Shabeeb, D.M.S.Ahmed, S.R.A.Ibrahim, Abdullahi Abdu2021-05-152021-05-1520201757-8981https://doi.org/10.1088/1757-899X/928/2/022135https://hdl.handle.net/20.500.12939/10362nd International Scientific Conference of Al-Ayen University, ISCAU 2020 -- 15 July 2020 through 17 July 2020 -- -- 165187The aim of this research paper is to develop a new approach of image processing encryption using machine learning techniques in python So that the human cannot understand the images because it is in encrypted form and can be securely transfer to its destination. We also used the computer-generated Holography (CGH) technique to encrypt and decrypt images. We first implement an existing algorithm and verify the claims of the authors. We then investigate higher dimensional Baker maps for image encryption. For this, we first propose a new interpretation for the Baker map in terms of a path function S. We then apply the higher dimensional maps for image encryption and experimentally conclude that 3D Baker map suffices for encryption. That is, there is no perceptible performance gained when using higher dimensional Baker maps. Next, in an attempt to use chaotic maps for the diffusion mechanism in the encryption scheme, we embed the diffusion process into the confusion process. For this, we first propose an alternative view of a 2D image as a 3D structure using the binary representation of the image intensity values. We extend this scheme from grayscale images to color images and show its immense value in color image encryption. Lastly, we propose a Baker map based on random walk of the image. Here, we employ sparse decomposition of images as a method of generating the random paths. Random walk-based Baker maps would be more difficult to break than traditional Baker maps because of the chaotic behavior in the walk itself. The significance of images and their sharing is increasing day by day. Their security is becoming an important issue while transferring over a public network. To protect images from hacker's secret sharing is one of the best techniques. The secret sharing is a way to share a secret with n participants and then setup is made for t or more number of participants who must contribute to revealing the secret. Here t < n is known as a threshold which must be achieved for secret reconstruction. © Published under licence by IOP Publishing Ltd.eninfo:eu-repo/semantics/openAccess3D Baker MapComputer Generated Holography (CGH)Machine LearningSecret Image SharingImage processing encryptionConference Object10.1088/1757-899X/928/2/02213592822-s2.0-85097373945N/A