Encryption Project Proposal
Encryption Project Proposal
Group member:
Content:
Abstract…page 3
1.Introduction…page 4
1.1 Wave bitstream format …. page 5
2.1 Image formats and image compression…. page 6
2.Encryption…page 7
2.1 Obtaining data of wave file in column matrix…. page 7
2.2 Convert column matrix into M*N matrix…. page 8
2.3 Convert matrix into image file. …. page 9
3.Decryption of wave from image …page 10
3.1 Data type conversion…page 11
3.2 Algorithm to convert image matrix into column matrix and hence. Wav. ...page 11
3.3 Audio recorder …page11
4. Graphical use interface (GUI) …. page12
4.1 Creation a MATLAP GUI…. page 12
4.2 Explanation …. page13
4.3 Final output …. page 14
5. Deploy tool…page 15
6. Uses …. Page15
7.Bibliography…. page15
Abstract:
Variable ‘D" which holds the first 2000000 samples. It is to be noted that
variable D is basically a column vector.
How the wave file appears in JPEG format (this is a cropped image as the
actual file is far bigger).
3. Decryption of wave from image:
This method is just the opposite of encryption with minor variations. When the
image is created during encryption it i basically an M*N matrix with “double”
data type, however on fetching the same image back to MATLAB we get an
M*N matrix with datatype “uint8” i.e. unsigned integer of 8 bits.
Thus, we need to first convert all elements of matrix obtained into double
precision. Decryption can be basically understood as a data mining method to
fetch, audit, and understand the pattern of data stored in the encrypted file.
3.1 Data type conversion:
“im2double” function of MATLAB takes an image as input and converts it into another image or matrix having all
elements with type double. As already stated, the image files retrieved by MATLAB are in unsigned integer form
and before they are put in column matrix representing a WAVE file, it has to be converted into data type of double
precision.
4.2 Explanation:
Figure 6 shows GUI model created with Guide command here we put three
axes 2 for showing wave of encrypted and decrypted signal. And 3 for
displaying the logo of Comsats. There are static text fields for displaying the
text i.e. group member names.
We add 8 push buttons in our GUI as shown i fig. 6 whose operation is written
on each button. We use the build in function uiget file to select sound file from
computer. We can make tags for component placed. Then the function of each
component can be assigned with the help of its tag. After making the model we
press the play button in the menu bar of window then this will create the code
of GUI layout. Code contains different functions and each button’s
functionality can be controlled by its function.
We can use handles of every function along with component tag to shift
between different functions. Each component function is loaded with its code
and the final output GUI is shown in figure 7.
Safe communication.
7.Bibliography: