Chaotic Image Encrption Technique
Data science projects in pondicherry
Create New

Chaotic Image Encrption Technique

Project period

06/29/2020 - 07/29/2020

Views

46

0



Chaotic Image Encrption Technique
Chaotic Image Encrption Technique

The oldest and basic problem of cryptography is secure communication over an insecure channel. Party A needs to send to party B a secret message over a communication line, which may be recorded tapped by an opponent. The recent improvements in technology, particularly in the computer field and communications, gave way to enormous demands in the market for distributing digital multimedia details over the Internet. However, due to illegal wiretapping, interception, etc, there is a lack of security image, text, audio, and video content. So the challenging issue now is we need to protect the intellectual property of multimedia images over the internet.  To deal with this technical challenge, the most important image security tool is discussed in this project. The encryption technique is the one that provides end-to-end security over a number of systems such as ownership trace and authentication. In this project, the recent studies in image encryption techniques based on chaotic schemes are discussed.

Cryptography is regarding communication in the presence of a conflict or dispute. It encompasses many problems like encryption, authentication, etc modern cryptography provides a theoretical study that is easily understandable by an individual what exactly these problems are, how to execute and build protocols that purport to solve them, and how to build protocols in whose security one can have confidence. With increasing digital technologies, now we can see multimedia is available widely over the internet. Multimedia applications have been used mostly and frequently and its security has become the main concern. The main issues relating to the problem of encryption have been discussed and also a solution to image encryption techniques based on chaotic schemes has been dealt with in the present communication. The chaotic image encryption can be created by using the properties of chaos which includes deterministic dynamics, unpredictable behavior, and non-linear transform.

Why: Problem statement

Chaotic-based image encryption algorithms are more which cannot be counted. Encryption techniques that are based on Chaos are considered the most effective algorithms for encryption of data images. In previous projects. chaos-based cryptosystem used the dynamical system with a link to two chaotic systems and controls. although it gave good results, there were many ups and downs to the single rule usage. hence Chaotic based image encryption method was introduced.  The designed chaotic scheme will be able to provide excellent privacy to multimedia digital images. With increasing digital technologies, now we can see multimedia is available widely over the internet. Also, multimedia applications have been used mostly and frequently and its security has become the main concern. The main issues relating to the problem of encryption have been discussed and also a solution to image encryption techniques based on chaotic schemes has been dealt with in the present communication.

How: Solution description

We are using DES Triple DES And IDEA algorithm, to Fully secure Transmission on the field high-Level security transmission. The Data Encryption Standard(DES) is a symmetric-key algorithm used for the encryption of the digital dataset. Although the short key of length 56 bits makes it much insecure for modern applications, it has been highly influenced for the cryptographic advancement. In cryptography, Triple Data Encryption Standard, literally the Triple Data Encryption Algorithm, is a block cipher, which applies the DES cipher algorithm three times to the data block. IDEA (International Data Encryption Algorithm) is an encrypted algorithm. It uses the block cipher with a 128-bit key and it is very secure. It is one of the best publicly known algorithms. IDEA free for the Non-commercial uses.

How is it different from competition

Through this algorithm, one will be able to control all parameters and initial keys in the designed method. It is well known and believed that combining all old architecture of permutation-diffusion, the shortcoming of a fixed key will be avoided in this algorithm. Also, the experimental output and security analysis prove that the designed encryption algorithm can be achieved confidentiality.

In this project, an image encryption technique using chaotic schemes is used which will improve the nature and difficulty level of the algorithm as well as how one can make the key stronger has been discussed. We have tested our project against the number of performance analyses and compared it with already existing results. Properties in chaotic systems and cryptography primitives have unique characteristics that allow the chaotic systems to be applied to cryptography. The main issue in many of the cryptanalysis algorithms is the inadequacy of the chaotic maps implemented in the system.

Who are your customers

Customers of the Chaotic Image Encryption Technique are Army Officers who are working for the freedom and security of the country anywhere around the world. A countries army secrets are more important than the other because of the security purpose of the nation, Secret Agents who are working as a underground official officers for the security purpose of the nation, they will secretly spy the outerworld and gather information if any unwanted attacks planned by the enemies or nagsalsal, and the Secret transformation People.

Project Phases and Schedule

The idea: The idea of cryptography is to protect and prevent data transmitted in the presence of an adversary. A cryptographic transformation of data is a procedure by which plaintext data is used, or encrypted, resulting in a ciphertext that does not show the original input.

Planning: Cryptographic techniques are used to make secrecy and integrity of data in the presence of an adversary. Based on the security needs and the threats involved, several cryptographic methods such as symmetric-key or public-key can be used during shipping and accommodation of the data.

Designing: Modern cryptography is highly based on mathematical and computer science practice. Cryptographic algorithms are designed around computational hardness prediction, making likewise algorithms hard to break in practice by any opponent.

Execution: In cryptography, a timing attack is a side-wise attack in which the attacker tries to negotiate a cryptosystem by investigating the time used to execute cryptographic algorithms.

Resources Required

Java: Java is a high-level programming language. Java programs are interpreted by the Java Virtual Machine or JVM, which runs on various platforms. This means all Java programs are multiplatform and can run on various platforms, including Mac, Windows, and Unix systems.

Netbean: The NetBeans IDE allows Java developers with all the tools they need to build a professional Java SE application. The NetBeans IDE supports development for all JDK.

AWT: The Abstract Window Toolkit (AWT) is Java's platform-dependent, graphics, and UI widget toolkit, below Swing. The AWT is part of the Java Foundation Classes (JFC) , the API for providing the graphical user interface (GUI) for Java programs.

Swing: Swing is a GUI toolkit for Java. It is part of Oracle's Java Foundation. An API for allowing a graphical user interface(GUI) for Java programs. The swing was developed to give more sophisticated bunch of GUI components than the earlier Abstract Window Toolkit

MySQL: MySQL is an open-source relational database management system being implemented by writing queries.

Comments

Leave a Comment

Post a Comment

Are you Interested in this project?


Do you need help with a similar project? We can guide you. Please Click the Contact Us button.


Contact Us

Social Sharing