Professional Documents
Culture Documents
-
Eswar M(19BCE2189)
Sanjay M(19BCE2207)
Pranesh Kannan G(19BCE2331)
Motivation:
Information security is becoming increasingly vital in data storage and transfer these
days. Images are widely used in several processes. As a result, safeguarding picture
data from unwanted access is essential. In the subject of information hiding, image
1
CSE3501
Aim:
Our Aim of the project is to create a new cryptographic scheme that to be researched,
developed and implemented. The cryptosystem efficiency relies on the difficulty
associated with decryption process, such that nobody can reverse the ciphertext and
obtained the original message unless knows the authentication key (decryption key).
There are many types and ways to measure and evaluate the cipher system security.
Some of them depend on determining the permissible keys by the uncertainty facing.
Other methods depend on the randomness associated with encryption process.
Proposed method should cater to all these issues.
Methodology:
We have an idea to make an encryption technique by using Gaussian elimination
method, Since we have recently learnt the method in maths. We have planned to
implement the concept to encrypt and decrypt the image.
Expected Outcome:
We believe that using gaussian elimination method will provide a cypher key that
can’t be beak down. So, the encrypted image can’t be cracked easily.
Keywords:
Gaussian Elimination, encryption, Ciphered, decryption, matrix, upper triangular
matrix, RGB values, cryptographic mechanisms, cryptosystem efficiency.
Literature Survey
No. Title AUTHOR AND ABSTRACT METHODOLOGY
YEARS OF
REFERENCE
2
CSE3501
1 A new chaotic Jui-Cheng, In this paper, an image In order to implement the algorithm,
key-based design Jiun-In Guo encryption/decryption its VLSI architecture with low
for image (2000) algorithm and its VLSI hardware cost, high computing speed,
encryption and architecture are proposed. and high hardware utilization
decryption According to a chaotic binary efficiency is also designed. Moreover,
sequence, the gray level of the architecture of integrating the
each pixel is XORed or scheme with MPEG2 is proposed.
XNORed bit-by-bit to one of Finally, simulation results are included
the two predetermined to demonstrate its effectiveness.
keys. Its features are as
follows: (1) low
computational complexity,
(2) high security, and (3) no
distortion.
2 Image Encryption Chao-shen This paper proposed an The proposed image encryption
and Decryption Chen, Rongjian image encryption and method is based on rearrangement of
Using SCAN Chen (2006) decryption process. Its the pixels of the image. The
Methodology encryption method is based rearrangement is done by scan
on SCAN patterns generated patterns that generated by the SCAN
by the SCAN methodology. methodology. The scanning path of
The SCAN is a languagebased the image is a random code form, and
two-dimensional by specifying the pixels sequence
spatial-accessing along the scanning path.
methodology which can
efficiently specify and
generate a wide range of
scanning paths.
3 Analytical Study Chiranji Lal The majority of imaging The hybrid process involves the speed
of Hybrid Chowdhury, techniques use symmetric and ease of implementation from
Techniques for Kumaresan and asymmetric symmetric algorithms, as well as
Image Encryption perumal cryptography algorithms to improved security from asymmetric
and Decryption (2020) encrypt digital media. Most algorithms. ECC and ElGamal
of the research works
cryptosystems provide asymmetric
contributed in the literature
key cryptography, while HC, AES, and
focus primarily on the
DPC are symmetric key algorithms.
Advanced Encryption
Standard (AES) algorithm for ECC with AES are perfect for remote or
encryption and decryption. private communications with smaller
This paper propose an image sizes based on the amount of
analysis for performing time needed for encryption and
image encryption and decryption.
decryption by hybridization
of Elliptic Curve
Cryptography (ECC) with Hill
Cipher (HC), ECC with
Advanced Encryption
Standard (AES) and ElGamal
3
CSE3501
4
CSE3501
6 Multidimensional Ajita Sahay, Multimedia data are Image Encryption, Image Decryption
comparative Chittaranjan transferred through various using Gauss iterated map and
analysis of image Pradhan networks for personal and comparing them with logistic map in
encryption using (2017) professional uses. Hence, both the dimensions
gauss iterated everyone wants to send or
and logistic maps receive the data in a secure
manner without any
interruption or modification.
In general, data security is
done using cryptographic
techniques or chaotic
techniques. This paper
focuses on an image
encryption technique using
multidimensional Gauss
iterated map instead of
multidimensional logistic
map. The multidimensional
Gauss iterated map uses
more control parameters as
compared to
multidimensional logistic
map, which enhances the
data security. NPCR and
UACI parameters are used to
prove this. Similarly, the
Gauss variations take lesser
time for encryption and
decryption as compared to
the logistic variations.
5
CSE3501
7 Enhanced chaotic M. Salleh Imaging has gained improving Fridrich's work in chaotic
image encryption S. Ibrahim importance due to the image encryption using Baker's map.
algorithm based I.F. Isnin improvements of The algorithm proposed is tested by
on Baker's map (2003) performances in computer experimenting with grayscale value of
speed, media storage and the pixels and transposing of the
network bandwidth. Along pixels, in two different operational
with this advancement, the modes. The analysis of the resulted
fundamental issue of image image in the experiment shows that
security has become a major the enhancement algorithm can
concern and because of this effectively eliminate the weak keys
reason, research in image and increase the encryption strength.
confidentiality has gained
popularity amongst security
experts. This paper discusses
an alternative chaotic image
encryption based on Baker's
map. This enhanced
symmetric-key algorithm
can support a variable-size
image as opposed to the
algorithm which is mainly
based on Baker's map that
requires only square image
for encryption. In addition,
the algorithm also includes
other functions such as
password binding and pixel
shifting to further
strengthen the security of
the cipher image. The
algorithm also supports two
modes of operation namely
EBC and CBC. The number of
iterations to be performed
can vary depending on the
security level required by
the user. The paper also
includes an example of
image encryption. From the
analysis done, it shows that
the security level is high
even though keys that are
found to be weak keys for
6
CSE3501
7
CSE3501
9 Image Encryption Md. Towsif The main objective of this Step-1:Let’s say the first red pixel
and Decryption Abir, Lamiya paper is to present a (“red” value of the pixel
using Enigma Rahman , more secured and on row 1, column 1 of the image) Red-
Algorithm Samit computationally efficient 51, used here is passed
Shahnawaz procedure of through the plug-board. It swaps to
encrypting and decrypting another value, such as
Miftah
images using the enigma Red-61 here, that has been mentioned
(2019)
algorithm in initially.
comparison to the existing Step-2:Next the position of the rotor
methods has to be mentioned
by the user and which rotors have
been used is also know by
the user. Thus, after passing through
the rotor 1, the pixel
value has been changed into Red-133
which is the value of the first
rotor in the 61st index.
Step-3:Similarly, after passing through
rotor 2 and rotor 3,
8
CSE3501
10 A fast image Yong Zhang A fast image cryptosystem This paper attempts to study the
encryption Xueqian Li based on AES is verified in image cryptosystem based on AES to
scheme based on Wengang Hou this paper. The plain image testify the viewpoints of AES not
AES (2017) is divided into data blocks of suitable for image encryption.
size 128 bits. The first block However, we conclude that AES in CBC
of plain image is permutated mode can be used for image
by an initial vector. Then, encryption. In the tested system, the
AES in cipher block chaining initial vector (IV) is generated by
mode is used to encrypt chaotic system and AES is
each block sequentially. The implemented by look-up table
initial vector and cipher method. The key of AES is also the key
image are transmitted to of image cryptosystem. AES is secure
the decryption party by far, so the tested image
through the public cryptosystem is secure. And
information channel. The simulation results show that the
decryption party use the image cryptosystem based on AES are
secret key and initial vector faster than some image
to decrypt the cipher image cryptosystems based on chaotic
to obtain the original image. systems. Thus, the tested system can
Simulation results show that be used as the comparison basement
this image cryptosystem is of newly proposed image
both secure and high-speed, cryptosystems. Those image
which can be used as the cryptosystems whose
comparison basement of encryption/decryption speed is
newly proposed image slower than the AES based scheme in
cryptosystems based on the same computer need to be
chaotic systems. improved.
11 Distributed Mamadou I. The objective of this novel homomorphic image encryption
Image Encryption Wade research is to develop a scheme where each pixel intensity
Based On a Mohamed novel image encryption value in the original image is written
Homomorphic Chouikha method that can be used to as a sum of several subvalues, leading
Cryptographic Tepper Gill considerably increase the to producing many component images
Approach (2019) security of encrypted that are
encrypted to produce many
images. To solve this image
corresponding cipher-images; and
security problem, we therefore, increase the security of the
propose a distributed associated images. The
homomorphic image formulation includes encryption and
encryption scheme where decryption phases, as well
the images of interest are
those in the visible
electromagnetic spectrum.
9
CSE3501
10
CSE3501
11
CSE3501
Architecture:
Step 1: Average of RGB values is taken to extract matrix for each image.
Step 2: Image Encryption is performed using Gaussian Elimination/Forward
Elimination, where image matrix is converted to upper triangular matrix. Upper
triangular matrix is converted back to RGB values, this gives encrypted image
also known as ciphered image. Encrypted image is used for transmission.
Step 3: Key is generated alongside encryption of image which is further used for
decryption. Key matrix stores all the operations performed on image matrix
while converting it into upper triangular matrix.
12
CSE3501
References:
13