Professional Documents
Culture Documents
ISSN 2278-6856
Resersch Supervisor and HOD, Dept. of Computer Science & Technology, S.K. University, INDIA.
3
ABSTRACT
With the increasing application of image processing
techniques in various areas contrast techniques in digital
image processing systems concepts. Unsharp image masking is
the one of the efficient approach technique in Among the
availability of image compression methods, which could gives
satisfactory results. However, accurately setting the unsharp
masking algorithmic parameters is a difficult task. In this
paper random number generation phases made the image in
unrecognized format. The property of this entitled is to
increase the security levels of the encrypted encoded image.
Here one key is needed to encrypt and decrypts the image, and
then we had to applied compression techniques for a better
compression and to prepare unrecognized and unreadable
format. Finally the Experiments are conducted to demonstrate
the feasibility of the security is providing to the image in
network security.
Page 262
ISSN 2278-6856
Page 263
Final Thoughts
One more important factor is key-length. While it is
not a method, it still needs to be taken into
consideration. The longer the key-length means the
probability of a person cracking the key increases
exponentially with the increase in bits. For example, a
2-bit encryption has four possibilities, so a 128-bit has
2128 possibilities. It is important to pick the strongest
method and the largest key possible.
ISSN 2278-6856
3. PROPOSED METHOD.
3.1. Forward Technique of proposed method
The following steps explained about the forward processor
technique of the proposed work. As there is no header for
raw images and easy to apply any techniques on this to get
a better results. In this method, raw images considered as a
source input image. Convert this source image into the
digital format. Create a key using random generation
technique. Apply the shift operation on digital format of
source image along with this key. By this we get the
encoded image. This format of image is called cipher
image, this is hiding information in unreadable format.
Simply encrypted format. To reduce the size encoded
image compressed the image using Huffman compression
technique. By this we get less size of image i.e. size
reduced image and it is also helps to easily transfer even
though through the low bandwidth network also as easily
and firstly.
Step1. Consider raw image as an input file.
Step2. Convert input raw image into digitized form.
Step3. Generate Random Number
Step4. Apply shift operation on input image along with
random number to generate mask image.
Step5. Apply compression technique on masked image to
generate compressed image
4. Results
For this, an experimental analysis is one with the different
raw images whose resolution is in different sizes. In this
paper random number generation phases made the image
in unrecognized format. The property of this entitled is to
increase the security levels of the encrypted encoded
image. Here one key is needed to encrypt and decrypts the
image, and then we had to applied Huffman compression
technique for a better compression and to prepare
unrecognized and unreadable format. Finally the
Experiments are conducted to demonstrate the feasibility of
the security is providing to the image in network security.
This method gives a better result than JPEG, BMP and
TIFF, but few of image formats are better than of proposed
method based on pixel intensity.
Original Image
cipher image retrieved image
Pic. 5 differences among different images in techniques
Page 264
ISSN 2278-6856
Image
Name
Baboon
Brain
Lena
Madhuri
Pepper
Head Scan
Shoulder
Jpeg SR
-0.75629
-0.40967
-0.17099
-0.36353
-0.36017
-0.24358
-0.16938
TIFF
SR
-0.66479
-0.74592
-0.48623
-0.57324
-0.57764
-0.59616
-0.54974
Propose
saving Ratio
0.100952
0.270658
0.09346
0.109314
0.096436
0.125312
0.23594
ISSN 2278-6856
5. Conclusion
References
[1] X Zhang, Lossy Compression and Iterative
reconstruction for Encrypted Image. IEEE Trans. on
Inf. Forensic Secur 6(1), 5358 (2011).
[2] M. Naor and A. Shamir, Visual cryptography,
Advances in Cryptology-Eurocrypt94, 1995, pp. 1
12.
[3] Hossam El-din H. Ahmed, Hamdy M. Kalash, and
Osama S. Farag Allah , An Efficient Chaos-Based
Feedback Stream Cipher (ECBFSC) for Image
Encryption and Decryption, Informatica 31 (2007)
121129
[4] Chang C, Hwang M, Chen T, A new encryption
algorithm
for
image
cryptosystems.JSyst
Software;58:8391, science, vol. 809, Springer,
Berlin; 1993. p. 7182, 2001.
[5] Z. Shang, H. Ren, and J. Zhang, A block location
scrambling algorithm of digital image based on
Arnold transformation, In: Proc. of the 9th
International Conference for Young Computer
Scientists, pp.29422947, 2008.
[6] X. Zhang, Lossy compression and iterative
recobstruction for encrypted image, IEEE Trans. Inf.
Forensics Security, vol. 6, no. 1, pp. 5358 Mar. 2011
[7] R. El Sawda, A. Alfalou, G. Keryer and A. Assoum.
Image Encryption and Decryption by Means of an
Optical Phase Mask. Proceeding of IEEE (ICTTA06IEEE), Page(s): 1474-1477,Vol. 1, 24-28 April, 2006.
[8] R. C. Gonzalez and R. E. Woods. Digital Image
Processing. Prentice-Hall edition, ISBN: 0-13-094650, 2002.
[9] Juan M Vilardy, J. Useche, C. O. Torres and L.
Mattos, Image encryption using the fractional wavelet
transform, Journal of Physics: Conference Series 274
(2011) 012047.
[10] A. Mitra, , Y V. Subba Rao, and S. R. M. Prasnna, "A
new image encryption approach using combinational
permutation techniques," Journal of computer Science,
vol. 1, no. 1, p.127, 2006, Available:
http://www.enformatika.org
Author contributions
Mr. G. Thippanna, Research Scholar (Ph.D.).
He has completed his Post Graduation in 2008
from S.V. University, Tirupati. He 4 years of
teaching experience and 4 years of research
Page 266