+ All Categories
Home > Documents > 510-PROJECT PPT.pptx

510-PROJECT PPT.pptx

Date post: 17-Jul-2016
Category:
Upload: charan-tej
View: 224 times
Download: 3 times
Share this document with a friend
18
S PIXAR SECURA TEAM : SAI VARUN TEJ SREERAM ANUSHA PADAMATI KAVYA SAILENDRA (SECURED TRANSMISSION OF IMAGES)
Transcript
Page 1: 510-PROJECT PPT.pptx

S

PIXAR SECURA

TEAM : SAI VARUN TEJ SREERAMANUSHA PADAMATI

KAVYASAILENDRA

(SECURED TRANSMISSION OF IMAGES)

Page 2: 510-PROJECT PPT.pptx

CENTRAL MICHIGAN UNIVERSITY (ITC-510)

2

OUTLINE

Objectives Abstract Sub-system and their

Modules Methods Key Generation procedure System Design

Overall Architecture Java Swing Application Demo Advantages References

Page 3: 510-PROJECT PPT.pptx

CENTRAL MICHIGAN UNIVERSITY (ITC-510)

3

OBJECTIVES

To encrypt High Resolution Images. Encrypt Images faster than other techniques. Reaching general security goals.

• Confidentiality• Integrity• Availability

Page 4: 510-PROJECT PPT.pptx

CENTRAL MICHIGAN UNIVERSITY (ITC-510)

4

ABSTRACT

The main objective of this project is to make a secure image data transmission over the network and protecting the data from the intruders.

To encrypt and decrypt the images using the keys generated by the RSA algorithm. It enhances the security of the multimedia data transmission over large networks.

Page 5: 510-PROJECT PPT.pptx

CENTRAL MICHIGAN UNIVERSITY (ITC-510)

5

SUB SYSTEM AND THEIR MODULES

Page 6: 510-PROJECT PPT.pptx

CENTRAL MICHIGAN UNIVERSITY (ITC-510)

6

METHODS

ENCRYPTION: This module encrypts the plain image which

was selected by the sender. The image is encrypted by merging the public

key value which was provided by the receiver and then the image will be send to the receiver.

Page 7: 510-PROJECT PPT.pptx

CENTRAL MICHIGAN UNIVERSITY (ITC-510)

7

METHODS

DECRYPTION: The encrypted image is merged with the

private key value to get decrypted image. Private key value is generated by seconds

value in date function , so it differs for each and every key generation event.

Page 8: 510-PROJECT PPT.pptx

CENTRAL MICHIGAN UNIVERSITY (ITC-510)

8

METHODS

KEY GENERATION: The receiver generates both public and

private keys. Public key is visible to both sender and

receiver. Private key is known only to receiver , which

is generated by RSA algorithm.

Page 9: 510-PROJECT PPT.pptx

CENTRAL MICHIGAN UNIVERSITY (ITC-510)

9

KEY GENERATION PROCEDURE (RSA)

Select p, q p, q values are system’s second’s value Calculate n = p x q Calculate (n) = (p-1) (q-1) Get integer e public key value entered by the receiver Calculate d d = e-1 mod (n) Public key KU = {e, n}  Private key KR = {d, n}

Page 10: 510-PROJECT PPT.pptx

CENTRAL MICHIGAN UNIVERSITY (ITC-510)

10

SYSTEM DESIGN

Page 11: 510-PROJECT PPT.pptx

CENTRAL MICHIGAN UNIVERSITY (ITC-510)

11

OVERALL ARCHITECTURE

Page 12: 510-PROJECT PPT.pptx

CENTRAL MICHIGAN UNIVERSITY (ITC-510)

12

JAVA SWING

Swing uses ABSTRACT WINDOW TOOLKIT features to get access to GUI system.

Swing components are light weight. They are not platform native widgets.

Page 13: 510-PROJECT PPT.pptx

CENTRAL MICHIGAN UNIVERSITY (ITC-510)

13

IMAGE TO BE SENT

Page 14: 510-PROJECT PPT.pptx

CENTRAL MICHIGAN UNIVERSITY (ITC-510)

14

ENCRYPTED IMAGE

Page 15: 510-PROJECT PPT.pptx

S

APPLICATION DEMO

Page 16: 510-PROJECT PPT.pptx

CENTRAL MICHIGAN UNIVERSITY (ITC-510)

16

ADVANTAGES

SECURE: Private Key is only known to Receiver.

DYNAMIC KEY GENERATION: Private Key generated by Systems Second’s Values.

SHUFFLING MATRIX: Original Image is Splitted and Shifted using the Shuffling Matrix.

Page 17: 510-PROJECT PPT.pptx

CENTRAL MICHIGAN UNIVERSITY (ITC-510)

17

REFERENCES

[1] J. Yen and J. Guo, “A new image encryption system and its VLSI architecture,” in IEEE Workshop on Signal Processing Systems, 1999, pp. 430–437.

[2] R.J.Sutton, "An Introduction to Encryption and Security Management," Chap.2 in Secure communications: Applications and Management, pp.38-40, John Wiley & Sons, Ltd, West Sussex, England.

[3] Q.V. Lawande, B. R. Ivan and S. D. Dhodapkar, Chaos based cryptography: A new approach to secure communications, BARC Newsletter, no. 258, Bombay, July 2005

Page 18: 510-PROJECT PPT.pptx

S

THANK YOU….


Recommended