SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2424
An Effective Strategy for Defense & Medical Pictures Security by
Singular Value Decomposition
Ashish Ranjan1, Krishna Kant Nayak2
1Student, Dept. of ECE, BIST, Bhopal, India
2Professor, Dept. of ECE, BIST, Bhopal, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Medical and Defense pictures are viewed as
significant and delicate information in the medicinal
informatics frameworks. For exchanging secure pictures over
an unreliable system, building up a safe encryption technique
is vital. In this quick creating universeoftheInternet, verifying
pictures is a noteworthy security worry away and
correspondence. Pictures are inclined to altering, spillageand
assaults. The idea of share matrix S(k,n) for the creation of
shares has been investigated. These types of shares give a
strength to the security or encryption of the confidential
information and images.In this article, paper illustrates the
utilization of share gen- eration idea for encryption of the
digital pictures in the SVD domain. The singular value of the
SVD component functions as a good choice to create the
shares of the picture. To bring the further improvement in the
robustness, we apply FrFT. The sequence of the FrFT (α1,
α2) combined with the singular vectors (i.e., U and V ) parts of
the initial/base image functions similar to keys. A variety of
quantitative parameters such as for examplespeed, number of
pixels change rate (NPCR), unified average changing intensity
(UACI), entropy, correlation coefficient, key sensitivity and
mean square error (MSE) have been completely researched to
examine the overall performance of the suggested technique.
Key Words: Image Encryption, FrFT, Share matrix
generation, Sensitivity, cryptography.
1. INTRODUCTION
In the modern age, images are most utilized communication
method in the various areas including business, medical,
military etc. The accelerated advancement of different com-
municating systems, we encounter with the large
requirements to protect the transferred data as these
pictures are transmitted through the unprotected network
system. The protection of the digital images takes on a huge
role in data evaluation. Individuals usually want to maintain
their data protected from unauthorized users. Therefore,
several encryption approaches is necessary by us that may
save or hide important info of the images. However, saving
sensitive info at one node provides loose effectiveness. This
obviously suggests the number of nodes need to be enough
that can prevent any physical harm to the info.
Secure graphic sharing is certainly an interesting research
subject in multimedia systems. Its function is to encrypt an
primary picture into n distinct shares. It’s methods have
been talked about to safeguard the keyinformationofimage.
It offers a advantage over the regular security technique
such that the suspicious users in no way obtain picture
regardless if some understanding of the secret known to
suspicious users.
The idea of sharing matrix were presented [8]. Threshold(T,
N ) scheme is utilized to divide the secret info in pieces,
referred to as shares. [5] suggested a matrix projection
strategy with [8] approach. Afterwards, [2] talked about the
principle of random grids in visual cryptography. Chaotic
keys along with the lowered size shares has also been
applied [3].
Above listed approach predicated on secret sharing strate-
gies are extremely vulnerable to channel mistake. If a single
pixel in share is influenced, it distorts T pixels in the recon-
structed image, where T >>> 1. We suggest an incredibly in-
novative approach which will use just a few information of
the picture to produce the shares of the picture. we use the
concept of singular value decomposition (SVD).This
redundancy pro- vides a lot more effectiveness as the
significantly less quantity of pixels areaffected.Tofortifythe
proposed algorithm from unauthorized users, we make use
of FrFT(Fractional Fourier transform).To demonstrate the
suggested algorithm, we present the whole encryption
method using two keys (α1, α2). The utilization of various
part of the image i.e., U and V as keys is the significant
contribution to security.
This paper is presented as follows: A short review on
Fractional Fourier Transform along withSVD.Wetalk about
the suggested algorithm to produce shares and encrypted
digital pictures with decryption. We also go over the
outcomes and few quantitativeparameters.Atlast,thepaper
has come to the conclusion.
1.1 BASICS of FRFT and SVD
Fractional Fourier Transform (FrFT) : The
Fractional Fourier Transform (FrFT) [13] of any two-
dimensional signal is written as follows.
(1)
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2425
where [ , ] can be understood in Fig. 1. The inverse of
FrFT can be evaluated by the negative of its order [ , ].
Fig. 1: FrFT in the p-q domain at an angle of β1 and β2.
Here, β1 and β2 represent the order with respect to a
and b axes respectively.
1.2 Singular value decomposition (SVD)
SVD work like mathematical device for the matrix
analysis.
It’s a technique to get algebraic picture features or
represen- tations. The SVD matrix constructed for a digital
image is highly stable. Singular value usually doesn’t varies
much with a minor transformation within an image. Any
matrix A with p × q can be expressed as below.
(2)
where , and
is a diagonal matrix with
.
Furthermore, more specifically, it can be given as below.
(3)
Idea of SVD has been put on several signal and
image processing applications such as for example de-
noising, image encryption [9] etc.
1.3 Need of SVD
Singular values are barely affected by noise or
attacks i.e.,, if we observe the deterioration in image due to
noise or attack, it hardly affects the singular values than
singular vectors.
Therefore, impulsive tempering in singular vectors
yields disastrous variations in the image quality [7].
Mathematically, we can present as follows.
(4)
Here, K as shares. Share matrix represented by SM which
will be talked about in Section 3.
2 Proposed Algorithm
Let’s discuss our recommended technique which
includes two main actions.
• Generation of Share.
• Share Matrix Reconstruction.
The method of encryption by FrFT is used for Share genera-
tion. α1, α2 are used respectively within the method.
Primarily, the picture is normally divided in several parts
applying SVD. Then after go with apply FrFT to the S matrix.
Afterwards, paper [3] methods has been used to generate
the shares of this matrix.
2.1 Sharing matrix - (k,n)
Assume be the binary matrix i.e.,
where the and . Lets
say be any binary matrix, which is made by
randomly choosing any rows of with and
. must satisfy the conditions defined in
Equation (5) - Equation (7).
 It should at least have one in every rowof .
We can represent it as follows
(5)
 It must contain least one in each column in
the matrix A
(6)
 Minimum one zero column in a matrix when
, i.e.,
(7)
where provides addition with column of
matrix and is a successive multiplier function.
is called the -sharing matrix. The fast algorithm
for the generation of has been discussed in [4]. The
steps are as follows.
2.1.1 Preliminary Matrix Generation
Initially a matrix having size of is
constructed. ismadeupof zerosand ones.
E.g., for .Afterwards,all ofthepossible
permutations of are acquired, denoting ,
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2426
where . All thesematricesneedstodeliverthe
initial matrix , shown in below formula (8)
(8)
2.2.2 Matrix Expansion
Initially, matrix expansion is to extent the matrix by
appending extra . Expansion of matrix step’s generate an
increased matrix . Paper [4] describes the more details.
Fig. 2: The suggested technique including the
comprehensive algorithm. At first, the grayscale picture is
broken into its constituents utilizing SVD. Share
generation which is inredis the two major steps. Using S
matrix, we create the shares of the image with method
described in the paper [3]. The keys (β1, β2) hold an
essential part in encryption. The other parts of the
image U and V work as the keys. The bigger keyspace
shows the robustness of the proposed algorithm.
2.2 Process of Sharing
Let’s consider we get info matrix by following the
encryption procedure over the picturebyapplyingtheFRFT.
Table I shows the matrix. A share matrix withsize
is presented in Table II. We opted real-valued matrix for
elaboration. Although, FRFT gives an imaginary valued
matrix. Thus, our proposed solution is also applied for the
imaginary valued matrix. Every action for producing the
shares has been talked about in Algorithm 1.
Q =
TABLE I: Base data in a matrix of size=6 × 6.
S(3,4) =
TABLE II: Share matrix with k = 3 and n = 4
1. Consider any gray-scale image ‘Q’ asshownin Table
I.
2. For a constant value of n and k, produce share
matrix S^((k,n)) as provided in Table II.
3. Translate Q into a vector Q.
4. Translate Q into Q_1 such that Q_1 (j,:)=Q, j=1,,n.
5. Do it again S^((k,n)) to make it equal to Q_1.
6. Create shares Z such that Z=Q_1*S_1.
7. Every row of Z is called share.
Algorithm 1: Share generation algorithm
2.3 Process of Reconstruction
This phase will prove that the matrix can be properly
reconstructed only when the number of shares i.e.,
are put together at the receiver end.
Below equation displays the whole procedure of joining
shares in between the recreation. Initially, a matrix with
a similar dimension of is produced. comprises of
rows of and . Applying , rows of informationfrom
are chosen to obtain .
(9)
In this way now the reproduction procedure creates a
reconstructed matrix .
2.3.1 Reconstruction when kr = 3 shares:
In this article, we look the quantity of shares as 3. We
generate Rm randomly which contains three ‘1’ and one
‘0’. It is shown in Equation (10) and Equation (11).
(10)
(11)
1. Apply FrFT(fractional Fourier transform) with the
order ( , ). Gather the shares i.e., any rows of
R.
2. The value of and , formulate
, and using
mathematical (10) and Equation (11).
1 1 2 4 3 4
2 3 3 2 4 3
3 2 1 3 2 2
4 5 5 1 5 1
5 4 4 5 1 6
6 6 6 6 6 5
1 1 0 1 0 0
1 0 1 0 1 0
0 1 1 0 0 1
0 0 0 1 1 1
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2427
3. Multiply with different . Mark it as
, and . Afterwards,
Using each column-wise produces matrix ,
, , and .
4. Each line comprises of the full picture.
5. Besides, reshaping these row deliverstheseparated
information/data matrix.
Algorithm 2: Algorithm of Reconstruction
1. Bring SVD of the gray scale image with dimension =
256x256.
2. Start the sequence for fractional Fourier transform
i.e.,β1 and β2.
3. Initialize the (n, k) for our proposed method.
4. Determine the FrFT of matrix S with order β1 and
β2. This generates the matrix of same size i.e.,
256x256.
5. Incorporate the idea of share matrix (SM) on the
fractional order Fourier transform of the singular
value matrix S.
6. For a constant value of n, k, and fractional Fourierof
the image, we construct shares using Algorithm 1.
7. The measurement of the shares can be lowered.
Nevertheless, we demonstrate our suggested
method with the same dimension i.e., 256x256.
8. At receiver end point, we initially decode kr shares
with the same k, n.
9. Finally, keeping the same order β1 and β2, the
original image can be obtained. We shows with the
minimum kr = 3 shares. In the Fig. 3, we
demonstrate the result as for changes in requests
with kr = 2 and kr = 3.
Algorithm 3: Proposed algorithm for share
generation using fractional Fourier transform
3. OUTCOMES & DISCUSSION
In thissection, weanalyze thequantitativeparameterswhich
are utilized forthe similar investigation of the recommended
strategy with various state-of-the-art methods.
3.1 Quantitative Parameters
3.1.1 NPCR: Number of Pixels Change Rate
The number of pixels changes rate (NPCR) [11] displays the
count of changed pixels when the power estimation of one
pixel of the plain (or unique)pictureisrotated.Thisspeaksto
the affectability of the proposed strategy to the adjustments
in a single pixel. In this way, NPCR may make sense of the
ability of a proposed technique against the harm on the plain
picture.
(12)
where , if ( where and
are the encrypted images forthe given originalimageandthe
image which is one pixel different than the original image
respectively ), else is assumed as . and
represent the height and width of the image respectively.
3.1.2 UACI: Unified Average Changing Intensity
Unified average changing intensity (UACI) [11] display the
mean intensity of variations among the related ciphered
picture and the original picture. Hence, UACI can find out the
ability of any such methods which can tolerate with the
differential attacks.
(13)
where is encrypted picture for the given baseline picture,
is the encrypted picture related to the picture whichisone
pixel different than the baseline picture.
3.1.3 SSIM : Structural Similarity Index Metric
In order to get the quality of the perceived image, SSIM is
considered a unique parameter. Wang and Bovik [2]
suggested SSIM and talked that it resides between and .
The mathematical representationcanbeprovidedasfollows.
(14)
where , shows the mean value of picture and picture
respectively. However, and displaysthedifferenceof
the picture and picture respectively. denotes the
covariance between the image and image and
and are predefined constants.
Here, represents the original picture and where as
represents the encrypted picture.
3.2 Quantitative Evaluation
In this section, we clarifythe uniquequantitativeparameters
for the evaluation which makes our solutions increasingly
powerful. We tried our proposed technique on in excess of
20 diverse grayscale pictures. Be that as it may, we
demonstrate the outcomes for cameraman picture.
3.2.1 Speed Efficiency
To show on the performance, all studies are carried out on
MATLAB 2016b with 8GB RAM and Intel(R) Core(TM)i3-
4005U CPU @ 1.70 GHz. The picture encrypted by our
proposed algorithm in 0.16425 sec.
3.2.2 Differential Attacks
We utilized the impact of differential problems [11] to
evaluate the suggested solution.WetestNPCRandUACI.The
mathematical formulas for NPCR and UACI have already
been given in Equation (12). The average value of NPCR for
image is 95.98% at [β_1=0.5,β_2=0.2]. However, our
proposed method produces UACIas11.87%.Thisshowsthat
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2428
our suggested solution is effective for any differential
problems & attacks.
3.2.3 IE : Information Entropy
IE demonstrates the haphazardness of the data. In a perfect
world, it must be 8 so as to have consistency in the encoded
pictures. Here, the data entropy of the scrambled pictures
utilizing our proposed technique ≈1.8254. It is appeared
Table 4. Nonetheless, outwardly the encoded picturescanbe
found in Fig. 5. In this manner, we can legitimize that our
proposed strategy produces tasteful outcomes.
3.2.4 Correlation Analysis
To ponder the similitude between two contiguous pixels of
the scrambled picture, we inspect the idea of correlation. In
the picture encryption method, the connection between’s
two adjoining pixels ought to have low value. This ensures
the scrambled picture can’t be decoded without realizingthe
precise keys [7]. In Table 5, we show the correlation
horizontally, vertically and diagonally. The lower value
indicates that our encrypted picture with the suggested
technique is nearly unachievable to decrypt without being
aware of precise keys and it’s arrangements.
3.2.5 Key Sensitivity
In this section, we learn the impact of a minor changeinkeys
with which it must be decoded. A vigorous encryption
procedure must have high affectability towards the mystery
keys. We scrambled picture with β_1=0.5, β_2=0.2. When we
unscramble the encoded picture with a slight change inkeys
i.e., β_1=0.5000000000001,β_2=0.2000000000001, we
couldn’t recover a careful reproduction of the base picture.
3. CONCLUSIONS
In this paper, we initially portray the necessity of a hearty
sharing strategy which can improve the security of the
private information, for example, pictures, video etc. We
discus the formulations of sharing matrix - (k, n). This
technique gives more secure encryption against man-in
middle attack, compromised key attack andmanymorekind
od security attacks. The singular value matrix of the SVD
decomposition is much more effective to any changing i.e.,
noise or attacks.
FrFT makes our proposed technique progressively power-
ful.The adjustments in the sequence of β1, β2 in the range
10−14 can’t deliver the equivalentunscrambledpicture.This
gives greater security against man-in-centre assault, animal
power assault, bargained keyassaultanddifferential assault.
REFERENCES
[1] C. N. Yang, and D. S. Wang, “Property analysis of XOR-
based visual cryptography,” IEEE Trans. Circuits Syst.
Video Technol., vol. 24, no. 2, pp. 189–197, 2014.
[2] R. Wang, Y. Lan, Y. Lee, S. Y. Huange, S. Shyu, and T. L.
Chia, “Incrementing visual cryptography using random
grids,” Opt. Commn., vol. 283, no. 21, pp. 4242–4249,
2010.
[3] L. Bao, S. Yi, and Y. Zhou, “Combination of Sharing
Matrix and Image Encryption for Lossless (k, n) -Secret
Image Sharing,” IEEE TransactionsonImageProcessing,
vol. 26, no. 12, pp. 5618–5631, 2017.
[4] K. Elissa, “Title of paper if known,” unpublished.
[5] L Bai, “A reliable (k, n) image secretsharingschemewith
low information overhead,” Int. Journal of Compt. Appl.,
vol. 32, no. 1, pp. 9–14, 2010.
[6] X. Wu, and W. Sun. “Extended capabilitiesfor XOR-based
visual cryptography,” IEEE Trans. Inf. Forensic Security,
vol. 9, no. 10, pp. 1592–1605, 2014.
[7] K. Konstantinides, B. Natarajan, and G.S. Yovanof,“Noise
estimation and filtering using block-based singular
value decomposition,” IEEE Trans. Image Processing,
vol. 6, no. 3, pp. 479–483, 1997.
[8] A.Shamir, “How to share a secret,” Communication of
ACM, vol. 22, no. 11, pp. 612–613, 1979.
[9] O. Alter, P. O. Brown, D. Botstein, “Singular value
decomposition for genome-wide expression data
processing and modeling,” PNAS, vol. 97, no. 18, pp.
10101–10106, 2000.
[10] Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli,
“Image quality assessment: from error visibility to
structural similarity,” IEEE Trans. Image, vol. 13, pp.
600–612, 2004.
[11] H. S. Kwok, and W. K. S. Tang, “A fast image encryption
system based on chaotic maps with finite precision
representation,” Chaos Solitons Fractals, vol. 32, pp.
1518–1529, 2007.
[12] C. N. Yang, and D. S. Wang, “Property analysis of XOR-
based visual cryptography,” IEEE Trans. Circuits Syst.
Video Technol., vol. 24, no. 2, pp. 189–197, 2014.

More Related Content

What's hot

A tutorial on applying artificial neural networks and geometric brownian moti...
A tutorial on applying artificial neural networks and geometric brownian moti...A tutorial on applying artificial neural networks and geometric brownian moti...
A tutorial on applying artificial neural networks and geometric brownian moti...
eSAT Journals
 
Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229
Editor IJARCET
 

What's hot (18)

High speed multiplier using vedic mathematics
High speed multiplier using vedic mathematicsHigh speed multiplier using vedic mathematics
High speed multiplier using vedic mathematics
 
A tutorial on applying artificial neural networks and geometric brownian moti...
A tutorial on applying artificial neural networks and geometric brownian moti...A tutorial on applying artificial neural networks and geometric brownian moti...
A tutorial on applying artificial neural networks and geometric brownian moti...
 
A FUZZY INTERACTIVE BI-OBJECTIVE MODEL FOR SVM TO IDENTIFY THE BEST COMPROMIS...
A FUZZY INTERACTIVE BI-OBJECTIVE MODEL FOR SVM TO IDENTIFY THE BEST COMPROMIS...A FUZZY INTERACTIVE BI-OBJECTIVE MODEL FOR SVM TO IDENTIFY THE BEST COMPROMIS...
A FUZZY INTERACTIVE BI-OBJECTIVE MODEL FOR SVM TO IDENTIFY THE BEST COMPROMIS...
 
One dimensional vector based pattern
One dimensional vector based patternOne dimensional vector based pattern
One dimensional vector based pattern
 
Dimensionality reduction
Dimensionality reductionDimensionality reduction
Dimensionality reduction
 
IRJET- Efficient Image Encryption with Pixel Scrambling and Genetic Algorithm
IRJET- Efficient Image Encryption with Pixel Scrambling and Genetic AlgorithmIRJET- Efficient Image Encryption with Pixel Scrambling and Genetic Algorithm
IRJET- Efficient Image Encryption with Pixel Scrambling and Genetic Algorithm
 
Macromodel of High Speed Interconnect using Vector Fitting Algorithm
Macromodel of High Speed Interconnect using Vector Fitting AlgorithmMacromodel of High Speed Interconnect using Vector Fitting Algorithm
Macromodel of High Speed Interconnect using Vector Fitting Algorithm
 
A Dependent Set Based Approach for Large Graph Analysis
A Dependent Set Based Approach for Large Graph AnalysisA Dependent Set Based Approach for Large Graph Analysis
A Dependent Set Based Approach for Large Graph Analysis
 
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
 
Architecture neural network deep optimizing based on self organizing feature ...
Architecture neural network deep optimizing based on self organizing feature ...Architecture neural network deep optimizing based on self organizing feature ...
Architecture neural network deep optimizing based on self organizing feature ...
 
Dimension reduction(jiten01)
Dimension reduction(jiten01)Dimension reduction(jiten01)
Dimension reduction(jiten01)
 
Itc stock slide
Itc stock slideItc stock slide
Itc stock slide
 
Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229
 
data_mining
data_miningdata_mining
data_mining
 
Parallel Machine Learning
Parallel Machine LearningParallel Machine Learning
Parallel Machine Learning
 
5/3 Lifting Scheme Approach for Image Interpolation
5/3 Lifting Scheme Approach for Image Interpolation5/3 Lifting Scheme Approach for Image Interpolation
5/3 Lifting Scheme Approach for Image Interpolation
 
5 1-10
5 1-105 1-10
5 1-10
 
MULTI-OBJECTIVE ENERGY EFFICIENT OPTIMIZATION ALGORITHM FOR COVERAGE CONTROL ...
MULTI-OBJECTIVE ENERGY EFFICIENT OPTIMIZATION ALGORITHM FOR COVERAGE CONTROL ...MULTI-OBJECTIVE ENERGY EFFICIENT OPTIMIZATION ALGORITHM FOR COVERAGE CONTROL ...
MULTI-OBJECTIVE ENERGY EFFICIENT OPTIMIZATION ALGORITHM FOR COVERAGE CONTROL ...
 

Similar to IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singular Value Decomposition

COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
IJNSA Journal
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
IJNSA Journal
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
IJNSA Journal
 

Similar to IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singular Value Decomposition (20)

IRJET- Image Compression Technique for Quantized Encrypted Images using SVD
IRJET-  	  Image Compression Technique for Quantized Encrypted Images using SVDIRJET-  	  Image Compression Technique for Quantized Encrypted Images using SVD
IRJET- Image Compression Technique for Quantized Encrypted Images using SVD
 
Fuzzy Type Image Fusion Using SPIHT Image Compression Technique
Fuzzy Type Image Fusion Using SPIHT Image Compression TechniqueFuzzy Type Image Fusion Using SPIHT Image Compression Technique
Fuzzy Type Image Fusion Using SPIHT Image Compression Technique
 
IRJET - Steganography based on Discrete Wavelet Transform
IRJET -  	  Steganography based on Discrete Wavelet TransformIRJET -  	  Steganography based on Discrete Wavelet Transform
IRJET - Steganography based on Discrete Wavelet Transform
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
Survey paper on image compression techniques
Survey paper on image compression techniquesSurvey paper on image compression techniques
Survey paper on image compression techniques
 
Block Image Encryption using Wavelet
Block Image Encryption using WaveletBlock Image Encryption using Wavelet
Block Image Encryption using Wavelet
 
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
 
A New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionA New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash Function
 
IRJET- Data Embedding using Image Steganography
IRJET-  	  Data Embedding using Image SteganographyIRJET-  	  Data Embedding using Image Steganography
IRJET- Data Embedding using Image Steganography
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
Fpga sotcore architecture for lifting scheme revised
Fpga sotcore architecture for lifting scheme revisedFpga sotcore architecture for lifting scheme revised
Fpga sotcore architecture for lifting scheme revised
 
Reversible encrypted data concealment in images by reserving room approach
Reversible encrypted data concealment in images by reserving room approachReversible encrypted data concealment in images by reserving room approach
Reversible encrypted data concealment in images by reserving room approach
 
Segmentation and Classification of MRI Brain Tumor
Segmentation and Classification of MRI Brain TumorSegmentation and Classification of MRI Brain Tumor
Segmentation and Classification of MRI Brain Tumor
 
International Journal on Soft Computing ( IJSC )
International Journal on Soft Computing ( IJSC )International Journal on Soft Computing ( IJSC )
International Journal on Soft Computing ( IJSC )
 
Wavelet based Image Coding Schemes: A Recent Survey
Wavelet based Image Coding Schemes: A Recent Survey  Wavelet based Image Coding Schemes: A Recent Survey
Wavelet based Image Coding Schemes: A Recent Survey
 
Medical image analysis and processing using a dual transform
Medical image analysis and processing using a dual transformMedical image analysis and processing using a dual transform
Medical image analysis and processing using a dual transform
 
Medical image analysis and processing using a dual transform
Medical image analysis and processing using a dual transformMedical image analysis and processing using a dual transform
Medical image analysis and processing using a dual transform
 
Translation Invariance (TI) based Novel Approach for better De-noising of Dig...
Translation Invariance (TI) based Novel Approach for better De-noising of Dig...Translation Invariance (TI) based Novel Approach for better De-noising of Dig...
Translation Invariance (TI) based Novel Approach for better De-noising of Dig...
 

More from IRJET Journal

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
chumtiyababu
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 

Recently uploaded (20)

HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptx
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 

IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singular Value Decomposition

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2424 An Effective Strategy for Defense & Medical Pictures Security by Singular Value Decomposition Ashish Ranjan1, Krishna Kant Nayak2 1Student, Dept. of ECE, BIST, Bhopal, India 2Professor, Dept. of ECE, BIST, Bhopal, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Medical and Defense pictures are viewed as significant and delicate information in the medicinal informatics frameworks. For exchanging secure pictures over an unreliable system, building up a safe encryption technique is vital. In this quick creating universeoftheInternet, verifying pictures is a noteworthy security worry away and correspondence. Pictures are inclined to altering, spillageand assaults. The idea of share matrix S(k,n) for the creation of shares has been investigated. These types of shares give a strength to the security or encryption of the confidential information and images.In this article, paper illustrates the utilization of share gen- eration idea for encryption of the digital pictures in the SVD domain. The singular value of the SVD component functions as a good choice to create the shares of the picture. To bring the further improvement in the robustness, we apply FrFT. The sequence of the FrFT (α1, α2) combined with the singular vectors (i.e., U and V ) parts of the initial/base image functions similar to keys. A variety of quantitative parameters such as for examplespeed, number of pixels change rate (NPCR), unified average changing intensity (UACI), entropy, correlation coefficient, key sensitivity and mean square error (MSE) have been completely researched to examine the overall performance of the suggested technique. Key Words: Image Encryption, FrFT, Share matrix generation, Sensitivity, cryptography. 1. INTRODUCTION In the modern age, images are most utilized communication method in the various areas including business, medical, military etc. The accelerated advancement of different com- municating systems, we encounter with the large requirements to protect the transferred data as these pictures are transmitted through the unprotected network system. The protection of the digital images takes on a huge role in data evaluation. Individuals usually want to maintain their data protected from unauthorized users. Therefore, several encryption approaches is necessary by us that may save or hide important info of the images. However, saving sensitive info at one node provides loose effectiveness. This obviously suggests the number of nodes need to be enough that can prevent any physical harm to the info. Secure graphic sharing is certainly an interesting research subject in multimedia systems. Its function is to encrypt an primary picture into n distinct shares. It’s methods have been talked about to safeguard the keyinformationofimage. It offers a advantage over the regular security technique such that the suspicious users in no way obtain picture regardless if some understanding of the secret known to suspicious users. The idea of sharing matrix were presented [8]. Threshold(T, N ) scheme is utilized to divide the secret info in pieces, referred to as shares. [5] suggested a matrix projection strategy with [8] approach. Afterwards, [2] talked about the principle of random grids in visual cryptography. Chaotic keys along with the lowered size shares has also been applied [3]. Above listed approach predicated on secret sharing strate- gies are extremely vulnerable to channel mistake. If a single pixel in share is influenced, it distorts T pixels in the recon- structed image, where T >>> 1. We suggest an incredibly in- novative approach which will use just a few information of the picture to produce the shares of the picture. we use the concept of singular value decomposition (SVD).This redundancy pro- vides a lot more effectiveness as the significantly less quantity of pixels areaffected.Tofortifythe proposed algorithm from unauthorized users, we make use of FrFT(Fractional Fourier transform).To demonstrate the suggested algorithm, we present the whole encryption method using two keys (α1, α2). The utilization of various part of the image i.e., U and V as keys is the significant contribution to security. This paper is presented as follows: A short review on Fractional Fourier Transform along withSVD.Wetalk about the suggested algorithm to produce shares and encrypted digital pictures with decryption. We also go over the outcomes and few quantitativeparameters.Atlast,thepaper has come to the conclusion. 1.1 BASICS of FRFT and SVD Fractional Fourier Transform (FrFT) : The Fractional Fourier Transform (FrFT) [13] of any two- dimensional signal is written as follows. (1)
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2425 where [ , ] can be understood in Fig. 1. The inverse of FrFT can be evaluated by the negative of its order [ , ]. Fig. 1: FrFT in the p-q domain at an angle of β1 and β2. Here, β1 and β2 represent the order with respect to a and b axes respectively. 1.2 Singular value decomposition (SVD) SVD work like mathematical device for the matrix analysis. It’s a technique to get algebraic picture features or represen- tations. The SVD matrix constructed for a digital image is highly stable. Singular value usually doesn’t varies much with a minor transformation within an image. Any matrix A with p × q can be expressed as below. (2) where , and is a diagonal matrix with . Furthermore, more specifically, it can be given as below. (3) Idea of SVD has been put on several signal and image processing applications such as for example de- noising, image encryption [9] etc. 1.3 Need of SVD Singular values are barely affected by noise or attacks i.e.,, if we observe the deterioration in image due to noise or attack, it hardly affects the singular values than singular vectors. Therefore, impulsive tempering in singular vectors yields disastrous variations in the image quality [7]. Mathematically, we can present as follows. (4) Here, K as shares. Share matrix represented by SM which will be talked about in Section 3. 2 Proposed Algorithm Let’s discuss our recommended technique which includes two main actions. • Generation of Share. • Share Matrix Reconstruction. The method of encryption by FrFT is used for Share genera- tion. α1, α2 are used respectively within the method. Primarily, the picture is normally divided in several parts applying SVD. Then after go with apply FrFT to the S matrix. Afterwards, paper [3] methods has been used to generate the shares of this matrix. 2.1 Sharing matrix - (k,n) Assume be the binary matrix i.e., where the and . Lets say be any binary matrix, which is made by randomly choosing any rows of with and . must satisfy the conditions defined in Equation (5) - Equation (7).  It should at least have one in every rowof . We can represent it as follows (5)  It must contain least one in each column in the matrix A (6)  Minimum one zero column in a matrix when , i.e., (7) where provides addition with column of matrix and is a successive multiplier function. is called the -sharing matrix. The fast algorithm for the generation of has been discussed in [4]. The steps are as follows. 2.1.1 Preliminary Matrix Generation Initially a matrix having size of is constructed. ismadeupof zerosand ones. E.g., for .Afterwards,all ofthepossible permutations of are acquired, denoting ,
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2426 where . All thesematricesneedstodeliverthe initial matrix , shown in below formula (8) (8) 2.2.2 Matrix Expansion Initially, matrix expansion is to extent the matrix by appending extra . Expansion of matrix step’s generate an increased matrix . Paper [4] describes the more details. Fig. 2: The suggested technique including the comprehensive algorithm. At first, the grayscale picture is broken into its constituents utilizing SVD. Share generation which is inredis the two major steps. Using S matrix, we create the shares of the image with method described in the paper [3]. The keys (β1, β2) hold an essential part in encryption. The other parts of the image U and V work as the keys. The bigger keyspace shows the robustness of the proposed algorithm. 2.2 Process of Sharing Let’s consider we get info matrix by following the encryption procedure over the picturebyapplyingtheFRFT. Table I shows the matrix. A share matrix withsize is presented in Table II. We opted real-valued matrix for elaboration. Although, FRFT gives an imaginary valued matrix. Thus, our proposed solution is also applied for the imaginary valued matrix. Every action for producing the shares has been talked about in Algorithm 1. Q = TABLE I: Base data in a matrix of size=6 × 6. S(3,4) = TABLE II: Share matrix with k = 3 and n = 4 1. Consider any gray-scale image ‘Q’ asshownin Table I. 2. For a constant value of n and k, produce share matrix S^((k,n)) as provided in Table II. 3. Translate Q into a vector Q. 4. Translate Q into Q_1 such that Q_1 (j,:)=Q, j=1,,n. 5. Do it again S^((k,n)) to make it equal to Q_1. 6. Create shares Z such that Z=Q_1*S_1. 7. Every row of Z is called share. Algorithm 1: Share generation algorithm 2.3 Process of Reconstruction This phase will prove that the matrix can be properly reconstructed only when the number of shares i.e., are put together at the receiver end. Below equation displays the whole procedure of joining shares in between the recreation. Initially, a matrix with a similar dimension of is produced. comprises of rows of and . Applying , rows of informationfrom are chosen to obtain . (9) In this way now the reproduction procedure creates a reconstructed matrix . 2.3.1 Reconstruction when kr = 3 shares: In this article, we look the quantity of shares as 3. We generate Rm randomly which contains three ‘1’ and one ‘0’. It is shown in Equation (10) and Equation (11). (10) (11) 1. Apply FrFT(fractional Fourier transform) with the order ( , ). Gather the shares i.e., any rows of R. 2. The value of and , formulate , and using mathematical (10) and Equation (11). 1 1 2 4 3 4 2 3 3 2 4 3 3 2 1 3 2 2 4 5 5 1 5 1 5 4 4 5 1 6 6 6 6 6 6 5 1 1 0 1 0 0 1 0 1 0 1 0 0 1 1 0 0 1 0 0 0 1 1 1
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2427 3. Multiply with different . Mark it as , and . Afterwards, Using each column-wise produces matrix , , , and . 4. Each line comprises of the full picture. 5. Besides, reshaping these row deliverstheseparated information/data matrix. Algorithm 2: Algorithm of Reconstruction 1. Bring SVD of the gray scale image with dimension = 256x256. 2. Start the sequence for fractional Fourier transform i.e.,β1 and β2. 3. Initialize the (n, k) for our proposed method. 4. Determine the FrFT of matrix S with order β1 and β2. This generates the matrix of same size i.e., 256x256. 5. Incorporate the idea of share matrix (SM) on the fractional order Fourier transform of the singular value matrix S. 6. For a constant value of n, k, and fractional Fourierof the image, we construct shares using Algorithm 1. 7. The measurement of the shares can be lowered. Nevertheless, we demonstrate our suggested method with the same dimension i.e., 256x256. 8. At receiver end point, we initially decode kr shares with the same k, n. 9. Finally, keeping the same order β1 and β2, the original image can be obtained. We shows with the minimum kr = 3 shares. In the Fig. 3, we demonstrate the result as for changes in requests with kr = 2 and kr = 3. Algorithm 3: Proposed algorithm for share generation using fractional Fourier transform 3. OUTCOMES & DISCUSSION In thissection, weanalyze thequantitativeparameterswhich are utilized forthe similar investigation of the recommended strategy with various state-of-the-art methods. 3.1 Quantitative Parameters 3.1.1 NPCR: Number of Pixels Change Rate The number of pixels changes rate (NPCR) [11] displays the count of changed pixels when the power estimation of one pixel of the plain (or unique)pictureisrotated.Thisspeaksto the affectability of the proposed strategy to the adjustments in a single pixel. In this way, NPCR may make sense of the ability of a proposed technique against the harm on the plain picture. (12) where , if ( where and are the encrypted images forthe given originalimageandthe image which is one pixel different than the original image respectively ), else is assumed as . and represent the height and width of the image respectively. 3.1.2 UACI: Unified Average Changing Intensity Unified average changing intensity (UACI) [11] display the mean intensity of variations among the related ciphered picture and the original picture. Hence, UACI can find out the ability of any such methods which can tolerate with the differential attacks. (13) where is encrypted picture for the given baseline picture, is the encrypted picture related to the picture whichisone pixel different than the baseline picture. 3.1.3 SSIM : Structural Similarity Index Metric In order to get the quality of the perceived image, SSIM is considered a unique parameter. Wang and Bovik [2] suggested SSIM and talked that it resides between and . The mathematical representationcanbeprovidedasfollows. (14) where , shows the mean value of picture and picture respectively. However, and displaysthedifferenceof the picture and picture respectively. denotes the covariance between the image and image and and are predefined constants. Here, represents the original picture and where as represents the encrypted picture. 3.2 Quantitative Evaluation In this section, we clarifythe uniquequantitativeparameters for the evaluation which makes our solutions increasingly powerful. We tried our proposed technique on in excess of 20 diverse grayscale pictures. Be that as it may, we demonstrate the outcomes for cameraman picture. 3.2.1 Speed Efficiency To show on the performance, all studies are carried out on MATLAB 2016b with 8GB RAM and Intel(R) Core(TM)i3- 4005U CPU @ 1.70 GHz. The picture encrypted by our proposed algorithm in 0.16425 sec. 3.2.2 Differential Attacks We utilized the impact of differential problems [11] to evaluate the suggested solution.WetestNPCRandUACI.The mathematical formulas for NPCR and UACI have already been given in Equation (12). The average value of NPCR for image is 95.98% at [β_1=0.5,β_2=0.2]. However, our proposed method produces UACIas11.87%.Thisshowsthat
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2428 our suggested solution is effective for any differential problems & attacks. 3.2.3 IE : Information Entropy IE demonstrates the haphazardness of the data. In a perfect world, it must be 8 so as to have consistency in the encoded pictures. Here, the data entropy of the scrambled pictures utilizing our proposed technique ≈1.8254. It is appeared Table 4. Nonetheless, outwardly the encoded picturescanbe found in Fig. 5. In this manner, we can legitimize that our proposed strategy produces tasteful outcomes. 3.2.4 Correlation Analysis To ponder the similitude between two contiguous pixels of the scrambled picture, we inspect the idea of correlation. In the picture encryption method, the connection between’s two adjoining pixels ought to have low value. This ensures the scrambled picture can’t be decoded without realizingthe precise keys [7]. In Table 5, we show the correlation horizontally, vertically and diagonally. The lower value indicates that our encrypted picture with the suggested technique is nearly unachievable to decrypt without being aware of precise keys and it’s arrangements. 3.2.5 Key Sensitivity In this section, we learn the impact of a minor changeinkeys with which it must be decoded. A vigorous encryption procedure must have high affectability towards the mystery keys. We scrambled picture with β_1=0.5, β_2=0.2. When we unscramble the encoded picture with a slight change inkeys i.e., β_1=0.5000000000001,β_2=0.2000000000001, we couldn’t recover a careful reproduction of the base picture. 3. CONCLUSIONS In this paper, we initially portray the necessity of a hearty sharing strategy which can improve the security of the private information, for example, pictures, video etc. We discus the formulations of sharing matrix - (k, n). This technique gives more secure encryption against man-in middle attack, compromised key attack andmanymorekind od security attacks. The singular value matrix of the SVD decomposition is much more effective to any changing i.e., noise or attacks. FrFT makes our proposed technique progressively power- ful.The adjustments in the sequence of β1, β2 in the range 10−14 can’t deliver the equivalentunscrambledpicture.This gives greater security against man-in-centre assault, animal power assault, bargained keyassaultanddifferential assault. REFERENCES [1] C. N. Yang, and D. S. Wang, “Property analysis of XOR- based visual cryptography,” IEEE Trans. Circuits Syst. Video Technol., vol. 24, no. 2, pp. 189–197, 2014. [2] R. Wang, Y. Lan, Y. Lee, S. Y. Huange, S. Shyu, and T. L. Chia, “Incrementing visual cryptography using random grids,” Opt. Commn., vol. 283, no. 21, pp. 4242–4249, 2010. [3] L. Bao, S. Yi, and Y. Zhou, “Combination of Sharing Matrix and Image Encryption for Lossless (k, n) -Secret Image Sharing,” IEEE TransactionsonImageProcessing, vol. 26, no. 12, pp. 5618–5631, 2017. [4] K. Elissa, “Title of paper if known,” unpublished. [5] L Bai, “A reliable (k, n) image secretsharingschemewith low information overhead,” Int. Journal of Compt. Appl., vol. 32, no. 1, pp. 9–14, 2010. [6] X. Wu, and W. Sun. “Extended capabilitiesfor XOR-based visual cryptography,” IEEE Trans. Inf. Forensic Security, vol. 9, no. 10, pp. 1592–1605, 2014. [7] K. Konstantinides, B. Natarajan, and G.S. Yovanof,“Noise estimation and filtering using block-based singular value decomposition,” IEEE Trans. Image Processing, vol. 6, no. 3, pp. 479–483, 1997. [8] A.Shamir, “How to share a secret,” Communication of ACM, vol. 22, no. 11, pp. 612–613, 1979. [9] O. Alter, P. O. Brown, D. Botstein, “Singular value decomposition for genome-wide expression data processing and modeling,” PNAS, vol. 97, no. 18, pp. 10101–10106, 2000. [10] Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli, “Image quality assessment: from error visibility to structural similarity,” IEEE Trans. Image, vol. 13, pp. 600–612, 2004. [11] H. S. Kwok, and W. K. S. Tang, “A fast image encryption system based on chaotic maps with finite precision representation,” Chaos Solitons Fractals, vol. 32, pp. 1518–1529, 2007. [12] C. N. Yang, and D. S. Wang, “Property analysis of XOR- based visual cryptography,” IEEE Trans. Circuits Syst. Video Technol., vol. 24, no. 2, pp. 189–197, 2014.