IJRIT International Journal of Research in Information Technology, Volume 1, Issue 11, November, 2013, Pg. 552-557

International Journal of Research in Information Technology (IJRIT)

www.ijrit.com

ISSN 2001-5569

Scrambled Number Generator For Secure Image Transfer Y.Chaitanya Sreeram1, Shaik Abdul Naeem2, Bharath H R3, K.karthikeyan4 1,2,3

School of Information Technology, VIT University, Vellore, TN, India. Email: [email protected] 4

School of Advanced Sciences, VIT University, Vellore, TN, India. Email: [email protected]

Abstract The major function of image enhancement, an important procedure in image processing, is to alter the original image to be more observable for a specific application. The proposed new image message which is encrypted need to overcome some security analysis for image encrypted. The present way of image scrambling technique for a secure data image transfer has some security problems which we will be over coming by our new technique. The security analysis which the image has to overcome is key space analysis, statistical analysis, correlation analysis, differential analysis, key sensitivity analysis. If an image overcome the above analysis methods it is safe from intruders. To overcome all these problems we are proposing a new technique which will help in encrypting the image safely and prevent intruders to decrypt it.

Keywords: image processing, encryption, security analysis, image scrambling, and decryption.

Full text: https://sites.google.com/a/ijrit.com/papers/home/V1I1150.pdf

IJRIT

1

Scrambled Number Generator For Secure Image ... - IJRIT

The present way of image scrambling technique for a secure data image ... space analysis, statistical analysis, correlation analysis, differential analysis, key ...

51KB Sizes 1 Downloads 216 Views

Recommend Documents

Scrambled Number Generator For Secure Image ... - IJRIT
Scrambled Number Generator For Secure Image. Transfer. Y.Chaitanya ... and decryption. Full text: https://sites.google.com/a/ijrit.com/papers/home/V1I1150.pdf.

scrambled number generator for secure image transfer
... Press, 2009.8:210-211. 7. D. Qi, “Matrix transformation and its application to image hiding,” Journal of North China University of. Technology, vol.11, no.1, pp.24–28, 1999. 8. L. Zhu, W. Li, L. Liao, and H. Li, “A novel algorithm for scr

Secure Adhoc Routing Protocol for Privacy Preservation - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 1, Issue 9, .... Communication anonymity in data management has been discussed ..... “Rumor riding: anonymizing unstructured peer-to-peer systems,” IEEE Trans.

Privacy Preserving Public Auditing for Secure ... - IJRIT
data, applications and other resources, users can be easy to use powerful ... of PaaS are no need to buy special hardware and software to develop and.

Secure Adhoc Routing Protocol for Privacy Preservation - IJRIT
In this particular paper, we define stronger privacy requirements relating to ..... “Rumor riding: anonymizing unstructured peer-to-peer systems,” IEEE Trans.

TinyMT Pseudo Random Number Generator for Erlang
Sep 14, 2012 - vided as a general library for multiple operating systems, since .... 3 On Kyoto University ACCMS Supercomputer System B cluster; the test.

SFMT Pseudo Random Number Generator for Erlang - Kenji Rikitake ...
Erlang/OTP [5] has a built-in PRNG library called random mod- ule. ..... RedHat Enterprise Linux AS V4 of x86_64 architecture5. We chose the five SFMT ... WN time [ms] leciel reseaux thin. Figure 5. Total own time of SFMT gen_rand_list32/2 for 10 cal

TinyMT Pseudo Random Number Generator for Erlang
Sep 2, 2012 - Now default PRNG for Python and R. Kenji Rikitake / Erlang ... A) Generate a 32-bit integer random number R. B) Compute Q which is the ...

SFMT Pseudo Random Number Generator for Erlang - Kenji Rikitake ...
List of sfmt-erlang exported functions referred in this paper. 128-bit shift registers. ..... and does not effectively utilize the concurrent and parallel nature of. Erlang.

A recipe for an unpredictable random number generator
mean-square distance from the origin of the random walk as a function of the number of .... Using this method we have generated a very long sequence of random ... 1010. 100. 101. 102. 103. 104. 105 log(N) log. (a). 101. 102. 103. 104.

TinyMT Pseudo Random Number Generator for Erlang - Kenji Rikitake ...
Sep 14, 2012 - Statistics]: Random Number Generation. General Terms Algorithms, Performance. Keywords .... Table 1 shows a list of tinymt-erlang major exported functions referred in this paper. Figure 1 shows the ..... hiroshima-u.ac.jp/~m-mat/MT/ART

A NOVEL SECURE IMAGE STEGANOGRAPHY.pdf
Loading… Whoops! There was a problem loading more pages. Whoops! There was a problem previewing this document. Retrying... Download. Connect more apps... A NOVEL SE ... GRAPHY.pdf. A NOVEL SE ... GRAPHY.pdf. Open. Extract. Open with. Sign In. Main

Image segmentation approach for tacking the object: A Survey ... - IJRIT
Identification: Colour is a power description tool, for example, the red apple versus the ..... Conference on Pattern Recognition., Quebec City, Canada, volume IV, ...

Image segmentation approach for tacking the object: A Survey ... - IJRIT
Identification: Colour is a power description tool, for example, the red apple versus the brown ..... Code available at http://www.cis.upenn.edu/˜jshi/software/.

Underwater Image Enhancement Techniques: A Survey - IJRIT
Different wavelength of light are attenuated by different degree in water. Underwater images are ... 75 found in [28]-[32]. For the last few years, a growing interest in marine research has encouraged researchers ..... Enhancement Using an Integrated

Fire Detection Using Image Processing - IJRIT
These techniques can be used to reduce false alarms along with fire detection methods . ... Fire detection system sensors are used to detect occurrence of fire and to make ... A fire is an image can be described by using its color properties.

Fire Detection Using Image Processing - IJRIT
Keywords: Fire detection, Video processing, Edge detection, Color detection, Gray cycle pixel, Fire pixel spreading. 1. Introduction. Fire detection system sensors ...

Improvement in Performance Parameters of Image ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 2, Issue 6, ... Department of Computer Science and Engineering, Technocrats Institute of Technology ... Hierarchical Trees (SPIHT), Wavelet Difference Reduction (WDR), and ...

Identity-Based Secure Distributed Data Storage with Dual ... - IJRIT
In Cryptographic. File System scheme the reliability of the perceptive file is provided by digital signature methods and the message authentication codes. (MAC).

Towards secure the multi –cloud using homomorphic ... - IJRIT
Towards secure the multi –cloud using homomorphic encryption scheme. Rameshbabu .... in the design of current SNA techniques. Multiple key issues can be ...

Identity-Based Secure Distributed Data Storage with Dual ... - IJRIT
In Cryptographic. File System scheme the reliability of the perceptive file is provided by digital signature methods and the message authentication codes. (MAC).

Scrambled Animal Sentences.pdf
Page 1 of 7. snakes are. oviparous because. they lay. Page 1 of 7. Page 2 of 7. eggs birds. have feathers. and a. Page 2 of 7. Page 3 of 7. beak zebras. are white.

Enabling Secure and Efficient Ranked Keyword ... - IJRIT
the problem of secure ranked keyword search over encrypted cloud data. Ranked search greatly enhances system usability by enabling search result relevance ...

Towards secure the multi –cloud using homomorphic ... - IJRIT
atomism of traditional social science in which individual behavior—such as ... Title : Public-Key Cryptosystems Based on Composite Degree Residuosity Classes ... The social network field is an interdisciplinary research programmer which ...