SlideShare a Scribd company logo
1 of 5
Download to read offline
Maneckshaw. B, Krishna Kumar. V / International Journal of Engineering Research and
                  Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                    Vol. 3, Issue 1, January -February 2013, pp.811-815

         Multiple FG Mapping Technique for Image Encryption
                            Maneckshaw. B*, Krishna Kumar. V**
          *(Department of Mathematics, Karaikal Polytechnic College, PIPMATE, Karaikal, India)
 ** (Department of Computer Science Engineering, Karaikal Polytechnic College, PIPMATE, Karaikal, India)


ABSTRACT
        The Fuzzy logic concept is implemented             𝜎: 𝑉 → 0,1 𝑎𝑛𝑑 𝜇: 𝑉 × 𝑉 → [0,1] such that all x,
in several image processing operations such as            y in V, 𝜇 𝑥, 𝑦 ≤ 𝜎 𝑥 ⋀𝜎 𝑦 , where ∧ refers to
edge detection, segmentation, object recognition,         minimum i𝑒. , 𝑎 ∧ 𝑏, 𝑚𝑒𝑎𝑛𝑠 min 𝑎, 𝑏 .
etc. In this paper, a novel Image encryption              Figure 2.1 shows an example of a fuzzy graph
algorithm based on multiple fuzzy graph (FG)              where their vertices and edges are labeled by their
mapping technique is proposed. The Fuzzy                  membership grades.
graphs are obtained from a matrix of size n and
then they are used to encrypt an image. Here
fuzzy graphs with triangular and sigmoid
membership       functions      are     discussed.
Experimental results show that this proposed
algorithm is more efficient and robust.

Keywords – Fuzzy graphs, fuzzy mappings,
image encryption, image processing,                                                 .
                                                                                 Fig. 2.1
membership functions.
                                                          A fuzzy graph can also be thought of having its
                                                          fuzzy values on a continuous universe. Say, for
I. INTRODUCTION                                           instance, a fuzzy graph whose vertices are
          Relaxation of crisp boundaries of the           represented by vectors and edges are represented
classical set redefines the inclusion and exclusion of
                                                          by the set of vectors spanned by the linear
members of the sets, this terminology, known as
                                                          combination of the vectors represented on its pair
Fuzzy sets was studied by Zadeh. [1-2]. A.
                                                          of incident vertices, then the edges have a set of
Rosenfeld developed the theory of fuzzy graphs[3].
                                                          variable vectors traversing on them whose
In this paper, we define fuzzy graphs based on [4]
                                                          membership grades are derived from a desired
and relax the fuzziness of the edges of the graphs
                                                          function, in such case the fuzzy graph will have a
for the purpose of encryption. Various fuzzy related
                                                          membership grades decided from a continuous
algorithms in the domain of image processing and
                                                          universe represented by a membership function.
pattern recognition have been discussed in [6-8].         Figure 2.2 shows a fuzzy graph whose membership
Here, we introduce some sketches for obtaining            grades are decided by a membership function,
fuzzy graphs such as fuzzy triangle, sigmoid fuzzy        sigmoid function [5] sig(x: a, c), defined in (2.1)
graphs from a square matrix of size n and discuss in
                                                          and whose graph is given in Fig.2.3.
detail how multiple numbers of fuzzy graphs are                                          1
generated for a single given matrix and single given                 𝑠𝑖𝑔 𝑥; 𝑎, 𝑐 =      −𝑎 (𝑥 −𝑐) (2.1)
                                                                                  1+𝑒
membership functions. We later employ this idea of
generating multiple fuzzy graphs [FG] as a
technique in image encryption. This paper is
divided into two parts; in the first part we define the
fuzzy graph and generation of multiple FGs and the
second part discusses image encryption techniques
in three phases-Pixel shuffling, FG mappings and
Image encryption based on multiple FG mapping
technique. We also propose some algorithms based
on the said techniques and have exhibited some                                                    1
                                                              𝑤𝑕𝑒𝑟𝑒 𝑓 𝑥 = 𝑠𝑖𝑔 𝑥; 𝑎, 𝑐 =
experimental results.                                                                       1 + 𝑒 −𝑎(𝑥−𝑐)
                                                                               Fig. 2.2
II. FUZZY GRAPHS
       A Fuzzy Graph [1] 𝐺 = 𝑉, 𝜎, 𝜇 is a
nonempty set V together with a pair of functions



                                                                                              811 | P a g e
Maneckshaw. B, Krishna Kumar. V / International Journal of Engineering Research and
                  Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                    Vol. 3, Issue 1, January -February 2013, pp.811-815




                                                                               Fig 3.1
                                                       Then     by      finding    membership      function,
                      Fig. 2.3                         triangle(1.9,,1,2,3) we obtain the grade 0.9 which
                                                       is given to vertex corresponding to first row.
III. OBTAINING A FUZZY GRAPH FROM A                    Similarly, the other grades are obtained as shown in
GIVEN SQUARE MATRIX                                    Fig 3.2.
In this section we explore some ins and outs of
obtaining a fuzzy graph from a given matrix. We
can do it in number of ways, here we give two
different ideas of obtaining them, the first one is
about obtaining a fuzzy cycle and the second is
about obtaining a fuzzy graph.
                                                                             Fig.3.2
3.1 Fuzzy cycle from Mat M.
Let M be any square matrix of size n; let the
                                                       3.2 Fuzzy graph from Mat M
vertices of the fuzzy graph represent the rows of
                                                       We can also obtain a desired graph from a matrix
the matrices. We draw an edge between every pair
                                                       by considering the vertices as the entries of the
of vertices if they represent adjacent rows of the
                                                       matrix and connecting edges between them
matrix. By assuming that the n th row is adjacent to
                                                       whenever they are adjacent. Thus we will get a grid
the 1st row, we will have an edge between the n th
                                                       like graph and for this graph if we apply
vertex and the 1st vertex. Thus we obtain a cycle of
                                                       membership grades we will obtain a fuzzy graph.
n vertices. Now, by defining the MFs on the
                                                       We can also consider omitting some edges without
vertices/edges we get a fuzzy cycle. For a 3x3
                                                       connecting some adjacent vertices for a desired
matrix we will obtain a fuzzy triangle as described
                                                       purpose to obtain distinct graphs. In the following,
in 3.1.1
                                                       we describe this idea of obtain a fuzzy graph with
                                                       the help of sigmoid function defined earlier and we
3.1.1 Fuzzy triangle from a 3x3 matrix
                                                       call this graph as sigmoid fuzzy graph.
Let M=[1 2 3;4 5 6;7 8 9], and the membership
function be the triangle(x;a,b,c) [5] as defined in
                                                       3.2.1 Sigmoid Fuzzy Graph
(3.2) whose graph is shown in Fig 3.1.
                              0, 𝑥 ≤ 𝑎.                Let A=(aij), be a 3x3 matrix, consider drawing a
                          𝑥−𝑎                          graph as shown in Fig.3.3.We name the vertex a 22
                               , 𝑎≤ 𝑥≤ 𝑏               as the centre `c’ . Keeping c as centre we obtain the
  𝑡𝑟𝑖𝑎𝑛𝑔𝑙𝑒 𝑥, 𝑎, 𝑏, 𝑐 = 𝑏−𝑎𝑐−𝑥               (3.2)
                               , 𝑏≤ 𝑥≤ 𝑐               fuzzy values for each vertex of the graph by
                           𝑏−𝑎
                                                       applying sigmoid function sig(x; a, c) as defined in
                               0, 𝑥 ≥ 𝑐
                                                       (3.1). The value a can be randomly chosen from
                                                       any other vertices, in this case we choose a =1. We
                                                       notice that the fuzzy value of c is 0.5 and the
                                                       corresponding values prior and later to centre c are
                                                       lesser and greater than 0.5 respectively.




                                                                                             812 | P a g e
Maneckshaw. B, Krishna Kumar. V / International Journal of Engineering Research and
                  Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                    Vol. 3, Issue 1, January -February 2013, pp.811-815

                                                              𝑋 ′ = 𝑇𝑋, 𝑤𝑕𝑒𝑟𝑒 𝑋 ∈ 𝐵𝑗 𝑎𝑛𝑑 𝑋 ′ ∈ 𝐶𝑗 (4.1)
                                                         The transformation is so chosen in such a way that
                                                         there exists greater dissimilarity between the blocks
                                                         Bj and Cj which is determined by using the
                                                         correlation function ρ as the dissimilarity measure
                                                         for a given threshold τ. The following algorithm
                                                         describes the process involved pixel shuffling.

                       Fig. 3.3                          4.1.2 Pixel shuffling Algorithm Begin Pixel
Now, if we change the ‘a’ value to be the entry at       Shuffling
a23, i.e., a=6, then we will have the fuzzy graph as     Step 1: Divide the image into blocks Bj
shown in Fig. 3.4. In this case we have obtained a       Step 2: Set up a transformation T=[Tm], where A is
fuzzy graph with lesser vertices as the grades at the    mx1 matrix and Tm is a 𝑗 × 𝑗 matrix where 𝑗 = 𝐶𝑗
remaining vertices vanish for a precision of 3           Step 3: Randomly chose a Tm from T
decimals. Here we can notice that still c’s value is     Step 4: For each block Bj apply the transformation
0.5. This means that the factor ‘a’ controls the         given below to obtain a new position of the vectors
slope at the cross over vertex ‘c’, where the cross                             𝑋′ = 𝑇 𝑚 𝑋
over vertex is the one which has a fuzzy value 0. 5      Step 5: Calculate the correlation ρ using the
and the corresponding values prior and later to          correlation function given in (4.2) for the blocks Bj
centre c are lesser and greater than 0.5 respectively.   and Cj where Bj is the original block and Cj is the
                                                         newly obtained block
                                                                           𝑖,𝑗 𝐵 𝑖𝑗 −𝐵 𝑖𝑗     𝐶 𝑖𝑗 −𝐶 𝑖𝑗
                                                                   𝜌=                     2                  2
                                                                                                                 (4.2)
                                                                          𝑖𝑗 𝐵 𝑖𝑗 −𝐵 𝑖𝑗         𝐶 𝑖𝑗 −𝐶 𝑖𝑗

                                                         Step 6: If 𝜌 < 𝜏 then place the pixels of Bj in Cj
                                                         Otherwise repeat the process by randomly
                                                         choosing 𝑇 𝑘 𝑓𝑜𝑟 𝑘 ≠ 𝑚. In case all such choices
                                                         are exhausted retain the lastly chosen
                                                         transformation
                                                         End Pixel Shuffling
                      Fig. 3.4
From this approach we understand that for a single       4.2 FG Mapping onto an image
matrix M of size n, and for a single membership          In this part, we describe the process of mapping the
function, we will get a multiple number of fuzzy         fuzzy graph onto an image. We have seen in the
graphs as we change our ‘a’ factor. Again when we        previous section how to generate a multiple
change the centre c, we will still get some more         numbers of fuzzy graphs such as fuzzy triangle,
new fuzzy graphs depending upon the matrix               fuzzy sigmoid graphs etc., from a given matrix of
choice. Hence, we are comprehended with the              size n. We can utilize these multiple FGs to
scale of generating a multiple number of fuzzy           construct a fuzzy graph covering over the image
graphs. We utilize this technique to generate            that is considered for encryption. By constructing
multiple numbers of fuzzy graphs which will aid us       FGs randomly over the image so that the union of
to have a fuzzy graph covering over an image to          such constructed FGs covers the entire image to a
encrypt it in an efficient manner. Section that          larger extend. The number of fuzzy graphs
follows is about implementing such a technique.          required for construction is proportional to the size
                                                         of the target image. The security of the encryption
IV. IMAGE ENCRYPTION                                     increases as the number of fuzzy graphs mapped
         This section is devoted to image                onto the image increases. This patents that it is
encryption using the technique of multiple FG            highly infeasible to decrypt the encrypted image
mapping. We undergo the process of image                 without knowing the patterns and the orders of the
encryption by dividing it into three stages –            fuzzy graphs so mapped onto it. The mapping is
shuffling, mapping and encryption in order to have       done by undergoing the following steps.
a greater security levels.
                                                         4.2.1 FG Mapping Algorithm
4.1 Pixel Shuflling                                      Begin
Foremostly, we consider grouping the images              Step 1: Choose a set of matrices M1, M2,…, Mk
pixels into image blocks Bj of size n-each such          Step 2: Choose a set of Membership functions MF1,
that B=UBj, where B is the image. For all pixels in      MF2, …, MFs. (s need not be equal to k as we know
 𝐵𝑗 , a unique block Cj is found through a               that for one MF we will get a multiple FGs, so
transformation represented in (4.1).                     s<=k).

                                                                                                                 813 | P a g e
Maneckshaw. B, Krishna Kumar. V / International Journal of Engineering Research and
                  Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                    Vol. 3, Issue 1, January -February 2013, pp.811-815
Step 3: Apply the MFs to obtain the Fuzzy Graphs        4.4 Experimental Results:
FG1, FG2 , …, FGt. (t will be greater than t for a                The proposed algorithm is implemented in
similar reason ,i.e., t>=k>=s).                         MATLAB software and tested with various images.
Step 4: Divide the shuffled image into blocks B1,       The results are presented in this section. The
B2 , … Bk of sizes n1, n2 ,… nk where each n j will     chosen matrix is [2 0 1; 4 9 3; 1 10 7] and the block
represent the number of vertices of FG1, FG2 , …,       size of the image is 3x3. We select the triangular
FGt and                                                 and the sigmoid fuzzy graphs mentioned in the
                                                        section 3.1.1 and in 3.2.1 and apply them
                𝑘           𝑡                           alternatively onto the image. The range for the
         𝑁=    𝑖=1   𝑛𝑖 =   𝑗 =1   𝑉(𝐹𝐺𝑗   (4.3)
                                                        membership function is 0 to 10 with increment of
Step 5: Plot the fuzzy graphs FG1, FG2 , …, FGt         0.1 (i.e) a total of 100 fuzzy floating values are
onto the image blocks B1, B2 , … Bk .                   obtained and a non-zero floating value is selected
End                                                     for XOR operation.
                                                        Fig 4.1 shows the lena image and its multiple FG
4.3 Image Encryption based on Multiple FG               mapped encrypted image and Fig 4.2 shows their
Mapping technique.                                      corresponding histograms.
The membership functions of the fuzzy graphs play
an important role on the outcome of the image
encryption process. The fuzzy value lies in the
interval [0,1], we can always have a one-one
mapping for any interval [a,b] of the real line, so
we choose an interval [a,b] of length b-a, first. For
every 𝑥𝜖[𝑎, 𝑏], we obtain a set of fuzzy floating
point (FFP) values for each fuzzy graphs FGj
contained in the block Bj. For a set of p- pixels
belonging to block Bj we will choose that number
of pixels using the FFP values. The selected FFP
values are then XOR’ ed with each pixel of the
image block Bj to obtain the encrypted image
block Ej as represented by the following equation.
        𝐸𝑗 = 𝑚𝑜𝑑(𝐹𝐹𝑃𝑗 ∗ 103 , 256)⨁𝑃𝑗 (4.4)
The following algorithm represents the process
described above.                                        Experimental results show that this proposed
                                                        algorithm has large key space analysis and the
4.3.1 Multiple FG mapping Technique Image               histogram of the encrypted image is uniformly
Processing Algorithm                                    distributed.
Begin
Step 1: Shuffle the image to be encrypted as given
shuffling algorithm of section
Step 2: Map the fuzzy graphs as given in FG
mapping algorithm
Step 3: Select a interval range [a,b]
Step 4: For each 𝑥𝜖[𝑎, 𝑏], obtain a set of fuzzy
floating point (FFP) values for each fuzzy graphs
FGj contained in the block B
Step 5: For a set of p- pixels belonging to block Bj
choose that number of pixels by using the FFP
values.
Step 6: Apply XOR with each pixel of the image
block Bj to obtain the encrypted image block Ej as
represented by the following equation (4.4).
          𝐸𝑗 = 𝑚𝑜𝑑(𝐹𝐹𝑃𝑗 ∗ 103 , 256)⨁𝑃𝑗
Step 7 : obtain the encrypted image E by taking the
union of Ej’s                                                                  Fig4.1
                      𝐸=           𝐸𝑗
                             𝑗
End



                                                                                             814 | P a g e
Maneckshaw. B, Krishna Kumar. V / International Journal of Engineering Research and
                    Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                      Vol. 3, Issue 1, January -February 2013, pp.811-815
                                                       [5]   J.S.R. Jang,C.-T. Sun and E. Mizutani,
                                                             Neuro-Fuzzy and Soft Computing, Prentice-
                                                             Hall of India, 2002.
                                                       [6]   Pal, S.K, “Fuzzy sets in image processing and
                                                             recognition”, IEEE International Conference
                                                             on Fuzzy Systems, pp. 119 – 126, Mar 1992.
                                                       [7]    Chi, Z., Yan, H., Pahm, T., Fuzzy
                                                             Algorithms: With Applications to Image
                                                             Processing             and             Pattern
                                                             Recognition((Advances in Fuzzy Systems:
                                                             Application and Theory), World Scientific
                                                             Pub Co Inc, 1996.
                                                       [8]   Tizhoosh, Hamid R. Fuzzy Image Processing:
                                                             Introduction in Theory and Applications,
                                                             Springer-Verlag, 1997.




                      Fig. 4.2
Thus for the proper decryption of the encrypted
image, we need to know the initial matrix, the
chosen     fuzzy graphs and their membership
functions, and the order in which they are applied
to the image. The chosen platform was a PC with
an Intel i3 processor with 2 GB RAM running
Microsoft Windows XP Professional with SP2.

V. CONCLUSION
         The proposed method have a larger key
space, i.e., the randomly obtained pixel values
which are combined with the original pixels of the
image are influenced by the factors such as the
chosen matrix, the size of the matrix, the types of
graphs obtained, the types of membership functions
chosen, the patterns of fuzzy graphs obtained, the
blocks they are plotted. Hence this technique
provides a multiple levels of securities for the
image encryption.


REFERENCES:
[1]    L.A. Zadeh. Fuzzy sets Inform. Control
       8(1965)
[2]    Zadeh L.A. Similarity relations and fuzzy
       ordering Information Sciences 971, 3(2):177-
       200.
[3]    A. Rosenfeld, Fuzzy Graphs: In fuzzy sets and
       their applications to cognitive and Decision
       processes. Zadeh. L.A, Fu.K.S.Shimura M.
       Eds. Academic Press. New York 1975 (77-93)
[4]    Mordeson. J. Nair. P.S, Fuzzy Graphs and
       Fuzzy Hyper Graphs, Physica-Verlag,(2000)


                                                                                            815 | P a g e

More Related Content

What's hot

Graceful labelings
Graceful labelingsGraceful labelings
Graceful labelingsradhikamathy
 
METRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORK
METRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORKMETRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORK
METRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORKgraphhoc
 
Effect of Rigidity on Trilateration Technique for Localization in Wireless Se...
Effect of Rigidity on Trilateration Technique for Localization in Wireless Se...Effect of Rigidity on Trilateration Technique for Localization in Wireless Se...
Effect of Rigidity on Trilateration Technique for Localization in Wireless Se...csandit
 
Numerical solution of fuzzy hybrid differential equation by third order runge...
Numerical solution of fuzzy hybrid differential equation by third order runge...Numerical solution of fuzzy hybrid differential equation by third order runge...
Numerical solution of fuzzy hybrid differential equation by third order runge...Alexander Decker
 
11.[8 17]numerical solution of fuzzy hybrid differential equation by third or...
11.[8 17]numerical solution of fuzzy hybrid differential equation by third or...11.[8 17]numerical solution of fuzzy hybrid differential equation by third or...
11.[8 17]numerical solution of fuzzy hybrid differential equation by third or...Alexander Decker
 
11.numerical solution of fuzzy hybrid differential equation by third order ru...
11.numerical solution of fuzzy hybrid differential equation by third order ru...11.numerical solution of fuzzy hybrid differential equation by third order ru...
11.numerical solution of fuzzy hybrid differential equation by third order ru...Alexander Decker
 
CS 354 Surfaces, Programmable Tessellation, and NPR Graphics
CS 354 Surfaces, Programmable Tessellation, and NPR GraphicsCS 354 Surfaces, Programmable Tessellation, and NPR Graphics
CS 354 Surfaces, Programmable Tessellation, and NPR GraphicsMark Kilgard
 
Paper id 71201925
Paper id 71201925Paper id 71201925
Paper id 71201925IJRAT
 
Performance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism HardwarePerformance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism HardwareCSCJournals
 
Introduction to Optial Flow
Introduction to Optial FlowIntroduction to Optial Flow
Introduction to Optial FlowSylvain_Lobry
 
CC282 Unsupervised Learning (Clustering) Lecture 7 slides for ...
CC282 Unsupervised Learning (Clustering) Lecture 7 slides for ...CC282 Unsupervised Learning (Clustering) Lecture 7 slides for ...
CC282 Unsupervised Learning (Clustering) Lecture 7 slides for ...butest
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Generalized fixed point theorems for compatible mapping in fuzzy 3 metric spa...
Generalized fixed point theorems for compatible mapping in fuzzy 3 metric spa...Generalized fixed point theorems for compatible mapping in fuzzy 3 metric spa...
Generalized fixed point theorems for compatible mapping in fuzzy 3 metric spa...Alexander Decker
 
An Efficient Multiplierless Transform algorithm for Video Coding
An Efficient Multiplierless Transform algorithm for Video CodingAn Efficient Multiplierless Transform algorithm for Video Coding
An Efficient Multiplierless Transform algorithm for Video CodingCSCJournals
 
Generalized fixed point theorems for compatible mapping in fuzzy 2 metric spa...
Generalized fixed point theorems for compatible mapping in fuzzy 2 metric spa...Generalized fixed point theorems for compatible mapping in fuzzy 2 metric spa...
Generalized fixed point theorems for compatible mapping in fuzzy 2 metric spa...Alexander Decker
 

What's hot (19)

Graceful labelings
Graceful labelingsGraceful labelings
Graceful labelings
 
METRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORK
METRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORKMETRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORK
METRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORK
 
Effect of Rigidity on Trilateration Technique for Localization in Wireless Se...
Effect of Rigidity on Trilateration Technique for Localization in Wireless Se...Effect of Rigidity on Trilateration Technique for Localization in Wireless Se...
Effect of Rigidity on Trilateration Technique for Localization in Wireless Se...
 
data_mining
data_miningdata_mining
data_mining
 
Numerical solution of fuzzy hybrid differential equation by third order runge...
Numerical solution of fuzzy hybrid differential equation by third order runge...Numerical solution of fuzzy hybrid differential equation by third order runge...
Numerical solution of fuzzy hybrid differential equation by third order runge...
 
11.[8 17]numerical solution of fuzzy hybrid differential equation by third or...
11.[8 17]numerical solution of fuzzy hybrid differential equation by third or...11.[8 17]numerical solution of fuzzy hybrid differential equation by third or...
11.[8 17]numerical solution of fuzzy hybrid differential equation by third or...
 
11.numerical solution of fuzzy hybrid differential equation by third order ru...
11.numerical solution of fuzzy hybrid differential equation by third order ru...11.numerical solution of fuzzy hybrid differential equation by third order ru...
11.numerical solution of fuzzy hybrid differential equation by third order ru...
 
CS 354 Surfaces, Programmable Tessellation, and NPR Graphics
CS 354 Surfaces, Programmable Tessellation, and NPR GraphicsCS 354 Surfaces, Programmable Tessellation, and NPR Graphics
CS 354 Surfaces, Programmable Tessellation, and NPR Graphics
 
Paper id 71201925
Paper id 71201925Paper id 71201925
Paper id 71201925
 
Performance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism HardwarePerformance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism Hardware
 
Joint3DShapeMatching
Joint3DShapeMatchingJoint3DShapeMatching
Joint3DShapeMatching
 
Introduction to Optial Flow
Introduction to Optial FlowIntroduction to Optial Flow
Introduction to Optial Flow
 
Clustering tutorial
Clustering tutorialClustering tutorial
Clustering tutorial
 
CC282 Unsupervised Learning (Clustering) Lecture 7 slides for ...
CC282 Unsupervised Learning (Clustering) Lecture 7 slides for ...CC282 Unsupervised Learning (Clustering) Lecture 7 slides for ...
CC282 Unsupervised Learning (Clustering) Lecture 7 slides for ...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Generalized fixed point theorems for compatible mapping in fuzzy 3 metric spa...
Generalized fixed point theorems for compatible mapping in fuzzy 3 metric spa...Generalized fixed point theorems for compatible mapping in fuzzy 3 metric spa...
Generalized fixed point theorems for compatible mapping in fuzzy 3 metric spa...
 
An Efficient Multiplierless Transform algorithm for Video Coding
An Efficient Multiplierless Transform algorithm for Video CodingAn Efficient Multiplierless Transform algorithm for Video Coding
An Efficient Multiplierless Transform algorithm for Video Coding
 
Generalized fixed point theorems for compatible mapping in fuzzy 2 metric spa...
Generalized fixed point theorems for compatible mapping in fuzzy 2 metric spa...Generalized fixed point theorems for compatible mapping in fuzzy 2 metric spa...
Generalized fixed point theorems for compatible mapping in fuzzy 2 metric spa...
 
2-D array
2-D array2-D array
2-D array
 

Viewers also liked

Viewers also liked (20)

Eb33766771
Eb33766771Eb33766771
Eb33766771
 
Dz31840846
Dz31840846Dz31840846
Dz31840846
 
Dm31762765
Dm31762765Dm31762765
Dm31762765
 
Dh31738742
Dh31738742Dh31738742
Dh31738742
 
Dv31821825
Dv31821825Dv31821825
Dv31821825
 
Dy31832839
Dy31832839Dy31832839
Dy31832839
 
Ee33783786
Ee33783786Ee33783786
Ee33783786
 
數位化學習診斷 10-28
數位化學習診斷 10-28數位化學習診斷 10-28
數位化學習診斷 10-28
 
Access1
Access1Access1
Access1
 
Diario eletronico
Diario eletronicoDiario eletronico
Diario eletronico
 
BPA-LRP-Advanced-Adults_2
BPA-LRP-Advanced-Adults_2BPA-LRP-Advanced-Adults_2
BPA-LRP-Advanced-Adults_2
 
Trabajo de MATLAB
Trabajo de MATLABTrabajo de MATLAB
Trabajo de MATLAB
 
Mi aplicacion
Mi aplicacionMi aplicacion
Mi aplicacion
 
Creacindel mundo
Creacindel mundoCreacindel mundo
Creacindel mundo
 
Actividades culturales VII Congreso Ibérico
Actividades culturales VII Congreso IbéricoActividades culturales VII Congreso Ibérico
Actividades culturales VII Congreso Ibérico
 
Jardim da serra
Jardim da serraJardim da serra
Jardim da serra
 
Novembro
NovembroNovembro
Novembro
 
Actividades de probabilidades_dos_1001_itens
Actividades de probabilidades_dos_1001_itensActividades de probabilidades_dos_1001_itens
Actividades de probabilidades_dos_1001_itens
 
A Ge.N.Te no Carro
A Ge.N.Te no CarroA Ge.N.Te no Carro
A Ge.N.Te no Carro
 
Actividad comunitaria veredas carpintero y porvenir
Actividad comunitaria veredas carpintero y porvenirActividad comunitaria veredas carpintero y porvenir
Actividad comunitaria veredas carpintero y porvenir
 

Similar to Dt31811815

Wordoku Puzzle Solver - Image Processing Project
Wordoku Puzzle Solver - Image Processing ProjectWordoku Puzzle Solver - Image Processing Project
Wordoku Puzzle Solver - Image Processing ProjectSurya Chandra
 
Cj31365368
Cj31365368Cj31365368
Cj31365368IJMER
 
PROBABILISTIC INTERPRETATION OF COMPLEX FUZZY SET
PROBABILISTIC INTERPRETATION OF COMPLEX FUZZY SETPROBABILISTIC INTERPRETATION OF COMPLEX FUZZY SET
PROBABILISTIC INTERPRETATION OF COMPLEX FUZZY SETIJCSEIT Journal
 
Diagram geometry
Diagram geometryDiagram geometry
Diagram geometrySpringer
 
Au2419291933
Au2419291933Au2419291933
Au2419291933IJMER
 
Kernels in convolution
Kernels in convolutionKernels in convolution
Kernels in convolutionRevanth Kumar
 
GREY LEVEL CO-OCCURRENCE MATRICES: GENERALISATION AND SOME NEW FEATURES
GREY LEVEL CO-OCCURRENCE MATRICES: GENERALISATION AND SOME NEW FEATURESGREY LEVEL CO-OCCURRENCE MATRICES: GENERALISATION AND SOME NEW FEATURES
GREY LEVEL CO-OCCURRENCE MATRICES: GENERALISATION AND SOME NEW FEATURESijcseit
 
Graceful Labeling For Open Star of Graphs
Graceful Labeling For Open Star of GraphsGraceful Labeling For Open Star of Graphs
Graceful Labeling For Open Star of Graphsinventionjournals
 
Image similarity using symbolic representation and its variations
Image similarity using symbolic representation and its variationsImage similarity using symbolic representation and its variations
Image similarity using symbolic representation and its variationssipij
 
Bloom Graph
Bloom GraphBloom Graph
Bloom GraphMangaiK4
 
AN APPLICATION OF Gd -METRIC SPACES AND METRIC DIMENSION OF GRAPHS
AN APPLICATION OF Gd -METRIC SPACES AND METRIC DIMENSION OF GRAPHSAN APPLICATION OF Gd -METRIC SPACES AND METRIC DIMENSION OF GRAPHS
AN APPLICATION OF Gd -METRIC SPACES AND METRIC DIMENSION OF GRAPHSFransiskeran
 
MPHIL LAKSHMANAN 1.pptx
MPHIL LAKSHMANAN 1.pptxMPHIL LAKSHMANAN 1.pptx
MPHIL LAKSHMANAN 1.pptxbrckundadam
 
INDUCTIVE LEARNING OF COMPLEX FUZZY RELATION
INDUCTIVE LEARNING OF COMPLEX FUZZY RELATIONINDUCTIVE LEARNING OF COMPLEX FUZZY RELATION
INDUCTIVE LEARNING OF COMPLEX FUZZY RELATIONijcseit
 
INDUCTIVE LEARNING OF COMPLEX FUZZY RELATION
INDUCTIVE LEARNING OF COMPLEX FUZZY RELATIONINDUCTIVE LEARNING OF COMPLEX FUZZY RELATION
INDUCTIVE LEARNING OF COMPLEX FUZZY RELATIONijcseit
 
DOMAIN SPECIFIC CBIR FOR HIGHLY TEXTURED IMAGES
DOMAIN SPECIFIC CBIR FOR HIGHLY TEXTURED IMAGESDOMAIN SPECIFIC CBIR FOR HIGHLY TEXTURED IMAGES
DOMAIN SPECIFIC CBIR FOR HIGHLY TEXTURED IMAGEScseij
 
New Classes of Odd Graceful Graphs - M. E. Abdel-Aal
New Classes of Odd Graceful Graphs - M. E. Abdel-AalNew Classes of Odd Graceful Graphs - M. E. Abdel-Aal
New Classes of Odd Graceful Graphs - M. E. Abdel-AalGiselleginaGloria
 
Graph Dynamical System on Graph Colouring
Graph Dynamical System on Graph ColouringGraph Dynamical System on Graph Colouring
Graph Dynamical System on Graph ColouringClyde Shen
 
Image Restoration and Denoising By Using Nonlocally Centralized Sparse Repres...
Image Restoration and Denoising By Using Nonlocally Centralized Sparse Repres...Image Restoration and Denoising By Using Nonlocally Centralized Sparse Repres...
Image Restoration and Denoising By Using Nonlocally Centralized Sparse Repres...IJERA Editor
 

Similar to Dt31811815 (20)

Siegel
SiegelSiegel
Siegel
 
Wordoku Puzzle Solver - Image Processing Project
Wordoku Puzzle Solver - Image Processing ProjectWordoku Puzzle Solver - Image Processing Project
Wordoku Puzzle Solver - Image Processing Project
 
Cj31365368
Cj31365368Cj31365368
Cj31365368
 
PROBABILISTIC INTERPRETATION OF COMPLEX FUZZY SET
PROBABILISTIC INTERPRETATION OF COMPLEX FUZZY SETPROBABILISTIC INTERPRETATION OF COMPLEX FUZZY SET
PROBABILISTIC INTERPRETATION OF COMPLEX FUZZY SET
 
Diagram geometry
Diagram geometryDiagram geometry
Diagram geometry
 
Au2419291933
Au2419291933Au2419291933
Au2419291933
 
Kernels in convolution
Kernels in convolutionKernels in convolution
Kernels in convolution
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
GREY LEVEL CO-OCCURRENCE MATRICES: GENERALISATION AND SOME NEW FEATURES
GREY LEVEL CO-OCCURRENCE MATRICES: GENERALISATION AND SOME NEW FEATURESGREY LEVEL CO-OCCURRENCE MATRICES: GENERALISATION AND SOME NEW FEATURES
GREY LEVEL CO-OCCURRENCE MATRICES: GENERALISATION AND SOME NEW FEATURES
 
Graceful Labeling For Open Star of Graphs
Graceful Labeling For Open Star of GraphsGraceful Labeling For Open Star of Graphs
Graceful Labeling For Open Star of Graphs
 
Image similarity using symbolic representation and its variations
Image similarity using symbolic representation and its variationsImage similarity using symbolic representation and its variations
Image similarity using symbolic representation and its variations
 
Bloom Graph
Bloom GraphBloom Graph
Bloom Graph
 
AN APPLICATION OF Gd -METRIC SPACES AND METRIC DIMENSION OF GRAPHS
AN APPLICATION OF Gd -METRIC SPACES AND METRIC DIMENSION OF GRAPHSAN APPLICATION OF Gd -METRIC SPACES AND METRIC DIMENSION OF GRAPHS
AN APPLICATION OF Gd -METRIC SPACES AND METRIC DIMENSION OF GRAPHS
 
MPHIL LAKSHMANAN 1.pptx
MPHIL LAKSHMANAN 1.pptxMPHIL LAKSHMANAN 1.pptx
MPHIL LAKSHMANAN 1.pptx
 
INDUCTIVE LEARNING OF COMPLEX FUZZY RELATION
INDUCTIVE LEARNING OF COMPLEX FUZZY RELATIONINDUCTIVE LEARNING OF COMPLEX FUZZY RELATION
INDUCTIVE LEARNING OF COMPLEX FUZZY RELATION
 
INDUCTIVE LEARNING OF COMPLEX FUZZY RELATION
INDUCTIVE LEARNING OF COMPLEX FUZZY RELATIONINDUCTIVE LEARNING OF COMPLEX FUZZY RELATION
INDUCTIVE LEARNING OF COMPLEX FUZZY RELATION
 
DOMAIN SPECIFIC CBIR FOR HIGHLY TEXTURED IMAGES
DOMAIN SPECIFIC CBIR FOR HIGHLY TEXTURED IMAGESDOMAIN SPECIFIC CBIR FOR HIGHLY TEXTURED IMAGES
DOMAIN SPECIFIC CBIR FOR HIGHLY TEXTURED IMAGES
 
New Classes of Odd Graceful Graphs - M. E. Abdel-Aal
New Classes of Odd Graceful Graphs - M. E. Abdel-AalNew Classes of Odd Graceful Graphs - M. E. Abdel-Aal
New Classes of Odd Graceful Graphs - M. E. Abdel-Aal
 
Graph Dynamical System on Graph Colouring
Graph Dynamical System on Graph ColouringGraph Dynamical System on Graph Colouring
Graph Dynamical System on Graph Colouring
 
Image Restoration and Denoising By Using Nonlocally Centralized Sparse Repres...
Image Restoration and Denoising By Using Nonlocally Centralized Sparse Repres...Image Restoration and Denoising By Using Nonlocally Centralized Sparse Repres...
Image Restoration and Denoising By Using Nonlocally Centralized Sparse Repres...
 

Dt31811815

  • 1. Maneckshaw. B, Krishna Kumar. V / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 1, January -February 2013, pp.811-815 Multiple FG Mapping Technique for Image Encryption Maneckshaw. B*, Krishna Kumar. V** *(Department of Mathematics, Karaikal Polytechnic College, PIPMATE, Karaikal, India) ** (Department of Computer Science Engineering, Karaikal Polytechnic College, PIPMATE, Karaikal, India) ABSTRACT The Fuzzy logic concept is implemented 𝜎: 𝑉 → 0,1 𝑎𝑛𝑑 𝜇: 𝑉 × 𝑉 → [0,1] such that all x, in several image processing operations such as y in V, 𝜇 𝑥, 𝑦 ≤ 𝜎 𝑥 ⋀𝜎 𝑦 , where ∧ refers to edge detection, segmentation, object recognition, minimum i𝑒. , 𝑎 ∧ 𝑏, 𝑚𝑒𝑎𝑛𝑠 min 𝑎, 𝑏 . etc. In this paper, a novel Image encryption Figure 2.1 shows an example of a fuzzy graph algorithm based on multiple fuzzy graph (FG) where their vertices and edges are labeled by their mapping technique is proposed. The Fuzzy membership grades. graphs are obtained from a matrix of size n and then they are used to encrypt an image. Here fuzzy graphs with triangular and sigmoid membership functions are discussed. Experimental results show that this proposed algorithm is more efficient and robust. Keywords – Fuzzy graphs, fuzzy mappings, image encryption, image processing, . Fig. 2.1 membership functions. A fuzzy graph can also be thought of having its fuzzy values on a continuous universe. Say, for I. INTRODUCTION instance, a fuzzy graph whose vertices are Relaxation of crisp boundaries of the represented by vectors and edges are represented classical set redefines the inclusion and exclusion of by the set of vectors spanned by the linear members of the sets, this terminology, known as combination of the vectors represented on its pair Fuzzy sets was studied by Zadeh. [1-2]. A. of incident vertices, then the edges have a set of Rosenfeld developed the theory of fuzzy graphs[3]. variable vectors traversing on them whose In this paper, we define fuzzy graphs based on [4] membership grades are derived from a desired and relax the fuzziness of the edges of the graphs function, in such case the fuzzy graph will have a for the purpose of encryption. Various fuzzy related membership grades decided from a continuous algorithms in the domain of image processing and universe represented by a membership function. pattern recognition have been discussed in [6-8]. Figure 2.2 shows a fuzzy graph whose membership Here, we introduce some sketches for obtaining grades are decided by a membership function, fuzzy graphs such as fuzzy triangle, sigmoid fuzzy sigmoid function [5] sig(x: a, c), defined in (2.1) graphs from a square matrix of size n and discuss in and whose graph is given in Fig.2.3. detail how multiple numbers of fuzzy graphs are 1 generated for a single given matrix and single given 𝑠𝑖𝑔 𝑥; 𝑎, 𝑐 = −𝑎 (𝑥 −𝑐) (2.1) 1+𝑒 membership functions. We later employ this idea of generating multiple fuzzy graphs [FG] as a technique in image encryption. This paper is divided into two parts; in the first part we define the fuzzy graph and generation of multiple FGs and the second part discusses image encryption techniques in three phases-Pixel shuffling, FG mappings and Image encryption based on multiple FG mapping technique. We also propose some algorithms based on the said techniques and have exhibited some 1 𝑤𝑕𝑒𝑟𝑒 𝑓 𝑥 = 𝑠𝑖𝑔 𝑥; 𝑎, 𝑐 = experimental results. 1 + 𝑒 −𝑎(𝑥−𝑐) Fig. 2.2 II. FUZZY GRAPHS A Fuzzy Graph [1] 𝐺 = 𝑉, 𝜎, 𝜇 is a nonempty set V together with a pair of functions 811 | P a g e
  • 2. Maneckshaw. B, Krishna Kumar. V / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 1, January -February 2013, pp.811-815 Fig 3.1 Then by finding membership function, Fig. 2.3 triangle(1.9,,1,2,3) we obtain the grade 0.9 which is given to vertex corresponding to first row. III. OBTAINING A FUZZY GRAPH FROM A Similarly, the other grades are obtained as shown in GIVEN SQUARE MATRIX Fig 3.2. In this section we explore some ins and outs of obtaining a fuzzy graph from a given matrix. We can do it in number of ways, here we give two different ideas of obtaining them, the first one is about obtaining a fuzzy cycle and the second is about obtaining a fuzzy graph. Fig.3.2 3.1 Fuzzy cycle from Mat M. Let M be any square matrix of size n; let the 3.2 Fuzzy graph from Mat M vertices of the fuzzy graph represent the rows of We can also obtain a desired graph from a matrix the matrices. We draw an edge between every pair by considering the vertices as the entries of the of vertices if they represent adjacent rows of the matrix and connecting edges between them matrix. By assuming that the n th row is adjacent to whenever they are adjacent. Thus we will get a grid the 1st row, we will have an edge between the n th like graph and for this graph if we apply vertex and the 1st vertex. Thus we obtain a cycle of membership grades we will obtain a fuzzy graph. n vertices. Now, by defining the MFs on the We can also consider omitting some edges without vertices/edges we get a fuzzy cycle. For a 3x3 connecting some adjacent vertices for a desired matrix we will obtain a fuzzy triangle as described purpose to obtain distinct graphs. In the following, in 3.1.1 we describe this idea of obtain a fuzzy graph with the help of sigmoid function defined earlier and we 3.1.1 Fuzzy triangle from a 3x3 matrix call this graph as sigmoid fuzzy graph. Let M=[1 2 3;4 5 6;7 8 9], and the membership function be the triangle(x;a,b,c) [5] as defined in 3.2.1 Sigmoid Fuzzy Graph (3.2) whose graph is shown in Fig 3.1. 0, 𝑥 ≤ 𝑎. Let A=(aij), be a 3x3 matrix, consider drawing a 𝑥−𝑎 graph as shown in Fig.3.3.We name the vertex a 22 , 𝑎≤ 𝑥≤ 𝑏 as the centre `c’ . Keeping c as centre we obtain the 𝑡𝑟𝑖𝑎𝑛𝑔𝑙𝑒 𝑥, 𝑎, 𝑏, 𝑐 = 𝑏−𝑎𝑐−𝑥 (3.2) , 𝑏≤ 𝑥≤ 𝑐 fuzzy values for each vertex of the graph by 𝑏−𝑎 applying sigmoid function sig(x; a, c) as defined in 0, 𝑥 ≥ 𝑐 (3.1). The value a can be randomly chosen from any other vertices, in this case we choose a =1. We notice that the fuzzy value of c is 0.5 and the corresponding values prior and later to centre c are lesser and greater than 0.5 respectively. 812 | P a g e
  • 3. Maneckshaw. B, Krishna Kumar. V / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 1, January -February 2013, pp.811-815 𝑋 ′ = 𝑇𝑋, 𝑤𝑕𝑒𝑟𝑒 𝑋 ∈ 𝐵𝑗 𝑎𝑛𝑑 𝑋 ′ ∈ 𝐶𝑗 (4.1) The transformation is so chosen in such a way that there exists greater dissimilarity between the blocks Bj and Cj which is determined by using the correlation function ρ as the dissimilarity measure for a given threshold τ. The following algorithm describes the process involved pixel shuffling. Fig. 3.3 4.1.2 Pixel shuffling Algorithm Begin Pixel Now, if we change the ‘a’ value to be the entry at Shuffling a23, i.e., a=6, then we will have the fuzzy graph as Step 1: Divide the image into blocks Bj shown in Fig. 3.4. In this case we have obtained a Step 2: Set up a transformation T=[Tm], where A is fuzzy graph with lesser vertices as the grades at the mx1 matrix and Tm is a 𝑗 × 𝑗 matrix where 𝑗 = 𝐶𝑗 remaining vertices vanish for a precision of 3 Step 3: Randomly chose a Tm from T decimals. Here we can notice that still c’s value is Step 4: For each block Bj apply the transformation 0.5. This means that the factor ‘a’ controls the given below to obtain a new position of the vectors slope at the cross over vertex ‘c’, where the cross 𝑋′ = 𝑇 𝑚 𝑋 over vertex is the one which has a fuzzy value 0. 5 Step 5: Calculate the correlation ρ using the and the corresponding values prior and later to correlation function given in (4.2) for the blocks Bj centre c are lesser and greater than 0.5 respectively. and Cj where Bj is the original block and Cj is the newly obtained block 𝑖,𝑗 𝐵 𝑖𝑗 −𝐵 𝑖𝑗 𝐶 𝑖𝑗 −𝐶 𝑖𝑗 𝜌= 2 2 (4.2) 𝑖𝑗 𝐵 𝑖𝑗 −𝐵 𝑖𝑗 𝐶 𝑖𝑗 −𝐶 𝑖𝑗 Step 6: If 𝜌 < 𝜏 then place the pixels of Bj in Cj Otherwise repeat the process by randomly choosing 𝑇 𝑘 𝑓𝑜𝑟 𝑘 ≠ 𝑚. In case all such choices are exhausted retain the lastly chosen transformation End Pixel Shuffling Fig. 3.4 From this approach we understand that for a single 4.2 FG Mapping onto an image matrix M of size n, and for a single membership In this part, we describe the process of mapping the function, we will get a multiple number of fuzzy fuzzy graph onto an image. We have seen in the graphs as we change our ‘a’ factor. Again when we previous section how to generate a multiple change the centre c, we will still get some more numbers of fuzzy graphs such as fuzzy triangle, new fuzzy graphs depending upon the matrix fuzzy sigmoid graphs etc., from a given matrix of choice. Hence, we are comprehended with the size n. We can utilize these multiple FGs to scale of generating a multiple number of fuzzy construct a fuzzy graph covering over the image graphs. We utilize this technique to generate that is considered for encryption. By constructing multiple numbers of fuzzy graphs which will aid us FGs randomly over the image so that the union of to have a fuzzy graph covering over an image to such constructed FGs covers the entire image to a encrypt it in an efficient manner. Section that larger extend. The number of fuzzy graphs follows is about implementing such a technique. required for construction is proportional to the size of the target image. The security of the encryption IV. IMAGE ENCRYPTION increases as the number of fuzzy graphs mapped This section is devoted to image onto the image increases. This patents that it is encryption using the technique of multiple FG highly infeasible to decrypt the encrypted image mapping. We undergo the process of image without knowing the patterns and the orders of the encryption by dividing it into three stages – fuzzy graphs so mapped onto it. The mapping is shuffling, mapping and encryption in order to have done by undergoing the following steps. a greater security levels. 4.2.1 FG Mapping Algorithm 4.1 Pixel Shuflling Begin Foremostly, we consider grouping the images Step 1: Choose a set of matrices M1, M2,…, Mk pixels into image blocks Bj of size n-each such Step 2: Choose a set of Membership functions MF1, that B=UBj, where B is the image. For all pixels in MF2, …, MFs. (s need not be equal to k as we know 𝐵𝑗 , a unique block Cj is found through a that for one MF we will get a multiple FGs, so transformation represented in (4.1). s<=k). 813 | P a g e
  • 4. Maneckshaw. B, Krishna Kumar. V / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 1, January -February 2013, pp.811-815 Step 3: Apply the MFs to obtain the Fuzzy Graphs 4.4 Experimental Results: FG1, FG2 , …, FGt. (t will be greater than t for a The proposed algorithm is implemented in similar reason ,i.e., t>=k>=s). MATLAB software and tested with various images. Step 4: Divide the shuffled image into blocks B1, The results are presented in this section. The B2 , … Bk of sizes n1, n2 ,… nk where each n j will chosen matrix is [2 0 1; 4 9 3; 1 10 7] and the block represent the number of vertices of FG1, FG2 , …, size of the image is 3x3. We select the triangular FGt and and the sigmoid fuzzy graphs mentioned in the section 3.1.1 and in 3.2.1 and apply them 𝑘 𝑡 alternatively onto the image. The range for the 𝑁= 𝑖=1 𝑛𝑖 = 𝑗 =1 𝑉(𝐹𝐺𝑗 (4.3) membership function is 0 to 10 with increment of Step 5: Plot the fuzzy graphs FG1, FG2 , …, FGt 0.1 (i.e) a total of 100 fuzzy floating values are onto the image blocks B1, B2 , … Bk . obtained and a non-zero floating value is selected End for XOR operation. Fig 4.1 shows the lena image and its multiple FG 4.3 Image Encryption based on Multiple FG mapped encrypted image and Fig 4.2 shows their Mapping technique. corresponding histograms. The membership functions of the fuzzy graphs play an important role on the outcome of the image encryption process. The fuzzy value lies in the interval [0,1], we can always have a one-one mapping for any interval [a,b] of the real line, so we choose an interval [a,b] of length b-a, first. For every 𝑥𝜖[𝑎, 𝑏], we obtain a set of fuzzy floating point (FFP) values for each fuzzy graphs FGj contained in the block Bj. For a set of p- pixels belonging to block Bj we will choose that number of pixels using the FFP values. The selected FFP values are then XOR’ ed with each pixel of the image block Bj to obtain the encrypted image block Ej as represented by the following equation. 𝐸𝑗 = 𝑚𝑜𝑑(𝐹𝐹𝑃𝑗 ∗ 103 , 256)⨁𝑃𝑗 (4.4) The following algorithm represents the process described above. Experimental results show that this proposed algorithm has large key space analysis and the 4.3.1 Multiple FG mapping Technique Image histogram of the encrypted image is uniformly Processing Algorithm distributed. Begin Step 1: Shuffle the image to be encrypted as given shuffling algorithm of section Step 2: Map the fuzzy graphs as given in FG mapping algorithm Step 3: Select a interval range [a,b] Step 4: For each 𝑥𝜖[𝑎, 𝑏], obtain a set of fuzzy floating point (FFP) values for each fuzzy graphs FGj contained in the block B Step 5: For a set of p- pixels belonging to block Bj choose that number of pixels by using the FFP values. Step 6: Apply XOR with each pixel of the image block Bj to obtain the encrypted image block Ej as represented by the following equation (4.4). 𝐸𝑗 = 𝑚𝑜𝑑(𝐹𝐹𝑃𝑗 ∗ 103 , 256)⨁𝑃𝑗 Step 7 : obtain the encrypted image E by taking the union of Ej’s Fig4.1 𝐸= 𝐸𝑗 𝑗 End 814 | P a g e
  • 5. Maneckshaw. B, Krishna Kumar. V / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 1, January -February 2013, pp.811-815 [5] J.S.R. Jang,C.-T. Sun and E. Mizutani, Neuro-Fuzzy and Soft Computing, Prentice- Hall of India, 2002. [6] Pal, S.K, “Fuzzy sets in image processing and recognition”, IEEE International Conference on Fuzzy Systems, pp. 119 – 126, Mar 1992. [7] Chi, Z., Yan, H., Pahm, T., Fuzzy Algorithms: With Applications to Image Processing and Pattern Recognition((Advances in Fuzzy Systems: Application and Theory), World Scientific Pub Co Inc, 1996. [8] Tizhoosh, Hamid R. Fuzzy Image Processing: Introduction in Theory and Applications, Springer-Verlag, 1997. Fig. 4.2 Thus for the proper decryption of the encrypted image, we need to know the initial matrix, the chosen fuzzy graphs and their membership functions, and the order in which they are applied to the image. The chosen platform was a PC with an Intel i3 processor with 2 GB RAM running Microsoft Windows XP Professional with SP2. V. CONCLUSION The proposed method have a larger key space, i.e., the randomly obtained pixel values which are combined with the original pixels of the image are influenced by the factors such as the chosen matrix, the size of the matrix, the types of graphs obtained, the types of membership functions chosen, the patterns of fuzzy graphs obtained, the blocks they are plotted. Hence this technique provides a multiple levels of securities for the image encryption. REFERENCES: [1] L.A. Zadeh. Fuzzy sets Inform. Control 8(1965) [2] Zadeh L.A. Similarity relations and fuzzy ordering Information Sciences 971, 3(2):177- 200. [3] A. Rosenfeld, Fuzzy Graphs: In fuzzy sets and their applications to cognitive and Decision processes. Zadeh. L.A, Fu.K.S.Shimura M. Eds. Academic Press. New York 1975 (77-93) [4] Mordeson. J. Nair. P.S, Fuzzy Graphs and Fuzzy Hyper Graphs, Physica-Verlag,(2000) 815 | P a g e