Date post: | 17-Jul-2016 |
Category: |
Documents |
Upload: | charan-tej |
View: | 224 times |
Download: | 3 times |
S
PIXAR SECURA
TEAM : SAI VARUN TEJ SREERAMANUSHA PADAMATI
KAVYASAILENDRA
(SECURED TRANSMISSION OF IMAGES)
CENTRAL MICHIGAN UNIVERSITY (ITC-510)
2
OUTLINE
Objectives Abstract Sub-system and their
Modules Methods Key Generation procedure System Design
Overall Architecture Java Swing Application Demo Advantages References
CENTRAL MICHIGAN UNIVERSITY (ITC-510)
3
OBJECTIVES
To encrypt High Resolution Images. Encrypt Images faster than other techniques. Reaching general security goals.
• Confidentiality• Integrity• Availability
CENTRAL MICHIGAN UNIVERSITY (ITC-510)
4
ABSTRACT
The main objective of this project is to make a secure image data transmission over the network and protecting the data from the intruders.
To encrypt and decrypt the images using the keys generated by the RSA algorithm. It enhances the security of the multimedia data transmission over large networks.
CENTRAL MICHIGAN UNIVERSITY (ITC-510)
5
SUB SYSTEM AND THEIR MODULES
CENTRAL MICHIGAN UNIVERSITY (ITC-510)
6
METHODS
ENCRYPTION: This module encrypts the plain image which
was selected by the sender. The image is encrypted by merging the public
key value which was provided by the receiver and then the image will be send to the receiver.
CENTRAL MICHIGAN UNIVERSITY (ITC-510)
7
METHODS
DECRYPTION: The encrypted image is merged with the
private key value to get decrypted image. Private key value is generated by seconds
value in date function , so it differs for each and every key generation event.
CENTRAL MICHIGAN UNIVERSITY (ITC-510)
8
METHODS
KEY GENERATION: The receiver generates both public and
private keys. Public key is visible to both sender and
receiver. Private key is known only to receiver , which
is generated by RSA algorithm.
CENTRAL MICHIGAN UNIVERSITY (ITC-510)
9
KEY GENERATION PROCEDURE (RSA)
Select p, q p, q values are system’s second’s value Calculate n = p x q Calculate (n) = (p-1) (q-1) Get integer e public key value entered by the receiver Calculate d d = e-1 mod (n) Public key KU = {e, n} Private key KR = {d, n}
CENTRAL MICHIGAN UNIVERSITY (ITC-510)
10
SYSTEM DESIGN
CENTRAL MICHIGAN UNIVERSITY (ITC-510)
11
OVERALL ARCHITECTURE
CENTRAL MICHIGAN UNIVERSITY (ITC-510)
12
JAVA SWING
Swing uses ABSTRACT WINDOW TOOLKIT features to get access to GUI system.
Swing components are light weight. They are not platform native widgets.
CENTRAL MICHIGAN UNIVERSITY (ITC-510)
13
IMAGE TO BE SENT
CENTRAL MICHIGAN UNIVERSITY (ITC-510)
14
ENCRYPTED IMAGE
S
APPLICATION DEMO
CENTRAL MICHIGAN UNIVERSITY (ITC-510)
16
ADVANTAGES
SECURE: Private Key is only known to Receiver.
DYNAMIC KEY GENERATION: Private Key generated by Systems Second’s Values.
SHUFFLING MATRIX: Original Image is Splitted and Shifted using the Shuffling Matrix.
CENTRAL MICHIGAN UNIVERSITY (ITC-510)
17
REFERENCES
[1] J. Yen and J. Guo, “A new image encryption system and its VLSI architecture,” in IEEE Workshop on Signal Processing Systems, 1999, pp. 430–437.
[2] R.J.Sutton, "An Introduction to Encryption and Security Management," Chap.2 in Secure communications: Applications and Management, pp.38-40, John Wiley & Sons, Ltd, West Sussex, England.
[3] Q.V. Lawande, B. R. Ivan and S. D. Dhodapkar, Chaos based cryptography: A new approach to secure communications, BARC Newsletter, no. 258, Bombay, July 2005
S
THANK YOU….