SlideShare a Scribd company logo
Designing Hybrid Cryptosystem for Secure Transmission
of Image Data using Biometric Fingerprint
Presented By:
Ranjit R, Banshpal
• Introduction
• Problem Definition
• Literature Survey
• Methodology
• Project Flow
• Tools / Platform
• Implementation Detail
• Experimental Results
• Conclusion
• Future Scope
• Publications Detail
• References
Outline
 Security is important factor for any communication system.
 Like password in ATM,
 For social networking sites etc.
 Security threat becomes a critical problem that must be solved by
new reliable and robust identification, verification or cryptographic
techniques .
 Biometric method .
To reduce the storage space or for fast transmission or for fast
sharing of any data compression technique is useful.
 Reduced data size.
Introduction
 System authentication
 Data Integrity
 Data Confidentiality
Contd...
In Password based protection, Password can be stolen or forget.
 Traditional steganographic technique compresses secret image if its
size is larger than cover image. that degrades the quality of secret
image.
 There is restriction on size of image data which is to be transferred
if data hiding technique is used .
 Less embedding capacity.
Existing system does not uses compression algorithm to efficiently
compress image data .
 Simple key is used for image encryption and decryption purpose.
Problem Definition
 To overcome the above drawbacks
 Single system is design which provides
 System authentication
 Data Integrity
 Data Confidentiality
 Mosaic image method is used for secure transmission of secret
image.
 Biometric key is used for system authentication and image
encryption.
Sr.no. Method Name Description
1. LSB Substitution [3][4] • Simple technique for data embedding.
• Most significant bits are embedded in least
significant bits.
• Less embedding Capacity.
2. RGB intensity based
Steganography [5]
• Data embedding takes place in one of the
channel that is Red, Green and blue.
• Embedding capacity depends on the intensity
value of pixel.
3. Difference Expansion
Technique [3]
• It uses redundancy in digital images.
• If less redundancy in image then performance
degraded
4. Reversible Data Hiding
technique
• Based on histogram technique
• Works on only grey- scale images only.
Literature Survey
Sr.no. Method Name Description
5. Confusion and Diffusion
[8]
• It is an image encryption method.
• First image get scrambled then decomposed
into several bit planes.
• Uses key to encrypt each bit plain.
6. Secret –Fragment- Visible-
Mosaic Image method [1]
• Secure image transmission method
• It searches database for similar images for data
embedding
7. DES based image
Encryption [11]
• It uses 64 bit block cipher.
• 56 bit key.
• vulnerable to attack because of small key size
8. Selective Region-Based
Method [18]
• In first phase the area which contain more
information is selected for Encryption.
• In second phase non encrypted and encrypted area
get interchanged.
 SHA -256
 One way cryptographic function.
 used to generate biometric key from fingerprint.
Input 61 62 63 64 65 66
Binary 00111101 00111110 00111111 01000000 01000001 01000010
Hash Ba7816bf 8f01cfea 414140de 5dae2223 b00361a3 96177a9c
b410ff61 f20015ad
1010100011100110101010110
1011010101010100001010101 SHA-256 Hex
Key
Methodology
 Secret –Fragment-Visible –Mosaic Image method
Advantages
No need to compress secret image.
 It makes an use of color characteristic of target image.
Recovered Secret image is nearly lossless .
 No need of database for searching compatible target image.
 JPEG Image Compression
• It is a lossy image compression.
• It divides the image into 8 * 8 blocks
• It makes an use of quantization process. Quantization process deals
with reducing the number of colors required for representing color
image.
 AES algorithm
• It is a symmetric key algorithm.
• There are 3 types of AES, AES- 128, AES - 192, and AES-256
• It is stronger than DES algorithm.
Flow graph of Proposed system
 Minimum Software Requirement
1. Operating System : Windows- XP or any later version of windows
2. Language : Java
3. Platform : Netbeans IDE 7.2 or later
4. Database : MySQL
•Minimum Hardware Requirement
1. Processor : Intel Pentium IV or later
2. RAM : 256 MB or more
3. Hard Disk Capacity : 2 GB or more
4. Fingerprint Scanner / Direct image
Tools / Platform
Implementation Details

Fig 1. System Login
Fig 2 .Generated 256-bit Key
Fig 3. Client side
Fig 4. Mosaic Image Compression Fig 5. Mosaic Image Encryption
Fig 6. Send to receiver
Fig 7. At receiver
Fig 8. Decompression
Fig 9. Secret Image Extraction
Secret Image Target Image
Target Block
Mosaic Image
Mosaic Image Creation
Experimental Results
 PSNR (Peak Signal to Noise Ratio)
 RMSE Value ( Root Mean Square Error Value)
 
 

 
 


M
i
N
j
M
i
N
j
ijij
gf
gf
ijijMN
gfPSNR
MN
gfRMSE
1 1
2
2
10
1 1
2
)()(
][
255log
)()(
1
10),(
][
1
,
Image Parameters
M= Number of pixels in first image
N= Number of pixels in second image
Where MN= Total number of pixel in images
imagefirstinpixelofcoordinate
),(
f ji
imagesecondofpixelofcoordinate
),(
g ji
Fig 10. Comparison on the basis of
PSNR value
Fig 11. Comparison on the basis of RMSE Value
Performance Analysis
Fig 12. Error value
 Above graph shows the distortion between transmitted image and
received image.
Fig 13. Comparison on the basis of Image Quality and
Embedding Capacity
 In this project Hybrid system is proposed which is more robust in nature.
 Secret fragment visible mosaic image method is used for secure
transmission through network. Proposed system has better PSNR value than
existing system.
System authentication is provided by means of biometric fingerprint and
data confidentiality is achieves by means of encryption method. For fast
transmission of image data lossy compression technique is used.
Thus the proposed system provides data confidentiality, data integrity and
system authentication in a single model.
Conclusion
 Future work Includes
 Improving the efficiency of proposed system.
 Instead of using single biometric feature like fingerprint for system
authentication, multimodal biometric features can be used.
 Proposed system can be implemented with different color model other
than RGB.
 Focus will be on better mosaic image creation.
Future Scope
Sr.
No
Authors Title of Paper Journal /Conference
Name,Volume, Issue
Date / ISBN/ISSN
Impact Factor
DOI Page
No
1. Prashant
Dahake
Prof. S.U.
Nimbhorkar
Review on various
Methods for Secure
Transmission of
Images for
Maintaining Image
Integrity
IJCSN (International
Journal of Computer
Science and Network)
Volume 3, Issue 6,
December 2014 Impact
Factor .274
Published
December
2014
450-
454
2. Prashant
Dahake
Prof. S.U.
Nimbhorkar
Hybrid
Cryptosystem for
Maintaining Image
Integrity using
Biometric
Fingerprint
.
International Conference
on Pervasive Computing
ICPC 2015 Pune
8-10 january 2015
ISBN 978 - 1 - 4799 - 6272
– 3
Published
and
Presented
1-5
Publication Detail
[1] I-Jen Lai, Wen-Hsiang Tsai, "Secret-Fragment-Visible Mosaic Image–A New
Computer Art and Its Application to Information Hiding", Information Forensics
and Security, IEEE Transactions on , vol.6, no.3, pp.936,945, Sept. 2011.
.
[2] Gaurav Bhatnagar, Q. M. Jonathan Wu, “Biometric Inspired Multimedia
Encryption Based on Dual Parameter Fractional Fourier Transform”, IEEE
Transaction on Systems, Man, and Cybernetics: Systems 2014.
[3] Ya-Lin Lee, Wen-Hsiang Tsai, "A New Secure Image Transmission Technique
via Secret-Fragment-Visible Mosaic Images by Nearly Reversible Color
Transformations", IEEE Transactions on Circuits and Systems for Video
Technology, vol.24, no.4, pp.695,703, April 2014.
[4] H. Yang, X. Sun, G. Sun, “A High-Capacity Image Data Hiding Scheme Using
Adaptive LSB Substitution”, Journal: Radio engineering, vol. 18, no. 4, (2009),
pp. 509-516.
[5] M. Tanvir Parvez, A. Abdul-Aziz Gutub, “RGB Intensity Based Variable-Bits
Image Steganography”, IEEE Asia-Pacific Services Computing Conference,
(2008), pp. 1322-1327
References
[6] V. Madhu Viswanatham, J. Manikonda, “A Novel Technique for Embedding Data
in Spatial Domain”, International Journal on Computer Science and Engineering,
IJCSE, vol. 2, (2010).
[7] M. Chaumont, W. Puech, “DCT-Based Data Hiding Method To Embed the Color
Information in a JPEG Grey Level Image”, 14th European Signal Processing
Conference (EUSIPCO 2006), Florence, Italy, copyright by EURASIP, (2006)
September 4-8.
[8] Naik,K. Pal, A.K., "An image cryptosystem based on diffusion of significant bit-
planes of a scrambled image with generated binary key matrices" , IEEE
International Conference on Computational Intelligence and Computing Research
(ICCIC), pp.1,4, 26-28 Dec. 2013.
[9] Priyanka dixit, Mayanka dixit, “Study of JPEG Image Compression Technique
Using Discrete Cosine Transformation”, International Journal of Interdisciplinary
Research and Innovations Vol. 1, Issue 1, pp: (32-35), October-December 2013.
[10] Ritu Pahal ,Vikas kumar, “Efficient Implementation of AES”, International Journal
of Advanced Research in Computer Science and Software Engineering, Volume 3,
Issue 7, July 2013.
.
[11] Qian Gong-bin, Jiang Qing-feng, Qiu Shui-sheng, "A new image encryption
scheme based on DES algorithm and Chua's circuit," IEEE International
Workshop on Imaging Systems and Technique, pp.168,172, 11-12 May 2009.
[12]Pia Singh, Prof. Karamjeet Singh, “Image Encryption and Decryption Using
Blowfish Algorithm In Matlab”, International Journal of Scientific &
Engineering Research, Volume 4, Issue 7, July-2013.
[13] U. Uludag, S. Pankanti, S. Prabhakar and A.K. Jain, “Biometric cryptosystems:
issues and challenges”, Proceedings of the IEEE, Vol. 92, No. 6, Pp. 948 –960,
2004.
[14] Yao-Jen Chang, Wende Zhang, Tsuhan Chen, “Biometrics-based cryptographic
key generation”, IEEE International Conference on Multimedia and Expo
(ICME), Vol. 3, Pp. 2203 – 2206, 2004.
[15]Bhammar M.B, Mehta K.A, “Survey of Various Image Compression
Techniques”, Ijdi-Eret- International Journal of Darashan Institute On
Engineering Research & Emerging Technology Vol. 1, No. 1, 2012.
[16] Singh A., Gahlawa M. “Image Compression and its Various”, International
Journal of Advanced Research in Computer Science and Software Engineering.
Volume 3, Issue 6, June 2013.
[17]Hae-Yeoun Lee, “Generation of Photo-Mosaic Images through Block Matching
and Color Adjustment”, International Journal of Computer, Information,
Systems and Control Engineering Vol. 8 No.3, 2014.
[18] Ullah, I, Iqbal, W.; Masood, A, "Selective region based images
encryption", 2nd National Conference on Information Assurance (NCIA),
pp.125,128, 11-12 IEEE 2013.
[19] V. Madhu Viswanatham, J. Manikonda, “A Novel Technique for Embedding
Data in Spatial Domain”, International Journal on Computer Science and
Engineering, IJCSE, vol. 2, (2010).
[20]Prashant Dahake and Sonali Nimbhorkar, “Review on Various Methods for
Secure Transmission of Images for Maintaining Image Integrity”, IJCSN
Journal Volume 3, Issue 6, December 2014.
[21] Prashant Dahake and Sonali Nimbhorkar, “Hybrid Cryptosystem for
Maintaining Image Integrity using Biometric Fingerprint”, IEEE international
conference on parvasive computing 2015.
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Biometric Fingerprint

More Related Content

PPT
SECURE IMAGE RETRIEVAL BASED ON HYBRID FEATURES AND HASHES
ranjit banshpal
 
PPTX
Image Security
Satyendra Rajput
 
PDF
Image encryption
rakshit2105
 
DOCX
Image encryption using aes key expansion
Sreeda Perikamana
 
PDF
Color Image Encryption and Decryption Using Multiple Chaotic Maps
IJTET Journal
 
DOCX
(Sample) image encryption
AnsabArshad
 
PDF
Secure image encryption using aes
eSAT Publishing House
 
PPTX
Thesis Background
Abdullah Metwally
 
SECURE IMAGE RETRIEVAL BASED ON HYBRID FEATURES AND HASHES
ranjit banshpal
 
Image Security
Satyendra Rajput
 
Image encryption
rakshit2105
 
Image encryption using aes key expansion
Sreeda Perikamana
 
Color Image Encryption and Decryption Using Multiple Chaotic Maps
IJTET Journal
 
(Sample) image encryption
AnsabArshad
 
Secure image encryption using aes
eSAT Publishing House
 
Thesis Background
Abdullah Metwally
 

What's hot (18)

PDF
Image Steganography Using HBC and RDH Technique
Editor IJCATR
 
PDF
Image encryption and decryption using aes algorithm
IAEME Publication
 
PPTX
Learnable Image Encryption
Masayuki Tanaka
 
PPTX
Image encryption using aes key expansion
Sreeda Perikamana
 
PDF
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
IJCSIS Research Publications
 
PDF
Ew4301904907
IJERA Editor
 
PDF
Highly secure scalable compression of encrypted images
eSAT Journals
 
PPTX
Biometric Hashing technique for Authentication
AnIsh Kumar
 
PDF
A Survey on Different Data Hiding Techniques in Encrypted Images
ijsrd.com
 
PDF
An efficient and highly secure technique to encrypt
ZiadAlqady
 
PPTX
GUI based handwritten digit recognition using CNN
Abhishek Tiwari
 
PPTX
Secure Image Retrieval based on Hybrid Features and Hashes
ranjit banshpal
 
PDF
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
IJEACS
 
PDF
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
ijsrd.com
 
PDF
An improved color image encryption algorithm with
eSAT Publishing House
 
PDF
An improved color image encryption algorithm with pixel permutation and bit s...
eSAT Journals
 
PDF
11.data security using cryptosteganography in web application
Alexander Decker
 
PDF
Data Hiding and Retrieval using Visual Cryptography
AM Publications
 
Image Steganography Using HBC and RDH Technique
Editor IJCATR
 
Image encryption and decryption using aes algorithm
IAEME Publication
 
Learnable Image Encryption
Masayuki Tanaka
 
Image encryption using aes key expansion
Sreeda Perikamana
 
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
IJCSIS Research Publications
 
Ew4301904907
IJERA Editor
 
Highly secure scalable compression of encrypted images
eSAT Journals
 
Biometric Hashing technique for Authentication
AnIsh Kumar
 
A Survey on Different Data Hiding Techniques in Encrypted Images
ijsrd.com
 
An efficient and highly secure technique to encrypt
ZiadAlqady
 
GUI based handwritten digit recognition using CNN
Abhishek Tiwari
 
Secure Image Retrieval based on Hybrid Features and Hashes
ranjit banshpal
 
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
IJEACS
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
ijsrd.com
 
An improved color image encryption algorithm with
eSAT Publishing House
 
An improved color image encryption algorithm with pixel permutation and bit s...
eSAT Journals
 
11.data security using cryptosteganography in web application
Alexander Decker
 
Data Hiding and Retrieval using Visual Cryptography
AM Publications
 
Ad

Viewers also liked (20)

PDF
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
CSCJournals
 
PPTX
Fp12_Efficient_SCM
Md. Al-Amin Khandaker Nipu
 
PPTX
Socket programing
Pankil Agrawal
 
PPTX
Remote authentication via biometrics1
Omkar Salunke
 
PPTX
Age verification in real time keeping children safe online biometric solution
Aboul Ella Hassanien
 
PPT
Gsm based smart card information for lost atm cards
Somanchi Aditya
 
PDF
Negative Selection for Algorithm for Anomaly Detection
Xavier Llorà
 
PPTX
Privacy Preserving Biometrics-Based and User Centric Authentication Protocol
HasiniG
 
PPTX
DNA secret writing project first review
Thomas George C
 
PPTX
Ppt1
ivi11is026
 
PPTX
DNA based Cryptography_Final_Review
Rasheed Karuvally
 
PPT
Big Data (security Issue)
Export Promotion Bureau
 
PPTX
Visual Cryptography
Harish Sripathi
 
PPTX
ATM USER ACCOUNT SECURE BY USING GSM TECHNOLOGY
JOLLUSUDARSHANREDDY
 
PPTX
5G Mobile Technology
IF Engineer 2
 
PPTX
Digital Watermarking Of Medical(DICOM) Images
Prashant Singh
 
PPTX
Visual CryptoGraphy
pallavikhandekar212
 
PDF
Fingerprint Recognition Technique(PDF)
Sandeep Kumar Panda
 
PPT
Fingerprint Technology
Joy Dutta
 
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
CSCJournals
 
Fp12_Efficient_SCM
Md. Al-Amin Khandaker Nipu
 
Socket programing
Pankil Agrawal
 
Remote authentication via biometrics1
Omkar Salunke
 
Age verification in real time keeping children safe online biometric solution
Aboul Ella Hassanien
 
Gsm based smart card information for lost atm cards
Somanchi Aditya
 
Negative Selection for Algorithm for Anomaly Detection
Xavier Llorà
 
Privacy Preserving Biometrics-Based and User Centric Authentication Protocol
HasiniG
 
DNA secret writing project first review
Thomas George C
 
DNA based Cryptography_Final_Review
Rasheed Karuvally
 
Big Data (security Issue)
Export Promotion Bureau
 
Visual Cryptography
Harish Sripathi
 
ATM USER ACCOUNT SECURE BY USING GSM TECHNOLOGY
JOLLUSUDARSHANREDDY
 
5G Mobile Technology
IF Engineer 2
 
Digital Watermarking Of Medical(DICOM) Images
Prashant Singh
 
Visual CryptoGraphy
pallavikhandekar212
 
Fingerprint Recognition Technique(PDF)
Sandeep Kumar Panda
 
Fingerprint Technology
Joy Dutta
 
Ad

Similar to Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Biometric Fingerprint (20)

PPTX
A secured-rgb-image-steganography-using-secret-key
Aly Arman
 
PDF
Image Cryptography using Nearest Prime Pixels
muhammed jassim k
 
PDF
Survey on Different Image Encryption Techniques with Tabular Form
ijsrd.com
 
PDF
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
ijcisjournal
 
PDF
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
ijcisjournal
 
PDF
H43064650
IJERA Editor
 
PDF
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
IRJET Journal
 
PDF
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
IRJET Journal
 
PDF
Unified Approach With Neural Network for Authentication, Security and Compres...
CSCJournals
 
PDF
Security using image processing
IJMIT JOURNAL
 
PDF
Security using image processing
IJMIT JOURNAL
 
PDF
Review On Encrypting and Decrypting Message Via Image Slicing
IRJET Journal
 
PDF
Security System for Data Using Steganography and Cryptography (SSDSC)
csandit
 
PDF
SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)
cscpconf
 
PPTX
Data hiding in graphical password authentication using combination
nuruladnan11
 
PDF
A Survey of Image Based Steganography
editor1knowledgecuddle
 
PDF
IJAER Publishes
AmAl C
 
PDF
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET Journal
 
PDF
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET Journal
 
PDF
MESSAGE TRANSFER USING STEGANOGRAPHY
IRJET Journal
 
A secured-rgb-image-steganography-using-secret-key
Aly Arman
 
Image Cryptography using Nearest Prime Pixels
muhammed jassim k
 
Survey on Different Image Encryption Techniques with Tabular Form
ijsrd.com
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
ijcisjournal
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
ijcisjournal
 
H43064650
IJERA Editor
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
IRJET Journal
 
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
IRJET Journal
 
Unified Approach With Neural Network for Authentication, Security and Compres...
CSCJournals
 
Security using image processing
IJMIT JOURNAL
 
Security using image processing
IJMIT JOURNAL
 
Review On Encrypting and Decrypting Message Via Image Slicing
IRJET Journal
 
Security System for Data Using Steganography and Cryptography (SSDSC)
csandit
 
SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)
cscpconf
 
Data hiding in graphical password authentication using combination
nuruladnan11
 
A Survey of Image Based Steganography
editor1knowledgecuddle
 
IJAER Publishes
AmAl C
 
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET Journal
 
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET Journal
 
MESSAGE TRANSFER USING STEGANOGRAPHY
IRJET Journal
 

More from ranjit banshpal (13)

PPT
LCT in day2 day life
ranjit banshpal
 
PPT
Fingerprint recognition
ranjit banshpal
 
PPT
“Web crawler”
ranjit banshpal
 
PPT
Data mining technique for classification and feature evaluation using stream ...
ranjit banshpal
 
PPTX
Parallelization using open mp
ranjit banshpal
 
PPTX
Face recognition technology
ranjit banshpal
 
PPT
using big-data methods analyse the Cross platform aviation
ranjit banshpal
 
PPT
E mail image spam filtering techniques
ranjit banshpal
 
PPTX
Hybrid encryption
ranjit banshpal
 
PPTX
Autocorrelators1
ranjit banshpal
 
PPT
Static Networks
ranjit banshpal
 
PPT
Ranjitbanshpal
ranjit banshpal
 
DOC
Ranjitbanshpal1
ranjit banshpal
 
LCT in day2 day life
ranjit banshpal
 
Fingerprint recognition
ranjit banshpal
 
“Web crawler”
ranjit banshpal
 
Data mining technique for classification and feature evaluation using stream ...
ranjit banshpal
 
Parallelization using open mp
ranjit banshpal
 
Face recognition technology
ranjit banshpal
 
using big-data methods analyse the Cross platform aviation
ranjit banshpal
 
E mail image spam filtering techniques
ranjit banshpal
 
Hybrid encryption
ranjit banshpal
 
Autocorrelators1
ranjit banshpal
 
Static Networks
ranjit banshpal
 
Ranjitbanshpal
ranjit banshpal
 
Ranjitbanshpal1
ranjit banshpal
 

Recently uploaded (20)

PDF
JUAL EFIX C5 IMU GNSS GEODETIC PERFECT BASE OR ROVER
Budi Minds
 
PDF
LEAP-1B presedntation xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
hatem173148
 
PDF
top-5-use-cases-for-splunk-security-analytics.pdf
yaghutialireza
 
PDF
flutter Launcher Icons, Splash Screens & Fonts
Ahmed Mohamed
 
PDF
FLEX-LNG-Company-Presentation-Nov-2017.pdf
jbloggzs
 
PDF
The Effect of Artifact Removal from EEG Signals on the Detection of Epileptic...
Partho Prosad
 
PPT
Ppt for engineering students application on field effect
lakshmi.ec
 
PDF
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
PDF
Biodegradable Plastics: Innovations and Market Potential (www.kiu.ac.ug)
publication11
 
PPTX
Civil Engineering Practices_BY Sh.JP Mishra 23.09.pptx
bineetmishra1990
 
PDF
Chad Ayach - A Versatile Aerospace Professional
Chad Ayach
 
PPTX
Information Retrieval and Extraction - Module 7
premSankar19
 
PPTX
22PCOAM21 Session 2 Understanding Data Source.pptx
Guru Nanak Technical Institutions
 
PDF
Software Testing Tools - names and explanation
shruti533256
 
PDF
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
PDF
Zero carbon Building Design Guidelines V4
BassemOsman1
 
PDF
Natural_Language_processing_Unit_I_notes.pdf
sanguleumeshit
 
PDF
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 
PDF
Advanced LangChain & RAG: Building a Financial AI Assistant with Real-Time Data
Soufiane Sejjari
 
PDF
Zero Carbon Building Performance standard
BassemOsman1
 
JUAL EFIX C5 IMU GNSS GEODETIC PERFECT BASE OR ROVER
Budi Minds
 
LEAP-1B presedntation xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
hatem173148
 
top-5-use-cases-for-splunk-security-analytics.pdf
yaghutialireza
 
flutter Launcher Icons, Splash Screens & Fonts
Ahmed Mohamed
 
FLEX-LNG-Company-Presentation-Nov-2017.pdf
jbloggzs
 
The Effect of Artifact Removal from EEG Signals on the Detection of Epileptic...
Partho Prosad
 
Ppt for engineering students application on field effect
lakshmi.ec
 
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
Biodegradable Plastics: Innovations and Market Potential (www.kiu.ac.ug)
publication11
 
Civil Engineering Practices_BY Sh.JP Mishra 23.09.pptx
bineetmishra1990
 
Chad Ayach - A Versatile Aerospace Professional
Chad Ayach
 
Information Retrieval and Extraction - Module 7
premSankar19
 
22PCOAM21 Session 2 Understanding Data Source.pptx
Guru Nanak Technical Institutions
 
Software Testing Tools - names and explanation
shruti533256
 
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
Zero carbon Building Design Guidelines V4
BassemOsman1
 
Natural_Language_processing_Unit_I_notes.pdf
sanguleumeshit
 
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 
Advanced LangChain & RAG: Building a Financial AI Assistant with Real-Time Data
Soufiane Sejjari
 
Zero Carbon Building Performance standard
BassemOsman1
 

Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Biometric Fingerprint

  • 1. Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Biometric Fingerprint Presented By: Ranjit R, Banshpal
  • 2. • Introduction • Problem Definition • Literature Survey • Methodology • Project Flow • Tools / Platform • Implementation Detail • Experimental Results • Conclusion • Future Scope • Publications Detail • References Outline
  • 3.  Security is important factor for any communication system.  Like password in ATM,  For social networking sites etc.  Security threat becomes a critical problem that must be solved by new reliable and robust identification, verification or cryptographic techniques .  Biometric method . To reduce the storage space or for fast transmission or for fast sharing of any data compression technique is useful.  Reduced data size. Introduction
  • 4.  System authentication  Data Integrity  Data Confidentiality Contd...
  • 5. In Password based protection, Password can be stolen or forget.  Traditional steganographic technique compresses secret image if its size is larger than cover image. that degrades the quality of secret image.  There is restriction on size of image data which is to be transferred if data hiding technique is used .  Less embedding capacity. Existing system does not uses compression algorithm to efficiently compress image data .  Simple key is used for image encryption and decryption purpose. Problem Definition
  • 6.  To overcome the above drawbacks  Single system is design which provides  System authentication  Data Integrity  Data Confidentiality  Mosaic image method is used for secure transmission of secret image.  Biometric key is used for system authentication and image encryption.
  • 7. Sr.no. Method Name Description 1. LSB Substitution [3][4] • Simple technique for data embedding. • Most significant bits are embedded in least significant bits. • Less embedding Capacity. 2. RGB intensity based Steganography [5] • Data embedding takes place in one of the channel that is Red, Green and blue. • Embedding capacity depends on the intensity value of pixel. 3. Difference Expansion Technique [3] • It uses redundancy in digital images. • If less redundancy in image then performance degraded 4. Reversible Data Hiding technique • Based on histogram technique • Works on only grey- scale images only. Literature Survey
  • 8. Sr.no. Method Name Description 5. Confusion and Diffusion [8] • It is an image encryption method. • First image get scrambled then decomposed into several bit planes. • Uses key to encrypt each bit plain. 6. Secret –Fragment- Visible- Mosaic Image method [1] • Secure image transmission method • It searches database for similar images for data embedding 7. DES based image Encryption [11] • It uses 64 bit block cipher. • 56 bit key. • vulnerable to attack because of small key size 8. Selective Region-Based Method [18] • In first phase the area which contain more information is selected for Encryption. • In second phase non encrypted and encrypted area get interchanged.
  • 9.  SHA -256  One way cryptographic function.  used to generate biometric key from fingerprint. Input 61 62 63 64 65 66 Binary 00111101 00111110 00111111 01000000 01000001 01000010 Hash Ba7816bf 8f01cfea 414140de 5dae2223 b00361a3 96177a9c b410ff61 f20015ad 1010100011100110101010110 1011010101010100001010101 SHA-256 Hex Key Methodology
  • 10.  Secret –Fragment-Visible –Mosaic Image method Advantages No need to compress secret image.  It makes an use of color characteristic of target image. Recovered Secret image is nearly lossless .  No need of database for searching compatible target image.
  • 11.  JPEG Image Compression • It is a lossy image compression. • It divides the image into 8 * 8 blocks • It makes an use of quantization process. Quantization process deals with reducing the number of colors required for representing color image.  AES algorithm • It is a symmetric key algorithm. • There are 3 types of AES, AES- 128, AES - 192, and AES-256 • It is stronger than DES algorithm.
  • 12. Flow graph of Proposed system
  • 13.  Minimum Software Requirement 1. Operating System : Windows- XP or any later version of windows 2. Language : Java 3. Platform : Netbeans IDE 7.2 or later 4. Database : MySQL •Minimum Hardware Requirement 1. Processor : Intel Pentium IV or later 2. RAM : 256 MB or more 3. Hard Disk Capacity : 2 GB or more 4. Fingerprint Scanner / Direct image Tools / Platform
  • 14. Implementation Details  Fig 1. System Login Fig 2 .Generated 256-bit Key
  • 15. Fig 3. Client side Fig 4. Mosaic Image Compression Fig 5. Mosaic Image Encryption
  • 16. Fig 6. Send to receiver Fig 7. At receiver
  • 17. Fig 8. Decompression Fig 9. Secret Image Extraction
  • 18. Secret Image Target Image Target Block Mosaic Image Mosaic Image Creation Experimental Results
  • 19.  PSNR (Peak Signal to Noise Ratio)  RMSE Value ( Root Mean Square Error Value)            M i N j M i N j ijij gf gf ijijMN gfPSNR MN gfRMSE 1 1 2 2 10 1 1 2 )()( ][ 255log )()( 1 10),( ][ 1 , Image Parameters M= Number of pixels in first image N= Number of pixels in second image Where MN= Total number of pixel in images imagefirstinpixelofcoordinate ),( f ji imagesecondofpixelofcoordinate ),( g ji
  • 20. Fig 10. Comparison on the basis of PSNR value Fig 11. Comparison on the basis of RMSE Value Performance Analysis
  • 21. Fig 12. Error value  Above graph shows the distortion between transmitted image and received image.
  • 22. Fig 13. Comparison on the basis of Image Quality and Embedding Capacity
  • 23.  In this project Hybrid system is proposed which is more robust in nature.  Secret fragment visible mosaic image method is used for secure transmission through network. Proposed system has better PSNR value than existing system. System authentication is provided by means of biometric fingerprint and data confidentiality is achieves by means of encryption method. For fast transmission of image data lossy compression technique is used. Thus the proposed system provides data confidentiality, data integrity and system authentication in a single model. Conclusion
  • 24.  Future work Includes  Improving the efficiency of proposed system.  Instead of using single biometric feature like fingerprint for system authentication, multimodal biometric features can be used.  Proposed system can be implemented with different color model other than RGB.  Focus will be on better mosaic image creation. Future Scope
  • 25. Sr. No Authors Title of Paper Journal /Conference Name,Volume, Issue Date / ISBN/ISSN Impact Factor DOI Page No 1. Prashant Dahake Prof. S.U. Nimbhorkar Review on various Methods for Secure Transmission of Images for Maintaining Image Integrity IJCSN (International Journal of Computer Science and Network) Volume 3, Issue 6, December 2014 Impact Factor .274 Published December 2014 450- 454 2. Prashant Dahake Prof. S.U. Nimbhorkar Hybrid Cryptosystem for Maintaining Image Integrity using Biometric Fingerprint . International Conference on Pervasive Computing ICPC 2015 Pune 8-10 january 2015 ISBN 978 - 1 - 4799 - 6272 – 3 Published and Presented 1-5 Publication Detail
  • 26. [1] I-Jen Lai, Wen-Hsiang Tsai, "Secret-Fragment-Visible Mosaic Image–A New Computer Art and Its Application to Information Hiding", Information Forensics and Security, IEEE Transactions on , vol.6, no.3, pp.936,945, Sept. 2011. . [2] Gaurav Bhatnagar, Q. M. Jonathan Wu, “Biometric Inspired Multimedia Encryption Based on Dual Parameter Fractional Fourier Transform”, IEEE Transaction on Systems, Man, and Cybernetics: Systems 2014. [3] Ya-Lin Lee, Wen-Hsiang Tsai, "A New Secure Image Transmission Technique via Secret-Fragment-Visible Mosaic Images by Nearly Reversible Color Transformations", IEEE Transactions on Circuits and Systems for Video Technology, vol.24, no.4, pp.695,703, April 2014. [4] H. Yang, X. Sun, G. Sun, “A High-Capacity Image Data Hiding Scheme Using Adaptive LSB Substitution”, Journal: Radio engineering, vol. 18, no. 4, (2009), pp. 509-516. [5] M. Tanvir Parvez, A. Abdul-Aziz Gutub, “RGB Intensity Based Variable-Bits Image Steganography”, IEEE Asia-Pacific Services Computing Conference, (2008), pp. 1322-1327 References
  • 27. [6] V. Madhu Viswanatham, J. Manikonda, “A Novel Technique for Embedding Data in Spatial Domain”, International Journal on Computer Science and Engineering, IJCSE, vol. 2, (2010). [7] M. Chaumont, W. Puech, “DCT-Based Data Hiding Method To Embed the Color Information in a JPEG Grey Level Image”, 14th European Signal Processing Conference (EUSIPCO 2006), Florence, Italy, copyright by EURASIP, (2006) September 4-8. [8] Naik,K. Pal, A.K., "An image cryptosystem based on diffusion of significant bit- planes of a scrambled image with generated binary key matrices" , IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), pp.1,4, 26-28 Dec. 2013. [9] Priyanka dixit, Mayanka dixit, “Study of JPEG Image Compression Technique Using Discrete Cosine Transformation”, International Journal of Interdisciplinary Research and Innovations Vol. 1, Issue 1, pp: (32-35), October-December 2013. [10] Ritu Pahal ,Vikas kumar, “Efficient Implementation of AES”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 7, July 2013. .
  • 28. [11] Qian Gong-bin, Jiang Qing-feng, Qiu Shui-sheng, "A new image encryption scheme based on DES algorithm and Chua's circuit," IEEE International Workshop on Imaging Systems and Technique, pp.168,172, 11-12 May 2009. [12]Pia Singh, Prof. Karamjeet Singh, “Image Encryption and Decryption Using Blowfish Algorithm In Matlab”, International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013. [13] U. Uludag, S. Pankanti, S. Prabhakar and A.K. Jain, “Biometric cryptosystems: issues and challenges”, Proceedings of the IEEE, Vol. 92, No. 6, Pp. 948 –960, 2004. [14] Yao-Jen Chang, Wende Zhang, Tsuhan Chen, “Biometrics-based cryptographic key generation”, IEEE International Conference on Multimedia and Expo (ICME), Vol. 3, Pp. 2203 – 2206, 2004. [15]Bhammar M.B, Mehta K.A, “Survey of Various Image Compression Techniques”, Ijdi-Eret- International Journal of Darashan Institute On Engineering Research & Emerging Technology Vol. 1, No. 1, 2012. [16] Singh A., Gahlawa M. “Image Compression and its Various”, International Journal of Advanced Research in Computer Science and Software Engineering. Volume 3, Issue 6, June 2013.
  • 29. [17]Hae-Yeoun Lee, “Generation of Photo-Mosaic Images through Block Matching and Color Adjustment”, International Journal of Computer, Information, Systems and Control Engineering Vol. 8 No.3, 2014. [18] Ullah, I, Iqbal, W.; Masood, A, "Selective region based images encryption", 2nd National Conference on Information Assurance (NCIA), pp.125,128, 11-12 IEEE 2013. [19] V. Madhu Viswanatham, J. Manikonda, “A Novel Technique for Embedding Data in Spatial Domain”, International Journal on Computer Science and Engineering, IJCSE, vol. 2, (2010). [20]Prashant Dahake and Sonali Nimbhorkar, “Review on Various Methods for Secure Transmission of Images for Maintaining Image Integrity”, IJCSN Journal Volume 3, Issue 6, December 2014. [21] Prashant Dahake and Sonali Nimbhorkar, “Hybrid Cryptosystem for Maintaining Image Integrity using Biometric Fingerprint”, IEEE international conference on parvasive computing 2015.