Image Encryption Techniques
Image Encryption Techniques
Techniques
Contents
Abstract
Introduction
Objective
Modules
Requirements
Existing System
Proposed System
Experimental Analysis
Security Analysis
Architecture
Design
Screen Shots
Applicability
Conclusion
Abstract
In this paper, we will provide an overview of the mechanisms used in image
protection, especially Chaos-based encryption techniques available today. We will
see how previously proposed methods such as Data Encryption Standard (DES),
Triple Data Encryption Standard (Triple-DES), and International Data Encryption
Algorithm (IDEA) have been applied in image protection domain and how new
concepts of Chaos-based encryption techniques are superior to traditional
methods.
Decryption Module
Software Requirements -
Operating System : Windows
IDE : My Eclipse
Frontend : J2EE
Coding Language : Java
Backend : My SQL
Other Technology : Tomcat Server
Existing System
There are traditional image encryption techniques like DES, Triple-DES and
IDEA.
Limitations
Firstly, the image fusion is completed between the original-image and the
key-image.
Then the pixel values of the fusion image are encrypted by Henon chaotic
system.
Image fusion
Xi+2=1-aX2i+1+bxi
Step2: Set encryption key for the fusion-image, including structural parameters
a , b and initial values x0 ,x1 . After image fusion, we adopt Henon chaotic map
to change the pixel values of the fusion-image.
Experimental Analysis
Experimental Analysis Cntd..
Security Analysis
In our encryption algorithm, the key-image and the initial values
of Henon chaotic map are used as secret keys.
Network
Receive
encrypted
Sign in image
Add image
Decryption of
image
Apply choatic
algorithm
Screen Shots
Home page
Browse Input and Output File
Encryption image
File Transfer
Server Side
Client side file sending process
Receive the file Server
Decrypting image
Finally view of original file
Applicability
This encryption scheme is suitable for applications like
www.ieee.org
Queries……………?
Thanking you all...