is maintained by secret key exchange. In effect the strength of the algorithm depends solely on the length of the key. The presented work aims at secure video transmission using randomness in encryption algorithm, thereby creating more confusion to obtain the original data. The security of the original cipher has been enhanced by addition of impurities to misguide the cryptanalyst. Since the encryption process is one way function, the artificial neural networks are best suited for this purpose as they possess features like high security, no distortion and its ability to perform for non linear input-output characteristics, In the presented work the need for key exchange is also eliminated, which is otherwise a perquisite for most of the algorithms used today. The proposed work finds its application in medical imaging systems, military image database communication and confidential video conferencing, and similar such application. The results are obtained through the use of MATLAB 7.14.0 Keywords: Artificial Neural networks, Back propagation algorithm, video encryption and decryption, cipher and decipher.
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
Rapid growth of digital communication and multimedia application increases the need of security and it becomes an important issue of communication and storage of multimedia. Image Encryption is one of the techniques that are used to ensure high security. Various fields such as medical science military in which image encryption can be used. Recent cryptography provides necessary techniques for securing information and protective multimedia data. In last some years, encryption technology has been developed quickly and many image encryption methods have been used to protect confidential image data from illegal way in. Within this paper survey of different image encryption techniques have been discussed from which researchers can get an idea for efficient techniques to be used.
Cloud computing is a powerful, flexible, cost
efficient platform for providing consumer IT services
over the Internet. However Cloud Computing has
various level of risk because most important
information is maintained and managed by third party
vendors, which means harder to maintain security for
user’s data .Steganography is one of the ways to provide
security for secret data by inserting in an image or
video. In this most of the algorithms are based on the
Least Significant Bit (LSB), but the hackers easily
detects it embeds directly. An Efficient and secure
method of embedding secret message-extracting
message into or from color image using Artificial
Neural Network will be proposed. The proposed
method will be tested, implemented and analyzed for
various color images of different sizes and different
sizes of secret messages. The performance of the
algorithm will be analyzed by calculating various
parameters like PSNR, MSE and the results are good
compared to existing algorithms.
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
Rapid growth of digital communication and multimedia application increases the need of security and it becomes an important issue of communication and storage of multimedia. Image Encryption is one of the techniques that are used to ensure high security. Various fields such as medical science military in which image encryption can be used. Recent cryptography provides necessary techniques for securing information and protective multimedia data. In last some years, encryption technology has been developed quickly and many image encryption methods have been used to protect confidential image data from illegal way in. Within this paper survey of different image encryption techniques have been discussed from which researchers can get an idea for efficient techniques to be used.
Cloud computing is a powerful, flexible, cost
efficient platform for providing consumer IT services
over the Internet. However Cloud Computing has
various level of risk because most important
information is maintained and managed by third party
vendors, which means harder to maintain security for
user’s data .Steganography is one of the ways to provide
security for secret data by inserting in an image or
video. In this most of the algorithms are based on the
Least Significant Bit (LSB), but the hackers easily
detects it embeds directly. An Efficient and secure
method of embedding secret message-extracting
message into or from color image using Artificial
Neural Network will be proposed. The proposed
method will be tested, implemented and analyzed for
various color images of different sizes and different
sizes of secret messages. The performance of the
algorithm will be analyzed by calculating various
parameters like PSNR, MSE and the results are good
compared to existing algorithms.
Wireless communication systems, multi-input multi-output (MIMO) technology has been recognized as the key ingredient to support higher data rate as well as better transmission quality after using this algorithm of a XTEA or MTEA scheme. Modified TEA is used for encryption of the text. Then decryption unit for decrypting the cipher text and convert that to plain text. Key generation unit is to generate 128bit key and these keys are send along with cipher text. Encryption and decryption system ensures the original data are send and received by the users in secured environment. The Received data are retrieving by the authorized users by providing key generation like private keys this Key Pattern generations provide more security to the messages. Extended tiny encryption algorithm or modified tiny encryption algorithm and tiny encryption algorithm are used to enhance the size, speed and security in the system. These algorithms are better compared to configurable joint detection decoding algorithm (CJDD) and valid symbol finder algorithm.
Using SBR Algorithm To Hide The Data Into The JPEG ImageCSCJournals
Data hiding is the art of hiding data for various purposes such as--- to maintain private data, secure confidential data. Well known technique is the Steganography; Steganography has evolved into a digital strategy of hiding a file in some form of multimedia, such as an image, an audio file or even a video file. This paper presents a new Steganography technique in spatial domain for encoding extra information in an image by making small modifications to its pixels. The proposed method focuses on one particular popular technique, Least Significant Bit (LSB) Embedding. Instead of using the LSB-1 of the cover for embedding the message, LSB-2 has been used to increase the robustness of system. and protect the message against the external influences such as noise, filter, compression…etc.[Using SBR Algo].
For more protection to the message bits a Stego-Key has been used to permute the message bits before embedding it. An experimental result of the modified method shows that this paper helps to successfully hide the secret data into the image file with minimum distortion made to the image file.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Reversible Data Hiding in Encrypted Image: A ReviewEditor IJMTER
Recently, more and more attention is paid to reversible data hiding (RDH) in encrypted
images, since it maintains the excellent property that the original cover can be losslessly recovered
after embedded data is extracted while protecting the image content’s confidentiality. All previous
methods embed data by reversibly vacating room from the encrypted images, which may be subject
to some errors on data extraction and/or image restoration. In this survey paper, we discuss about
various methods and algorithms which were used for reversible data hiding (RDH) in encrypted
image to make data hiding process effortless. We also use visual cryptographic approach for
encryption which helps to protect the image during transmission. The scheme is suitable for
authentication based application where collective acceptance and decision making plays an important
role. The main goal is to retrieve the original image with lossless process and minimum computation
during image encryption /decryption by using keyless approach.
A novel secure combination technique of steganography and cryptographyZac Darcy
A new technique proposed with the combination of cryptography and steganography enhanced with new
secure feature for generating a new security system. Cryptography and Steganography are two popular
ways for secure data transmission in which the former distorts a message so it cannot be understood and
another hides a message so it cannot be seen. In cryptography, this system is used advanced encryption
standard (AES) algorithm to encrypt secret message and then these are separated keys; one of which is
used to hide in cover image. In steganography, a part of encrypted message as a key is used to hide in
discrete cosine transform (DCT) of an image which is highly secured. This kind of system is to be
introduced in applications such as transferring secret data that can be authentication of various fields.
Using this software any 50 sec audio message can be decrypted into image file and then original message can again be recovered from image file. This project is coded in Matlab and gui is also built in Matlab.
DCT Based Secret Image Hiding In Video SequenceIJERA Editor
Internet which is ever more accessible to interference by not with authority people over the World. It is important to bring down a chance of Information being sensed while Transmitting is the major issue these days. To overcome these problems one of the solution is cryptography. There will be no solitude once it is decoded. So hiding data to make it confidential. Copyright is one of the ways for hiding data and it is security for digital media. Its significance and techniques used in executing hiding of data let us see in brief. The existing LSB modification technique as in this approach the bits are randomly distributes the bits of message in image so which will becomes complex for anonymous persons to extract original message information, it opens the gates for loosing important hidden information. Here hiding and extraction method is used for AVI (Audio Video Interleave). As Higher order coefficients maintains Secret message bits. The hidden information will be in the form of gray scale image pixel values. Grayscale value then converted into binary values .The resultant binary values will be assigned to the higher order coefficient values of DCT of AVI video frames. These experiments were successful. We can analyze the results using Mat lab simulation software.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Asymmetric image encryption scheme based on Massey Omura scheme IJECEIAES
Asymmetric image encryption schemes have shown high resistance against modern cryptanalysis. Massey Omura scheme is one of the popular asymmetric key cryptosystems based on the hard mathematical problem which is discrete logarithm problem. This system is more secure and efficient since there is no exchange of keys during the protocols of encryption and decryption. Thus, this work tried to use this fact to propose a secure asymmetric image encryption scheme. In this scheme the sender and receiver agree on public parameters, then the scheme begin deal with image using Massey Omura scheme to encrypt it by the sender and then decrypted it by the receiver. The proposed scheme tested using peak signal to noise ratio, and unified average changing intensity to prove that it is fast and has high security.
Modeling and Analysis for Cutting Temperature in Turning of Aluminium 6063 Us...IOSR Journals
Deviation in machining process due to the temperature influence, cutting force, tool wear leads to
highly inferior quality of finished product, especially in high speed machining operations where product quality
and physical dimensions seems to be meticulous. Moreover, temperature is a significant noise parameter which
directly affects the cutting tool and work piece. Hence the aim of this project work is to study the machining
effect on 6063 Aluminium alloy at varies combinations of process parameters such as speed, feed rate and depth
of cut; and also to determine the effect of those parameters over the quality of finished product. A L27
Orthogonal Array (OA) based Design of Experiments (DOE) approach and Response Surface Methodology
(RSM) was used to analyse the machining effect on work material in this study. Using the practical data
obtained, a mathematical model was developed to predict the temperature influence and surface quality of
finished product. The ultimate goal of the study is to optimize the machining parameters for temperature
minimization in machining zone and improvement in surface finish.
Nuclear Magnetic Resonance (NMR) Analysis of D - (+) - Glucose: A Guide to Sp...IOSR Journals
NMR spectroscopy has a wide range of applications including exchange phenomena, the
identification and structural studies of complex biomolecules. 1D 1H-NMR without water suppression, 1D
Carbon, 1D 13C-DEPT135, 2D Cosy, 2D HSQC, 2D TOCSY, 2D HMQC, and 2D HMBC techniques were used
to completely elucidate the structure of glucose with spectral induced at 400MHz.. The spectral were analysed
using spinworks 3. The results obtained from the spectral data were systematically combined to elucidate the
structure of the D-glucose. Full characterisation of D-glucose was achieved by assigning 1H and 13C signals,
starting from the known to unknown signals.
Exact Analytical Expression for Outgoing Intensity from the Top of the Atmosp...IOSR Journals
This research is a part of the work devoted on the application of analytical Discrete Ordinate (ADO) method to the polarized monochromatic radiative transfer equation undergoing anisotropic scattering with source function matrix in a finite coupled Atmosphere –Ocean media having flat interface boundary conditions involving specular reflection and transmission matrix. Discontinuities in the derivatives of the Stokes vector with respect to the cosine of the polar angle at smooth interface between the two media with different refractive indices (air and water) is tackled by using a suitable quadrature scheme devised earlier. Atmosphere and ocean are assumed to be homogeneous. No stratification is adopted in the two media. Exact expression for the
emergent radiation intensity vector from the top of the atmosphere is derived. Exact expressions for the emergent polarized radiation intensity vector from the air-water interface as well as from any point of the two medium in any direction can also be derived in terms of eigenvectors and eigenvalues.
Wireless communication systems, multi-input multi-output (MIMO) technology has been recognized as the key ingredient to support higher data rate as well as better transmission quality after using this algorithm of a XTEA or MTEA scheme. Modified TEA is used for encryption of the text. Then decryption unit for decrypting the cipher text and convert that to plain text. Key generation unit is to generate 128bit key and these keys are send along with cipher text. Encryption and decryption system ensures the original data are send and received by the users in secured environment. The Received data are retrieving by the authorized users by providing key generation like private keys this Key Pattern generations provide more security to the messages. Extended tiny encryption algorithm or modified tiny encryption algorithm and tiny encryption algorithm are used to enhance the size, speed and security in the system. These algorithms are better compared to configurable joint detection decoding algorithm (CJDD) and valid symbol finder algorithm.
Using SBR Algorithm To Hide The Data Into The JPEG ImageCSCJournals
Data hiding is the art of hiding data for various purposes such as--- to maintain private data, secure confidential data. Well known technique is the Steganography; Steganography has evolved into a digital strategy of hiding a file in some form of multimedia, such as an image, an audio file or even a video file. This paper presents a new Steganography technique in spatial domain for encoding extra information in an image by making small modifications to its pixels. The proposed method focuses on one particular popular technique, Least Significant Bit (LSB) Embedding. Instead of using the LSB-1 of the cover for embedding the message, LSB-2 has been used to increase the robustness of system. and protect the message against the external influences such as noise, filter, compression…etc.[Using SBR Algo].
For more protection to the message bits a Stego-Key has been used to permute the message bits before embedding it. An experimental result of the modified method shows that this paper helps to successfully hide the secret data into the image file with minimum distortion made to the image file.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Reversible Data Hiding in Encrypted Image: A ReviewEditor IJMTER
Recently, more and more attention is paid to reversible data hiding (RDH) in encrypted
images, since it maintains the excellent property that the original cover can be losslessly recovered
after embedded data is extracted while protecting the image content’s confidentiality. All previous
methods embed data by reversibly vacating room from the encrypted images, which may be subject
to some errors on data extraction and/or image restoration. In this survey paper, we discuss about
various methods and algorithms which were used for reversible data hiding (RDH) in encrypted
image to make data hiding process effortless. We also use visual cryptographic approach for
encryption which helps to protect the image during transmission. The scheme is suitable for
authentication based application where collective acceptance and decision making plays an important
role. The main goal is to retrieve the original image with lossless process and minimum computation
during image encryption /decryption by using keyless approach.
A novel secure combination technique of steganography and cryptographyZac Darcy
A new technique proposed with the combination of cryptography and steganography enhanced with new
secure feature for generating a new security system. Cryptography and Steganography are two popular
ways for secure data transmission in which the former distorts a message so it cannot be understood and
another hides a message so it cannot be seen. In cryptography, this system is used advanced encryption
standard (AES) algorithm to encrypt secret message and then these are separated keys; one of which is
used to hide in cover image. In steganography, a part of encrypted message as a key is used to hide in
discrete cosine transform (DCT) of an image which is highly secured. This kind of system is to be
introduced in applications such as transferring secret data that can be authentication of various fields.
Using this software any 50 sec audio message can be decrypted into image file and then original message can again be recovered from image file. This project is coded in Matlab and gui is also built in Matlab.
DCT Based Secret Image Hiding In Video SequenceIJERA Editor
Internet which is ever more accessible to interference by not with authority people over the World. It is important to bring down a chance of Information being sensed while Transmitting is the major issue these days. To overcome these problems one of the solution is cryptography. There will be no solitude once it is decoded. So hiding data to make it confidential. Copyright is one of the ways for hiding data and it is security for digital media. Its significance and techniques used in executing hiding of data let us see in brief. The existing LSB modification technique as in this approach the bits are randomly distributes the bits of message in image so which will becomes complex for anonymous persons to extract original message information, it opens the gates for loosing important hidden information. Here hiding and extraction method is used for AVI (Audio Video Interleave). As Higher order coefficients maintains Secret message bits. The hidden information will be in the form of gray scale image pixel values. Grayscale value then converted into binary values .The resultant binary values will be assigned to the higher order coefficient values of DCT of AVI video frames. These experiments were successful. We can analyze the results using Mat lab simulation software.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Asymmetric image encryption scheme based on Massey Omura scheme IJECEIAES
Asymmetric image encryption schemes have shown high resistance against modern cryptanalysis. Massey Omura scheme is one of the popular asymmetric key cryptosystems based on the hard mathematical problem which is discrete logarithm problem. This system is more secure and efficient since there is no exchange of keys during the protocols of encryption and decryption. Thus, this work tried to use this fact to propose a secure asymmetric image encryption scheme. In this scheme the sender and receiver agree on public parameters, then the scheme begin deal with image using Massey Omura scheme to encrypt it by the sender and then decrypted it by the receiver. The proposed scheme tested using peak signal to noise ratio, and unified average changing intensity to prove that it is fast and has high security.
Modeling and Analysis for Cutting Temperature in Turning of Aluminium 6063 Us...IOSR Journals
Deviation in machining process due to the temperature influence, cutting force, tool wear leads to
highly inferior quality of finished product, especially in high speed machining operations where product quality
and physical dimensions seems to be meticulous. Moreover, temperature is a significant noise parameter which
directly affects the cutting tool and work piece. Hence the aim of this project work is to study the machining
effect on 6063 Aluminium alloy at varies combinations of process parameters such as speed, feed rate and depth
of cut; and also to determine the effect of those parameters over the quality of finished product. A L27
Orthogonal Array (OA) based Design of Experiments (DOE) approach and Response Surface Methodology
(RSM) was used to analyse the machining effect on work material in this study. Using the practical data
obtained, a mathematical model was developed to predict the temperature influence and surface quality of
finished product. The ultimate goal of the study is to optimize the machining parameters for temperature
minimization in machining zone and improvement in surface finish.
Nuclear Magnetic Resonance (NMR) Analysis of D - (+) - Glucose: A Guide to Sp...IOSR Journals
NMR spectroscopy has a wide range of applications including exchange phenomena, the
identification and structural studies of complex biomolecules. 1D 1H-NMR without water suppression, 1D
Carbon, 1D 13C-DEPT135, 2D Cosy, 2D HSQC, 2D TOCSY, 2D HMQC, and 2D HMBC techniques were used
to completely elucidate the structure of glucose with spectral induced at 400MHz.. The spectral were analysed
using spinworks 3. The results obtained from the spectral data were systematically combined to elucidate the
structure of the D-glucose. Full characterisation of D-glucose was achieved by assigning 1H and 13C signals,
starting from the known to unknown signals.
Exact Analytical Expression for Outgoing Intensity from the Top of the Atmosp...IOSR Journals
This research is a part of the work devoted on the application of analytical Discrete Ordinate (ADO) method to the polarized monochromatic radiative transfer equation undergoing anisotropic scattering with source function matrix in a finite coupled Atmosphere –Ocean media having flat interface boundary conditions involving specular reflection and transmission matrix. Discontinuities in the derivatives of the Stokes vector with respect to the cosine of the polar angle at smooth interface between the two media with different refractive indices (air and water) is tackled by using a suitable quadrature scheme devised earlier. Atmosphere and ocean are assumed to be homogeneous. No stratification is adopted in the two media. Exact expression for the
emergent radiation intensity vector from the top of the atmosphere is derived. Exact expressions for the emergent polarized radiation intensity vector from the air-water interface as well as from any point of the two medium in any direction can also be derived in terms of eigenvectors and eigenvalues.
I- Function and H -Function Associated With Double IntegralIOSR Journals
The object of this paper is to discuss certain integral properties of a I -function and H -function,
proposed by Inayat-Hussain which contain a certain class of Feynman integrals, the exact partition of a Gaussian
model in Statistical Mechanics and several other functions as its particular cases. During the course of finding,
we establish certain new double integral relation pertaining to a product involving I function and H function.
These double integral relations are unified in nature and act as a key formulae from which we can obtain as their
special case, double integral relations concerning a large number of simple special functions. For the sake of
illustration, we record here some special cases of our main results which are also new and of interest by
themselves. All the result which are established in this paper are basic in nature and are likely to find useful
applications in several fields notably electrical network, probability theory and statistical mechanics.
Analysis characteristics of power PV cells and wind turbine from power genera...IOSR Journals
This paper presents the implementation of a generalized photovoltaic model using Matlab Simulink
software package, which can be representative of PV cell, module, and array for easy use on simulation
platform. The proposed model is designed with a user-friendly icon and a dialog box like Simulink block
libraries. This makes the generalized PV model easily simulated and analyzed in conjunction with power
electronics for a maximum power point tracker. Taking the effect of sunlight irradiance and cell temperature
into consideration, the output current and power characteristics of PV model are simulated and optimized using
the proposed model. This enables the dynamics of PV power system to be easily simulated, analyzed, and
optimized.
For Wind Turbine modeling and simulation of wind driven electricity generation system or WECS (an
acronym for Wind Energy Conversion System) has been done. Our aim is to design and test a power 300W
capacity, operating at 3 m/s to 6 m/s , induction permanent magnet generator Matlab simulation. The different
components of a wind energy system namely the wind turbine, generator, rectifier, as per the scope of this
project following which the design steps and modeling of the system in Matlab simulation environment -
Simulink was undertaken
Monitoring Of Macronutrients Uptake by Soil and Potato Plants – A Comparative...IOSR Journals
Soil test1, 2 is necessary to identify optimal concentrations of essential elements required for plant growth. The fertility of soil is affected by the presence of some essential elements as Macronutrients like N, P& K. This study including the status of Macronutrients in the soil and potato plans. The percentage of nitrogen (N) in soil of potato plant was obtained 5.6% and 1.89% where as nitrogen percentage in plant ash was 17.45% and 16.4% respectively. But the phosphorus and potassium are present in adequate amount in soil. As it was found that the concentration of phosphorus (P) and potassium (K) in part per million in soil of potato was 62ppm and 148.3ppm and in potato plant ash the concentration was 64.23ppm and 103.3ppm respectively.
Measurement of Efficiency Level in Nigerian Seaport after Reform Policy Imple...IOSR Journals
This paper focuses on the impact of reforms on port performance using Onne and Rivers ports as a reference point. It analyses the pre and post reform eras of the ports in terms of their performance. The reforms took effect from 1996 after the Federal Government of Nigeria concessioned the ports to private investors. Parameters such as Ship traffic, Cargo throughput, Ship turn round time, Berth Occupancy and personnel were used as variables for the assessment. Secondary Data were collected from the Nigerian Ports Authority and Integrated Logistic Services Nigeria (Intels) for the period 2001 to 2010 and analyzed using Data Envelopment Analysis to assess the efficiency of the port. Analysis revealed a continuous improvement in the overall efficiency of both Ports Since 2006 when the new measure was introduced. Average Ship turn-around time improved in the ports due to modern and fast cargo handling equipment and more cargo handling space which were provided. There is an increase in Ship traffic calling at the ports, resulting in increased cargo throughput and berth occupancy rate at ports of Onne and Rivers. The reform also led to more private investment in the ports’ existing and new facilities and the introduction of a World Class service in port operation. This study concludes that the Ports of Onne and Rivers are performing better under the reform programme of the Federal Government of Nigeria. It finally recommends the urgent need for a regulator to appraise the performance of the reform programme from time to time as provided by the agreement and for the full adoption and utilization of management information system (MIS) to aid performance efficiency.
Determining Tax Literacy of Salaried Individuals - An Empirical AnalysisIOSR Journals
In personal financial planning, tax management plays a very important role. An individual should have thorough knowledge of various aspects of taxes and tax policies, which would help him to understand how much he can save even after paying taxes. Those people who have not taken any formal course on taxation finds it difficult to understand and comprehend the issues related to determination of tax liability, tax filling and tax saving. An attempt has been made through this paper to determine tax literacy level of salaried individuals based on various demographic and socio-economic factors. Findings of the study suggest that overall tax literacy level of respondents is not very high. The results suggest that level of tax literacy varies significantly among respondents. Also tax literacy level gets affected by gender, age, education, income, nature of employment and place of work whereas it does not get affected by geographic region. Findings of this paper suggest that government should adopt more aggressive approaches to educate taxpayers, thereby raising the level of tax literacy among them.
Role of Educational Qualification of Consumers on Need Recognition: A Study w...IOSR Journals
Demographic variables are the most popular bases for segmenting the customer groups. One reason is that consumer needs, wants, preferences and usage rates often highly associated with demographic variables. Another is that demographic variables are easier to measure than the most of other type variables. Marketers are keenly interested in the size and growth rate of population in different cities, regions, nations; age distribution; educational levels; household patterns; and regional characteristics and movements. Because, on the basis of these measures only, marketers have to formulate their marketing strategies in order to fulfil the needs, wants and preferences of consumers. Moreover, demographic variables make known the ongoing trends, such as shifts in age, sex and income distribution that signal new business opportunities to the marketers. Demographic trends are highly reliable for the short and intermediate run. This paper, with a strong backing of literature, explains the role of educational qualification of consumers on recognizing a need for car.
Unified V- Model Approach of Re-Engineering to reinforce Web Application Deve...IOSR Journals
Abstract: The diverse and dynamic nature of elements and techniques used to develop Web Application, due to
the lack of testing technique and effective programming principles which are used for implementing
basic software engineering principles, and undisciplined development processes insure by the high pressure
of a very short time to satisfy market request to develop Web application. This paper represent approaches of
reengineering in web that how reengineering process can be carried out to evolution activities in legacy
system as well we propose the V-model for re-engineering process. This paper presents the need of the
technologies and approaches for building new web-services from existing web-applications. In this
paper we present the processing of V-model for Reengineering in web application which is the extension of Vmodel
used in software domain. In our approach V-model incorporates with the methodology
throughout the phases of web development process to re-engineer the web system.
Keywords:Re-engineering, reverse engineering, forward engineering, V-model, application migration.
Chemical Investigations of Some Commercial Samples of Calcium Based Ayurvedic...IOSR Journals
Kapardika bhasma is an important Ayurvedic drug of marine origin. Even though it is composed of mainly of calcium carbonate it exhibits excellent medicinal properties which are not associated with standard calcium carbonate. In the present study four commercial samples are characterized using techniques like EDX, SEM, IR, UV,XRD and TG analysis to throw light on their chemical composition and chemical properties .Such comparative study may help to standardise and to interpret the biological and medicinal properties of such traditional drug.
“Impact of Demographics and Personality traits on Confidence level: Determina...IOSR Journals
The purpose of this study is to explore the relationship among demographics, personality traits and level of confidence. The impact of this paper is twofold, one is to measure the determinants of overconfidence in employees and other is in students. This paper adopts the primary data approach, collected from employees and students through questionnaires .Two diverse populations have been selected and various statistical technique (Pearson correlation, Pearson regression, Chi-square, and Kolmogorov-Smirnov tests) are used for analysis purpose using SPSS software on a 100 sample size. Research findings shows that in employees when Openness to experience increase , overconfidence level decrease, however all remaining personality traits(conscientiousness, agreeableness, emotional stability and openness to experience) is correlated with overconfidence. In students there is no correlation between overconfidence and any of the personality traits. The regression analysis findings show that no linear relationship exists between independent and dependent variable in employees for individual personality traits except of emotional stability. Only emotional stability has a significant predictor of overconfidence among all five personality traits. However the overall personality is the significant predictor of overconfidence in employees. For students, neither individual personality traits nor overall personality has linear relationship with overconfidence.
Convolutional neural network based key generation for security of data throug...IJECEIAES
Machine learning techniques, especially deep learning, are playing an increasingly important role in our lives. Deep learning uses different models to extract information from the data. They have already had a huge impact in areas such as health (i.e., cancer diagnosis), self-driving cars, speech recognition, and data encryption. Recently, deep learning models, including convolutional neural networks (CNN), have been proven to be more effective in the security field. Moreover, the National Institute of Standards and Technology (NIST) recommends the advanced encryption standard (AES) algorithm as the most often utilized encryption method in several security applications. In this paper, a crypt-intelligent system (CIS) capable of securing data is proposed. It is based on the combination of the performance of CNN with the AES, by substituting the key expansion unit of AES with a CNN architecture that performs the key generation. Our CIS is described using very high-speed integrated circuit (VHSIC) hardware description language (VHDL), simulated by ModelSim, synthesized, and implemented with Xilinx ISE 14.7. Finally, the Airtex-7 series XC7A100T device has achieved an encryption throughput of 965.88 Mbps. In addition, the CIS offers a high degree of flexibility and is supported by reconfigurability, based on the experimental results, if sufficient resources are available, the architecture can provide performance that can satisfy cryptographic applications.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A New Approach of Cryptographic Technique Using Simple ECC & ECFIJAEMSJORNAL
Cryptography is the technique in which usually a file is converted into unreadable format by using public key and private key system called as public key cryptosystem. Then as per the user requirement that file is send to another user for secure data transmission. In this paper we purposed an image based cryptography that Elliptic Curve Function (ECF) techniques and pseudo random encoding technique on images to enhance the security of RFID communication. In the ECF approach, the basic idea is to replace the Elliptic Curve Function (ECF) of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The ECF based technique is the most challenging one as it is difficult to differentiate between the cover object and Crypto object if few ECF bits of the cover object are replaced. In Pseudo Random technique, a random key is used as seed for the Pseudo Random Number Generator in needed in the embedding process. Both the techniques used a Crypto key while embedding messages inside the cover image. By using the key, the chance of getting attacked by the attacker is reduced.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
An improved color image encryption algorithm with pixel permutation and bit s...eSAT Journals
Abstract Today the transmission of multimedia data including image and video is growing in telecommunications. Security is one of the main issues in transferring such sensitive information. Powerful image encryption algorithm is the solution for this problem. This paper is an implementation of a color image encryption algorithm based on Rubik’s cube technique. The Rubik’s cube technique is used for pixel permutation and a bit substitution method based on DNA sequences are used to change the value of each pixel on the image. Then the time-stamp is appended with encrypted image, which can be used to identify the replay attack. For evaluating the performance of the algorithm a series of tests are performed. These tests include information entropy analysis, correlation analysis, analysis of NPCR and UACI values etc. Index Terms: Cryptography, encryption, decryption, timestamp, replay attack, plaintext, cipher-text, algorithm, chaos.
Data security and protection is one of the most common technologies used in the field of computer science. This is because of its great importance in all fields related to daily life, whether political, economic, and other aspects change. In this research paper, a new intelligent system that concentrates on image and text encryption and decryption is proposed. Furthermore, the image recognition rate is increased. In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. The proposed technique relies on using square root of public key as private key. XOR operation for colored images encryption and decryption is performed. By calculating signal to noise ratio (PSNR), mean square error (MSE), and bit error rate (BER), the most important things that we address how to provide data security for large data based on encryption techniques and increase the security of multimedia data and texture date and address the problem of time and accuracy in image matching. the results show that the quality of images after decryption is good.
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEIJNSA Journal
In this paper, a new image encryption scheme using a secret key of 144-bits is proposed. In the substitution process of the scheme, image is divided into blocks and subsequently into color components. Each color component is modified by performing bitwise operation which depends on secret key as well as a few most significant bits of its previous and next color component. Three rounds are taken to complete substitution process. To make cipher more robust, a feedback mechanism is also applied by modifying used secret key after encrypting each block. Further, resultant image is partitioned into several key based dynamic sub-images. Each sub-image passes through the scrambling process where pixels of sub-image are reshuffled within itself by using a generated magic square matrix. Five rounds are taken for scrambling process. The propose scheme is simple, fast and sensitive to the secret key. Due to high order of substitution and permutation, common attacks like linear and differential cryptanalysis are infeasible. The experimental results show that the proposed encryption technique is efficient and has high security features.
Unified Approach With Neural Network for Authentication, Security and Compres...CSCJournals
The Present demands of scientific and social life forced image processing based applications to have a tremendous growth. This growth at the same time has given numbers of challenges to researcher to meet the desired objectives of either users or from solution perspectives. Among the various challenges, the most dominating areas are: reduction in required memory spaces for storage or taken transmission time from one location to other, protection of image contents to maintain the privacy and to facilitate the mechanism to identify the malicious modification if there is any either in storage or in transmission channel. Even though there are number of methods proposed by various researchers and are existed as solutions, questions are remain open in terms of quality, cost and complexity. In this paper we have proposed the concept based on neural network to achieve the quality of compression, protection and authentication all together using the ability of universal approximation by learning, one way property and one to one mapping characteristics correspondingly. With the proposed methods not only we can authenticate the image but also positions of malicious activity given in the image can be located with high precision. Proposed methods are very efficient in performance as well as carry the features of simplicity and cost effectiveness.
Using image stitching and image steganography security can be provided to any image which has to be sent over the network or transferred using any electronic mode. There is a message and a secret image that has to be sent. The secret image is divided into parts.The first phase is the Encrypting Phase, which deals with the process of converting the actual secret message into ciphertext using the AES algorithm. In the second phase which is the Embedding Phase, the cipher text is embedded into any part of the secret image that is to be sent. Third phase is the Hiding Phase, where steganography is performed on the output image of Embedding Phase and other parts of the image where the parts are camouflaged by another image using least significant bit replacement. These individual parts are sent to the concerned receiver. At the receivers end decryption of Hiding phase and Embedding Phase takes place respectively. The parts obtained are stitched together using k nearest method. Using SIFT features the quality of the image is improved.
Using image stitching and image steganography security can be provided to any image which has to be
sent over the network or transferred using any electronic mode. There is a message and a secret image that
has to be sent. The secret image is divided into parts.The first phase is the Encrypting Phase, which deals
with the process of converting the actual secret message into ciphertext using the AES algorithm. In the
second phase which is the Embedding Phase, the cipher text is embedded into any part of the secret image
that is to be sent. Third phase is the Hiding Phase, where steganography is performed on the output image
of Embedding Phase and other parts of the image where the parts are camouflaged by another image using
least significant bit replacement. These individual parts are sent to the concerned receiver. At the
receivers end decryption of Hiding phase and Embedding Phase takes place respectively. The parts
obtained are stitched together using k nearest method. Using SIFT features the quality of the image is
improved.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
Similar to Video Encryption and Decryption with Authentication using Artificial Neural Networks (20)
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Video Encryption and Decryption with Authentication using Artificial Neural Networks
1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 6, Issue 6 (Jul. - Aug. 2013), PP 63-68
www.iosrjournals.org
www.iosrjournals.org 63 | Page
Video Encryption and Decryption with Authentication using
Artificial Neural Networks
Renuka.B.Talewad
(M.Tech,
Digital Communication, Basaveshwara Engineering College, Karnataka, India )
Abstract :Multimedia data security is becoming important with the continuous increase of digital
communications on internet. With the rapid development of various multimedia technologies, more and more
multimedia data are generated and transmitted in the medical, commercial, and military fields, which may
include some sensitive information which should not be accessed by or can only be partially exposed to the
general users. . The encryption algorithms developed to secure text data are not suitable for multimedia
application because of the large data size and real time constraint. Therefore, there is a great demand for
secured data storage and transmission techniques. Information security has traditionally been ensured with
data encryption and authentication techniques. The secrecy of communication is maintained by secret key
exchange. In effect the strength of the algorithm depends solely on the length of the key. The presented work
aims at secure video transmission using randomness in encryption algorithm, thereby creating more confusion
to obtain the original data. The security of the original cipher has been enhanced by addition of impurities to
misguide the cryptanalyst. Since the encryption process is one way function, the artificial neural networks are
best suited for this purpose as they possess features like high security, no distortion and its ability to perform for
non linear input-output characteristics, In the presented work the need for key exchange is also eliminated,
which is otherwise a perquisite for most of the algorithms used today. The proposed work finds its application in
medical imaging systems, military image database communication and confidential video conferencing, and
similar such application. The results are obtained through the use of MATLAB 7.14.0
Keywords: Artificial Neural networks, Back propagation algorithm, video encryption and decryption, cipher
and decipher.
I. INTRODUCTION
Information security has traditionally been ensured with data encryption and authentication
techniques. Different generic data encryption standards have been developed. Although these encryption
standards provide a high level of data protection, they are not efficient in the encryption of multimedia contents
due to the large volume of digital image/video data. In order to address this issue, different image/video
encryption methodologies have been developed. In the past few years there have has been an explosion in the
use of digital media. Industry is making significant investment to deliver digital audio, image and video
information to the consumers. Hence security of multimedia data has become more and more important. Data
encryption standard (DES)[5] has been the main encryption standard from 1977. However in the year 1998 it
has been shown to be vulnerable to brute force attacks, differential cryptanalysis and linear cryptanalysis.
Acknowledging the need for a new encryption standard, several ciphers have been proposed such as AES,
3DES, MARS, RSA, Serpent, two fish, blowfish, IDEA and GOST were used[10][15]. Because of voluminous
data involved in image/video, other encryption methodologies such as affine transform, the chaotic system and
the frequency domain algorithms have been developed.
Neural network plays a very important role in information security and lot of work has been going
on in this direction. Whether it is image processing or otherwise, most of the algorithms used are generic,
because of which the key exchange has become a prerequisite prior to exchange of the data [4]. Hence the
strength of such encryption solely lies on the key length. In the presented work, encryption process uses random
substitutions, and impurity addition (doping) creating more confusion and misguide the cryptanalyst to obtain
the cipher. At the receiving end, it uses artificial neural networks to obtain the original video. The elimination of
the key exchange and the usage of artificial neural network for high security are the major strengths of the
presented work.
II. ARTIFICIAL NEURAL NETWORKS
Artificial Neural networks (ANN)[3] are simplified models of the biological nervous system. An ANN,
in general, is a highly interconnected, massively parallel distributed processing network with a large number of
processing elements called neurons in an architecture inspired by the brain, which has a natural propensity for
storing experimental knowledge and making it available for later use. Each neuron is connected to other neurons
by means of directed communication links each with an associated weight. Each neuron has an internal state,
2. Video Encryption and Decryption with Authentication using Artificial Neural Networks
www.iosrjournals.org 64 | Page
called its activation or activity level, which is a function of the inputs it has received. Typically, a neuron sends
its activation as a signal to several other neurons. There are several architectures in which the neurons can be
connected. By choosing the suitable model and appropriately training the network, it can be used as a mapping
function. Commonly neural networks are adjusted or trained, so that specific input leads to specific target output
as shown in Fig 1
Fig 1. Neural network training
In the backpropagation neural networks [3], perceptron and other one layer networks are seriously limited in
their capabilities. Hence multilayer Feedforward (MLFF) networks with Backpropagation learning and non
linear node functions are used to overcome these limitations,. Multilayer feedforward network [MLFF] is made
up of multiple layers. Thus, architectures of this class, besides possessing an input and an output layer also have
one or more intermediary layers called hidden layers. Here the neurons of one layer are connected to the neurons
of the next layer and so on till the output layer. The hidden layer aids in performing useful intermediary
computations before directing the input to the output layer [3]. Backpropagation neural nets are those feed
forward networks which use backpropagation learning method for their training. The training of a network by
back propagation involves three stages: the feed forward of the input training pattern, the calculation and back
propagation of the associated error, and the adjustment of the weights. Once the process converges, the final
weights are stored in a file. After training, application of the network involves only the computations of the feed
forward phase
III. SYSTEM DESIGN
Fig 2 depicts the schematic diagram of the presented work.
Fig 2 . Block diagram of video transmission and reception
System designed can be split into two modules-encryption and decryption. Whenever the sender wishes to
send video, he feeds the video file to be sent to the encryption module. The video file is encrypted in the
encryption module. At the receiving end the user in the remote system decrypts the video data by feeding the
received data to the decryption module using artificial neural networks.
3. Video Encryption and Decryption with Authentication using Artificial Neural Networks
www.iosrjournals.org 65 | Page
A. Encryption Module
The image to be encrypted is read pixel by pixel and transformation is done on these pixels using
permutation, substitution and impurity addition. Two levels of encryption are used to obtain high level of image
encryption.
Step1: Get the pixel value of the video file.[01000011] [67]
Step2: Divide the pixel byte value into upper and lower nibble [0100 and 0011].
Step3: Exchange the nibbles and concatenate to form a byte [00110100].
Step4: Calculate the impurity by EX-ORing the original msnibble and lsnibble ,[0111].
Step5: shift the bits of impurities by 5 bits to right. Now we get 9 bit number[011100000]
Step6: EX-OR the results of step3 andstep5[011010100]=212.
Step7: Add impurity to the obtained result in step 6.Impurity Value chosen is 117,[212+117].
Step8: Continue step1 to step7 for all the pixels of the video File.
Addition of two columns:
Step9: Additional two columns are added and the value of 117 is added to the first new column and 627 is
added to the second new column. This is required for the normalization of the matrix.
Second level encryption:
Step10: Add another level of impurity to the resultant matrix obtained in step9 such that impurity changes with
respect to the position of the pixel.
Table I shows the transformation of the sample pixel values after first level of encryption.
SAMPLE FIRST LEVEL ENCRYPTION RESULTS
Original Pixel
Value
Pixel Value after 1st
level Encryption
1 165
6 277
45 473
67 329
Table II shows the transformation of the sample pixel values after second level of encryption.
Pixel position Original pixel value
Pixel value after 1st
level of encryption
Pixel value after 2nd
level of encryption
(1,1) 12 437 537
(4,68) 12 437 708
(10,34) 12 437 1050
(15,29) 12 437 1335
(19,8) 12 437 1563
B. Decryption Module
At the receiver end decryption is achieved using an artificial neural network [3]. The neural network is
trained for standard mapping value and the weights and biases are stored before applying input to it.
MATLAB’s neural network tool box is used for training and implementing.
4. Video Encryption and Decryption with Authentication using Artificial Neural Networks
www.iosrjournals.org 66 | Page
Wi-weight matrix of the ith laye
F-activation function
Bij-biasis of jth neuron in ith layer
Fig 3. Block diagram of 3 layer back propagation net
The system is designed for three layers-input, output and hidden layers. The input and output have only one
neuron and hidden layer has 695 neurons. Large number of neurons is required to achieving high security. The
decryption is achieved in three steps [4][5][12]. During the first step, the impurity which was varying with
respect to position of pixel is removed. In the second step, the additional columns from the matrix which were
added during the encryption is deleted [6]. During the third step, the received video data and weights which
were stored after the training are used to stimulate the network. The output of this stage is the recovered video.
IV RESULTS AND DISCUSSION
The result of the frame of video encryption and decryption module are shown in Fig4 and Fig5
Fig 4. Output of the encryption module
Fig 5. Output of decryption module
A. The need for two level of encryption
As already mentioned there are two level of encryption in the encryption module. It is required,
because, for some of the images, a sample of which is shown in Fig 6, 1st
level of encryption does not suffice.
From the fig it is very clear that although the intensity of pixel has changed drastically, the picture is still in
understandable form.
Fig 6 input and output of 1st
level encryption
5. Video Encryption and Decryption with Authentication using Artificial Neural Networks
www.iosrjournals.org 67 | Page
The reason behind this is that, although the pixel value changes after 1st
level of encryption all the
pixels with same original value will have the same encrypted value, because of which intensity changes but
image can be still visible.
To overcome this problem 2nd
level of encryption is used. During the 2nd
level encryption the impurity
changes with respect to the pixel position (shown in table 2), it means pixel with same original value will have
two different values after the second level of encryption depending on the pixel position. The output after 2nd
level of encryption is as shown in Fig 7
Fig 7 input and output of 2nd
level encryption
B. Need for normalization
As mentioned earlier ANN is used for decrypting the video. ANNs require training before they are used
for any application. The results of training were not converging for the given input data set having 256 values.
This problem was solved by the normalization of the input data. Normalization is the process of transforming
the data set to the values ranging from -1 to 1.
C. Requirement of Additional Two Columns during Encryption :
The image matrix was treated as a series of vectors (one row as one vector input) while simulating the
network. Thus it became mandatory to have minimum and maximum pixel values in each row for achieving
accurate normalization of the vector.
IV. PERFORMANCE ANALYSIS
A. Network Performance:
The training of the ANN is done using the function available in MATLAB’s neural network tool box
[6][7]. It updates weight and biase values. It uses the heuristic method based on the standard numerical
optimization method. The accuracy of the network has been found very high.
Table III provides the network performance analysis
TABLE III
NETWORK PERFORMANCE WITH VARIATIONS IN PERFORMANCE GOALS
Sl.No Performance
goal set
No of
epochs
Time
required in
seconds
% error
1 0.1 1 06.10 92
2 0.01 4 10.94 41
3 0.001 4 34.41 7
4 0.0001 5 52.01 1
5 0.00001 7 59.00 0
6 0.000001 11 104.63 0
B. Application Performance
The presented work has been tested with many samples of avi files .Accuracy has been found to be
very high. Table IV shows encryption and decryption time for the video.The decryption process was much
slower than the encryption process. It is because of the fact that the simulation of the network during decryption
process is done for each of the row separately.
6. Video Encryption and Decryption with Authentication using Artificial Neural Networks
www.iosrjournals.org 68 | Page
TABLE IV ENCRYPTION AND DECRYPTION TIME
Sl.No Video frame size in pixels Encryption time in Seconds Decryption time in seconds
1 256x256x1 0.002254 0.804936
2 256x256x3 0.016754 2.377046
V. Conclusion
The presented work discusses a novel neural network approach for video encryption and decryption. In
order to make the decryption difficult for eavesdropper, a random algorithm has been used for encryption. Using
neural network at the receiver end has made random encryption possible at the senders end. Also need of key
exchange prior to data exchange has been eliminated. The accuracy of the system has been found very high. The
presented work thus provides flexible, accurate and secure video transmission and reception.
REFERENCES
[1] unukur,R.K/;gnanam V,”neural network based decryption for random encryption algorithm ”.
[2] Liew Pol Yee De Silva L.C,”application of multilayer perceptron network as a one way hash function”.
[3] Khalil Shihab,”a backpropagation neural network for computer network security”
[4] Francia G.A,”applied image processing to multimedia information security”.
[5] William Stallings,” networksecurity essentials,applications and standards”
[6] Su S”Lin,A”design and realization of new choaticneural encryptiondecryption network”
[7] http://en.wikipedia.org/wiki/Authenticated_encryption
[8] http://en.wikipedia.org/wiki/Authenticated_encryption
[9] http://en.wikipedia.org/wiki/Video
[10] Shiguo Lian, Dimitris Kanellopoulos, and Giancarlo Ruffo, “Recent Advances in Multimedia Information System Security,”
International Journal of Computing and Informatics, Vol. 33, No.1, 2009, pp. 3-24.
[11] Shiguo lian, Multimedia Content Encryption: Algorithms and Application, CRC Press, 2008.
[12] B. Furht, D. Socek, and A. M. Eskicioglu, “Fundamentals of Multimedia Encryption Techniques,” Multimedia Security Handbook,
CRC Press, 2005.
[13] ISO/IEC 13818:1996, Coding of Moving Pictures and Associated Audio (MPEG-2); Part 1: systems, Part2 : video.
[14] Mitchell J. L., Pennebaker W.B., fogg C.E. and LeGall D.J. MPEG Video Compression Standard, Chapman & Hall, 1996.
[15] ITU-T Rec. H.264/ISO/IEC 11496-10. Advanced Video Coding. Final Committee draft, Document JVT-E022, 2002.
[16] Iain E G Richardson. H.264/MPEG Part10, 2002. Available: http://www.vcodex.com.
[17] NIST: Data Encryption Standard, FIPS 46-3, 1999.
[18] NIST: Advanced Encryption Standard, FIPS 197, 2001.
[19] Adam J. Slaggel. Known-Plaintext Attack Against a Permutation Based Video Encryption Algorithm. Available:http://eprint.iacr.org