Image processing encryption

dc.contributor.authorShabeeb, D.M.S.
dc.contributor.authorAhmed, S.R.A.
dc.contributor.authorIbrahim, Abdullahi Abdu
dc.date.accessioned2021-05-15T12:49:30Z
dc.date.available2021-05-15T12:49:30Z
dc.date.issued2020
dc.departmentMühendislik ve Doğa Bilimleri Fakültesi, Bilişim Teknolojileri Bölümüen_US
dc.description2nd International Scientific Conference of Al-Ayen University, ISCAU 2020 -- 15 July 2020 through 17 July 2020 -- -- 165187
dc.description.abstractThe aim of this research paper is to develop a new approach of image processing encryption using machine learning techniques in python So that the human cannot understand the images because it is in encrypted form and can be securely transfer to its destination. We also used the computer-generated Holography (CGH) technique to encrypt and decrypt images. We first implement an existing algorithm and verify the claims of the authors. We then investigate higher dimensional Baker maps for image encryption. For this, we first propose a new interpretation for the Baker map in terms of a path function S. We then apply the higher dimensional maps for image encryption and experimentally conclude that 3D Baker map suffices for encryption. That is, there is no perceptible performance gained when using higher dimensional Baker maps. Next, in an attempt to use chaotic maps for the diffusion mechanism in the encryption scheme, we embed the diffusion process into the confusion process. For this, we first propose an alternative view of a 2D image as a 3D structure using the binary representation of the image intensity values. We extend this scheme from grayscale images to color images and show its immense value in color image encryption. Lastly, we propose a Baker map based on random walk of the image. Here, we employ sparse decomposition of images as a method of generating the random paths. Random walk-based Baker maps would be more difficult to break than traditional Baker maps because of the chaotic behavior in the walk itself. The significance of images and their sharing is increasing day by day. Their security is becoming an important issue while transferring over a public network. To protect images from hacker's secret sharing is one of the best techniques. The secret sharing is a way to share a secret with n participants and then setup is made for t or more number of participants who must contribute to revealing the secret. Here t < n is known as a threshold which must be achieved for secret reconstruction. © Published under licence by IOP Publishing Ltd.en_US
dc.identifier.doi10.1088/1757-899X/928/2/022135
dc.identifier.issn1757-8981
dc.identifier.issue2en_US
dc.identifier.scopus2-s2.0-85097373945
dc.identifier.scopusqualityN/A
dc.identifier.urihttps://doi.org/10.1088/1757-899X/928/2/022135
dc.identifier.urihttps://hdl.handle.net/20.500.12939/1036
dc.identifier.volume928en_US
dc.indekslendigikaynakScopus
dc.institutionauthorIbrahim, Abdullahi Abdu
dc.institutionauthorShabeeb, D.M.S.
dc.language.isoen
dc.publisherIOP Publishing Ltden_US
dc.relation.ispartofIOP Conference Series: Materials Science and Engineering
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subject3D Baker Mapen_US
dc.subjectComputer Generated Holography (CGH)en_US
dc.subjectMachine Learningen_US
dc.subjectSecret Image Sharingen_US
dc.titleImage processing encryption
dc.typeConference Object

Dosyalar

Orijinal paket
Listeleniyor 1 - 1 / 1
Yükleniyor...
Küçük Resim
İsim:
Shabeeb_2020_IOP_Conf._Ser.__Mater._Sci._Eng._928_022135.pdf
Boyut:
1015.8 KB
Biçim:
Adobe Portable Document Format
Açıklama:
Tam Metin / Full Text