Escolar Documentos
Profissional Documentos
Cultura Documentos
Ajith K.P.-B100189EC Arun Tony-B100171EC Aswin E Augustine-B100305EC Basil Babu-B100523EC Vaisakh R.P. -B100087EC
National Institute of Technology
Major Project
Image Encryption
1/24
Introduction
Major Project
Image Encryption
2/24
Introduction
Major Project
Image Encryption
2/24
Introduction
Major Project
Image Encryption
2/24
Introduction
Need for Scrambling security reasons Areas of Application condential remote video conferencing
Major Project
Image Encryption
2/24
Introduction
Need for Scrambling security reasons Areas of Application condential remote video conferencing security communication
Major Project
Image Encryption
2/24
Introduction
Need for Scrambling security reasons Areas of Application condential remote video conferencing security communication military applications
Major Project
Image Encryption
2/24
Introduction
Major Project
Image Encryption
3/24
Introduction
Major Project
Image Encryption
3/24
Introduction
Major Project
Image Encryption
3/24
Introduction
Major Project
Image Encryption
3/24
Introduction
Major Project
Image Encryption
3/24
Cellular Automata
Major Project
Image Encryption
4/24
Cellular Automata
Introduced by Ulam and von Neumann in 1940 Consist of rectangular grid of identical cells
Major Project
Image Encryption
4/24
Cellular Automata
Introduced by Ulam and von Neumann in 1940 Consist of rectangular grid of identical cells Each cell takes nite number of states
Major Project
Image Encryption
4/24
Cellular Automata
Introduced by Ulam and von Neumann in 1940 Consist of rectangular grid of identical cells Each cell takes nite number of states At each step cells update synchronously by applying
rules(transition functions)
Major Project
Image Encryption
4/24
Cellular Automata
Introduced by Ulam and von Neumann in 1940 Consist of rectangular grid of identical cells Each cell takes nite number of states At each step cells update synchronously by applying
rules(transition functions)
These rules are based on the states of the respective cells
Major Project
Image Encryption
4/24
Cellular Automata
Major Project
Image Encryption
5/24
Cellular Automata
Major Project
Image Encryption
5/24
Cellular Automata
Major Project
Image Encryption
5/24
Cellular Automata
Major Project
Image Encryption
5/24
Cellular Automata
probabilistic rules instead of deterministic .001% probability that each cell will transition to opposite colour
Major Project
Image Encryption
5/24
Cellular Automata
probabilistic rules instead of deterministic .001% probability that each cell will transition to opposite colour continuous automata
Major Project
Image Encryption
5/24
Cellular Automata
Major Project
Image Encryption
6/24
Cellular Automata
Major Project
Image Encryption
6/24
Cellular Automata
Major Project
Image Encryption
6/24
Cellular Automata
Major Project
Image Encryption
6/24
Cellular Automata
Major Project
Image Encryption
6/24
dened by
N H (x0 , y0 , r) = [(x, y ) : x x0 + y y0 r]
number of cells in each neighbourhood
n = 2r(r + 1) + 1
if r=1 , then n= 5
Major Project
Image Encryption
7/24
Major Project
Image Encryption
8/24
Moore Neighbourhood
dened by
N H (x0 , y0 , r) = [(x, y ) : x x0 r, y y0 r]
number of cells in each neighbourhood
n = (2r + 1)2
if r=1 , then n= 9
Major Project
Image Encryption
9/24
Moore Neighbourhood
Major Project
Image Encryption
10/24
Boundary Conditions
Major Project
Image Encryption
11/24
dead
uses Moore neighbourhood at every generation each cell compute its new state using
transition rules
every cell are updated simultaneously(synchronous)
Major Project
Image Encryption
12/24
Major Project
Image Encryption
13/24
Procedure
Encoding
Image le is read in as a matrix An initial random conguration is set up for game of life
algorithm
Read the positions of the alive cells Take the grey value of rst pixel and put it in the position of
remaining pixel
Major Project
Image Encryption
14/24
Procedure
Decoding In decoding we know the initial conguration and the number of generations and we can execute the inverse of the scrambling algorithm to obtain the original image.
Major Project
Image Encryption
16/24
Analysis
Grey Difference,
GD(i, j ) =
1 4
[P (i, j ) P (i , j )]2
i,j
E [GD(i, j )] =
Grey Value Degree,
M 1 i=2
N 1 j =2 GD (i, j )
(M 2)X (N 2)
GDD =
Observations
Major Project
Image Encryption
18/24
Observations
Major Project
Image Encryption
19/24
Observations
Major Project
Image Encryption
20/24
Observations
Major Project
Image Encryption
21/24
Observations
Table: GDD
Major Project
Image Encryption
22/24
Figure: resolution of 50 X 50
Major Project
Image Encryption
23/24
Conclusion
algorithm is open
We can provide high security by using double scrambling Due to diffusion process rate of encryption and decryption
increases
Major Project
Image Encryption
24/24