DIGITAL IMAGE ENCRYPTION BASED ON ELLIPTIC CURVE CRYPTOGRAPHY
#1

[attachment=14896]
CRYPTOGRAPHY
Science of securely transmitting information, such that nobody but the intended recipient may understand its content.
Two basic encryption algorithms:
Private key cryptography
Public key cryptography
CRYPTOGRAPHIC GOALS
Authentication: Allowing the recipient of information to determine its origin.
Data integrity: A condition in which data has not been altered or destroyed in an unauthorized manner.
Confidentiality: Provided by encryption.
ELLIPTICAL CURVE CRYPTOGRAPHY(ECC)
Introduced by Victor Miller and Neal Koblitz in 1985.
Alternative to RSA ,DSA and other forms of algorithm.
ECC- Public key cryptography.
4. Same security level with small key.
5. Digital Image and data encryption using ECC.
ECC –based on Elliptic curve algorithms over the points on an elliptic curve.
Security of ECC depends on difficulty of ECDLP(Elliptic Curve Discrete Logarithmic Process).
Mathematical operation of ECC is defined over the elliptical curve ,
y^2=x^3+ax+b where 4a^3+27b^2≠ 0
Values of ‘a’ and ‘b’ gives different elliptic curve.
For the representation of the curves , the notation E[GF(q)] can be used.
E equation , y^2=x^3+ax+b
q prime number
GF Galois Field
For application of cryptography finite fields of ‘q’ elements are considered.
Reply
#2

Submitted by
Dilgit D
Nishant Nair
Jeffy Jimmy Joseph
Nair Vishnu Unnikrishnan

[attachment=14923]
Now tell your secret publically……….
Introduction
This software enables encryption of data into an image and send it
Encryption , process of transforming information using an algorithm to make it unreadable .
 The art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message .
This is implemented using two system and a lan-wire
Existing System
The oldest records of encryption or ciphers go back to more than four thousand years.
Digital encryption converts text to binary data and a key.
Encryption is used by military agencies, government and secret service agencies to facilitate secret communication
Disadvantages
Difficult to send data Due to its larger sizes .
some softwares pictures after encryption , looses its quality.
Algorithms since predefined easily available .
Cipher image encryption provided solution for all this problems.
Proposed System…
This system has a inbuilt compression technique which reduces the size of the file .
Consumes less time for transmission .
File encrypted and transferred , when hacked will not be any use since they require the algorithm to decode it.
Algorithm change according to the pixels of image .
Module Description
The software has four modules .
1. Encryption
2.Compression
3.Decompression
4 Decryption
Encryption
Data is added by the user , encrypted onto an image then used for transmission.
The password is inserted in the 0th pixel of the image.
Distance is calculated and added into the 10,20,30th pixel of the image.
Number of characters is stored in 40,50,60th pixel .
Data is embedded and added at distance calculated from pixels of the image.
Compression
Data after encryption compressed to reduce the size.
File is converted to ZIP file .
Image is converted to bytes ,input stream is developed using this
This is used for creation of zip file .
Decompression
Reverse of compression .
The zip file is converted back to image .
Input stream is converted to bytes .
Bytes converted to back to image.
Decryption
Its reverse of encryption.
Obtain the key from 0th pixel , compares the key
Distance between words is obtained from 40,50th and 60th pixel.
Then abstract the data from rest of the 7th pixel .
DATA FLOW DIAGRAM
Application
Used for military and secret service agencies .
Many offices can transmit confidential data .
High speed data transmission .
SCREENSHOTS
Conclusion
The new system we use highly protected data transferring method .
Striking feature of this software is compression of data before sending the file .
For better efficiency wireles technology can be used
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: digital image encryption based on elliptic curve cryptography doc, elliptic curve cryptography william stallings pdf, jimmy fallon, learning curve toys, matlab elliptic curve point multiplication, srs digital image encryption, roc curve**l engineering journals 2012,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Digital signal processing (DSP) smart paper boy 2 2,882 22-12-2018, 02:50 AM
Last Post:
  ROBUST DWT-SVD DOMAIN IMAGE WATERMARKING: EMBEDDING DATA IN ALL FREQUENCIES computer science crazy 2 5,224 19-06-2018, 06:10 PM
Last Post: KavyaIyengar
  MEASUREMENT OF VOLTAGE USING DIGITAL VOLTMETER WITH ICL7107 seminar class 1 4,857 22-06-2016, 01:11 PM
Last Post: seminar report asees
  image processing projects electronics seminars 7 32,506 05-09-2015, 11:47 AM
Last Post: seminar report asees
  Brain Tumour Detection Using Water shedding and basic Image Processing Techniques smart paper boy 2 3,078 01-08-2015, 02:53 PM
Last Post: seminar report asees
  IMAGE CAPTURE AUTOMATED TOLL GATE smart paper boy 3 2,988 11-07-2015, 01:43 PM
Last Post: Guest
  DIGITAL VISITOR COUNTER seminar class 10 6,637 06-03-2015, 03:01 PM
Last Post: seminar report asees
  digital parking system jeshlin 10 10,205 13-04-2014, 04:30 PM
Last Post: rickenjus
  SECURE ATM BY IMAGE PROCESSING seminar class 6 9,903 06-04-2014, 05:49 PM
Last Post: Guest
  Modeling and Testing of a Digital Distance Relay Using MATLAB/SIMULINK smart paper boy 6 4,043 09-08-2013, 10:56 AM
Last Post: computer topic

Forum Jump: