510-PROJECT PPT.pptx

Post on 17-Jul-2016

224 views 3 download

transcript

S

PIXAR SECURA

TEAM : SAI VARUN TEJ SREERAMANUSHA PADAMATI

KAVYASAILENDRA

(SECURED TRANSMISSION OF IMAGES)

CENTRAL MICHIGAN UNIVERSITY (ITC-510)

2

OUTLINE

Objectives Abstract Sub-system and their

Modules Methods Key Generation procedure System Design

Overall Architecture Java Swing Application Demo Advantages References

CENTRAL MICHIGAN UNIVERSITY (ITC-510)

3

OBJECTIVES

To encrypt High Resolution Images. Encrypt Images faster than other techniques. Reaching general security goals.

• Confidentiality• Integrity• Availability

CENTRAL MICHIGAN UNIVERSITY (ITC-510)

4

ABSTRACT

The main objective of this project is to make a secure image data transmission over the network and protecting the data from the intruders.

To encrypt and decrypt the images using the keys generated by the RSA algorithm. It enhances the security of the multimedia data transmission over large networks.

CENTRAL MICHIGAN UNIVERSITY (ITC-510)

5

SUB SYSTEM AND THEIR MODULES

CENTRAL MICHIGAN UNIVERSITY (ITC-510)

6

METHODS

ENCRYPTION: This module encrypts the plain image which

was selected by the sender. The image is encrypted by merging the public

key value which was provided by the receiver and then the image will be send to the receiver.

CENTRAL MICHIGAN UNIVERSITY (ITC-510)

7

METHODS

DECRYPTION: The encrypted image is merged with the

private key value to get decrypted image. Private key value is generated by seconds

value in date function , so it differs for each and every key generation event.

CENTRAL MICHIGAN UNIVERSITY (ITC-510)

8

METHODS

KEY GENERATION: The receiver generates both public and

private keys. Public key is visible to both sender and

receiver. Private key is known only to receiver , which

is generated by RSA algorithm.

CENTRAL MICHIGAN UNIVERSITY (ITC-510)

9

KEY GENERATION PROCEDURE (RSA)

Select p, q p, q values are system’s second’s value Calculate n = p x q Calculate (n) = (p-1) (q-1) Get integer e public key value entered by the receiver Calculate d d = e-1 mod (n) Public key KU = {e, n}  Private key KR = {d, n}

CENTRAL MICHIGAN UNIVERSITY (ITC-510)

10

SYSTEM DESIGN

CENTRAL MICHIGAN UNIVERSITY (ITC-510)

11

OVERALL ARCHITECTURE

CENTRAL MICHIGAN UNIVERSITY (ITC-510)

12

JAVA SWING

Swing uses ABSTRACT WINDOW TOOLKIT features to get access to GUI system.

Swing components are light weight. They are not platform native widgets.

CENTRAL MICHIGAN UNIVERSITY (ITC-510)

13

IMAGE TO BE SENT

CENTRAL MICHIGAN UNIVERSITY (ITC-510)

14

ENCRYPTED IMAGE

S

APPLICATION DEMO

CENTRAL MICHIGAN UNIVERSITY (ITC-510)

16

ADVANTAGES

SECURE: Private Key is only known to Receiver.

DYNAMIC KEY GENERATION: Private Key generated by Systems Second’s Values.

SHUFFLING MATRIX: Original Image is Splitted and Shifted using the Shuffling Matrix.

CENTRAL MICHIGAN UNIVERSITY (ITC-510)

17

REFERENCES

[1] J. Yen and J. Guo, “A new image encryption system and its VLSI architecture,” in IEEE Workshop on Signal Processing Systems, 1999, pp. 430–437.

[2] R.J.Sutton, "An Introduction to Encryption and Security Management," Chap.2 in Secure communications: Applications and Management, pp.38-40, John Wiley & Sons, Ltd, West Sussex, England.

[3] Q.V. Lawande, B. R. Ivan and S. D. Dhodapkar, Chaos based cryptography: A new approach to secure communications, BARC Newsletter, no. 258, Bombay, July 2005

S

THANK YOU….