SlideShare a Scribd company logo
Designing Hybrid Cryptosystem for Secure Transmission
of Image Data using Biometric Fingerprint
Presented By:
Ranjit R, Banshpal
• Introduction
• Problem Definition
• Literature Survey
• Methodology
• Project Flow
• Tools / Platform
• Implementation Detail
• Experimental Results
• Conclusion
• Future Scope
• Publications Detail
• References
Outline
 Security is important factor for any communication system.
 Like password in ATM,
 For social networking sites etc.
 Security threat becomes a critical problem that must be solved by
new reliable and robust identification, verification or cryptographic
techniques .
 Biometric method .
To reduce the storage space or for fast transmission or for fast
sharing of any data compression technique is useful.
 Reduced data size.
Introduction
 System authentication
 Data Integrity
 Data Confidentiality
Contd...
In Password based protection, Password can be stolen or forget.
 Traditional steganographic technique compresses secret image if its
size is larger than cover image. that degrades the quality of secret
image.
 There is restriction on size of image data which is to be transferred
if data hiding technique is used .
 Less embedding capacity.
Existing system does not uses compression algorithm to efficiently
compress image data .
 Simple key is used for image encryption and decryption purpose.
Problem Definition
 To overcome the above drawbacks
 Single system is design which provides
 System authentication
 Data Integrity
 Data Confidentiality
 Mosaic image method is used for secure transmission of secret
image.
 Biometric key is used for system authentication and image
encryption.
Sr.no. Method Name Description
1. LSB Substitution [3][4] • Simple technique for data embedding.
• Most significant bits are embedded in least
significant bits.
• Less embedding Capacity.
2. RGB intensity based
Steganography [5]
• Data embedding takes place in one of the
channel that is Red, Green and blue.
• Embedding capacity depends on the intensity
value of pixel.
3. Difference Expansion
Technique [3]
• It uses redundancy in digital images.
• If less redundancy in image then performance
degraded
4. Reversible Data Hiding
technique
• Based on histogram technique
• Works on only grey- scale images only.
Literature Survey
Sr.no. Method Name Description
5. Confusion and Diffusion
[8]
• It is an image encryption method.
• First image get scrambled then decomposed
into several bit planes.
• Uses key to encrypt each bit plain.
6. Secret –Fragment- Visible-
Mosaic Image method [1]
• Secure image transmission method
• It searches database for similar images for data
embedding
7. DES based image
Encryption [11]
• It uses 64 bit block cipher.
• 56 bit key.
• vulnerable to attack because of small key size
8. Selective Region-Based
Method [18]
• In first phase the area which contain more
information is selected for Encryption.
• In second phase non encrypted and encrypted area
get interchanged.
 SHA -256
 One way cryptographic function.
 used to generate biometric key from fingerprint.
Input 61 62 63 64 65 66
Binary 00111101 00111110 00111111 01000000 01000001 01000010
Hash Ba7816bf 8f01cfea 414140de 5dae2223 b00361a3 96177a9c
b410ff61 f20015ad
1010100011100110101010110
1011010101010100001010101 SHA-256 Hex
Key
Methodology
 Secret –Fragment-Visible –Mosaic Image method
Advantages
No need to compress secret image.
 It makes an use of color characteristic of target image.
Recovered Secret image is nearly lossless .
 No need of database for searching compatible target image.
 JPEG Image Compression
• It is a lossy image compression.
• It divides the image into 8 * 8 blocks
• It makes an use of quantization process. Quantization process deals
with reducing the number of colors required for representing color
image.
 AES algorithm
• It is a symmetric key algorithm.
• There are 3 types of AES, AES- 128, AES - 192, and AES-256
• It is stronger than DES algorithm.
Flow graph of Proposed system
 Minimum Software Requirement
1. Operating System : Windows- XP or any later version of windows
2. Language : Java
3. Platform : Netbeans IDE 7.2 or later
4. Database : MySQL
•Minimum Hardware Requirement
1. Processor : Intel Pentium IV or later
2. RAM : 256 MB or more
3. Hard Disk Capacity : 2 GB or more
4. Fingerprint Scanner / Direct image
Tools / Platform
Implementation Details

Fig 1. System Login
Fig 2 .Generated 256-bit Key
Fig 3. Client side
Fig 4. Mosaic Image Compression Fig 5. Mosaic Image Encryption
Fig 6. Send to receiver
Fig 7. At receiver
Fig 8. Decompression
Fig 9. Secret Image Extraction
Secret Image Target Image
Target Block
Mosaic Image
Mosaic Image Creation
Experimental Results
 PSNR (Peak Signal to Noise Ratio)
 RMSE Value ( Root Mean Square Error Value)
 
 

 
 


M
i
N
j
M
i
N
j
ijij
gf
gf
ijijMN
gfPSNR
MN
gfRMSE
1 1
2
2
10
1 1
2
)()(
][
255log
)()(
1
10),(
][
1
,
Image Parameters
M= Number of pixels in first image
N= Number of pixels in second image
Where MN= Total number of pixel in images
imagefirstinpixelofcoordinate
),(
f ji
imagesecondofpixelofcoordinate
),(
g ji
Fig 10. Comparison on the basis of
PSNR value
Fig 11. Comparison on the basis of RMSE Value
Performance Analysis
Fig 12. Error value
 Above graph shows the distortion between transmitted image and
received image.
Fig 13. Comparison on the basis of Image Quality and
Embedding Capacity
 In this project Hybrid system is proposed which is more robust in nature.
 Secret fragment visible mosaic image method is used for secure
transmission through network. Proposed system has better PSNR value than
existing system.
System authentication is provided by means of biometric fingerprint and
data confidentiality is achieves by means of encryption method. For fast
transmission of image data lossy compression technique is used.
Thus the proposed system provides data confidentiality, data integrity and
system authentication in a single model.
Conclusion
 Future work Includes
 Improving the efficiency of proposed system.
 Instead of using single biometric feature like fingerprint for system
authentication, multimodal biometric features can be used.
 Proposed system can be implemented with different color model other
than RGB.
 Focus will be on better mosaic image creation.
Future Scope
Sr.
No
Authors Title of Paper Journal /Conference
Name,Volume, Issue
Date / ISBN/ISSN
Impact Factor
DOI Page
No
1. Prashant
Dahake
Prof. S.U.
Nimbhorkar
Review on various
Methods for Secure
Transmission of
Images for
Maintaining Image
Integrity
IJCSN (International
Journal of Computer
Science and Network)
Volume 3, Issue 6,
December 2014 Impact
Factor .274
Published
December
2014
450-
454
2. Prashant
Dahake
Prof. S.U.
Nimbhorkar
Hybrid
Cryptosystem for
Maintaining Image
Integrity using
Biometric
Fingerprint
.
International Conference
on Pervasive Computing
ICPC 2015 Pune
8-10 january 2015
ISBN 978 - 1 - 4799 - 6272
– 3
Published
and
Presented
1-5
Publication Detail
[1] I-Jen Lai, Wen-Hsiang Tsai, "Secret-Fragment-Visible Mosaic Image–A New
Computer Art and Its Application to Information Hiding", Information Forensics
and Security, IEEE Transactions on , vol.6, no.3, pp.936,945, Sept. 2011.
.
[2] Gaurav Bhatnagar, Q. M. Jonathan Wu, “Biometric Inspired Multimedia
Encryption Based on Dual Parameter Fractional Fourier Transform”, IEEE
Transaction on Systems, Man, and Cybernetics: Systems 2014.
[3] Ya-Lin Lee, Wen-Hsiang Tsai, "A New Secure Image Transmission Technique
via Secret-Fragment-Visible Mosaic Images by Nearly Reversible Color
Transformations", IEEE Transactions on Circuits and Systems for Video
Technology, vol.24, no.4, pp.695,703, April 2014.
[4] H. Yang, X. Sun, G. Sun, “A High-Capacity Image Data Hiding Scheme Using
Adaptive LSB Substitution”, Journal: Radio engineering, vol. 18, no. 4, (2009),
pp. 509-516.
[5] M. Tanvir Parvez, A. Abdul-Aziz Gutub, “RGB Intensity Based Variable-Bits
Image Steganography”, IEEE Asia-Pacific Services Computing Conference,
(2008), pp. 1322-1327
References
[6] V. Madhu Viswanatham, J. Manikonda, “A Novel Technique for Embedding Data
in Spatial Domain”, International Journal on Computer Science and Engineering,
IJCSE, vol. 2, (2010).
[7] M. Chaumont, W. Puech, “DCT-Based Data Hiding Method To Embed the Color
Information in a JPEG Grey Level Image”, 14th European Signal Processing
Conference (EUSIPCO 2006), Florence, Italy, copyright by EURASIP, (2006)
September 4-8.
[8] Naik,K. Pal, A.K., "An image cryptosystem based on diffusion of significant bit-
planes of a scrambled image with generated binary key matrices" , IEEE
International Conference on Computational Intelligence and Computing Research
(ICCIC), pp.1,4, 26-28 Dec. 2013.
[9] Priyanka dixit, Mayanka dixit, “Study of JPEG Image Compression Technique
Using Discrete Cosine Transformation”, International Journal of Interdisciplinary
Research and Innovations Vol. 1, Issue 1, pp: (32-35), October-December 2013.
[10] Ritu Pahal ,Vikas kumar, “Efficient Implementation of AES”, International Journal
of Advanced Research in Computer Science and Software Engineering, Volume 3,
Issue 7, July 2013.
.
[11] Qian Gong-bin, Jiang Qing-feng, Qiu Shui-sheng, "A new image encryption
scheme based on DES algorithm and Chua's circuit," IEEE International
Workshop on Imaging Systems and Technique, pp.168,172, 11-12 May 2009.
[12]Pia Singh, Prof. Karamjeet Singh, “Image Encryption and Decryption Using
Blowfish Algorithm In Matlab”, International Journal of Scientific &
Engineering Research, Volume 4, Issue 7, July-2013.
[13] U. Uludag, S. Pankanti, S. Prabhakar and A.K. Jain, “Biometric cryptosystems:
issues and challenges”, Proceedings of the IEEE, Vol. 92, No. 6, Pp. 948 –960,
2004.
[14] Yao-Jen Chang, Wende Zhang, Tsuhan Chen, “Biometrics-based cryptographic
key generation”, IEEE International Conference on Multimedia and Expo
(ICME), Vol. 3, Pp. 2203 – 2206, 2004.
[15]Bhammar M.B, Mehta K.A, “Survey of Various Image Compression
Techniques”, Ijdi-Eret- International Journal of Darashan Institute On
Engineering Research & Emerging Technology Vol. 1, No. 1, 2012.
[16] Singh A., Gahlawa M. “Image Compression and its Various”, International
Journal of Advanced Research in Computer Science and Software Engineering.
Volume 3, Issue 6, June 2013.
[17]Hae-Yeoun Lee, “Generation of Photo-Mosaic Images through Block Matching
and Color Adjustment”, International Journal of Computer, Information,
Systems and Control Engineering Vol. 8 No.3, 2014.
[18] Ullah, I, Iqbal, W.; Masood, A, "Selective region based images
encryption", 2nd National Conference on Information Assurance (NCIA),
pp.125,128, 11-12 IEEE 2013.
[19] V. Madhu Viswanatham, J. Manikonda, “A Novel Technique for Embedding
Data in Spatial Domain”, International Journal on Computer Science and
Engineering, IJCSE, vol. 2, (2010).
[20]Prashant Dahake and Sonali Nimbhorkar, “Review on Various Methods for
Secure Transmission of Images for Maintaining Image Integrity”, IJCSN
Journal Volume 3, Issue 6, December 2014.
[21] Prashant Dahake and Sonali Nimbhorkar, “Hybrid Cryptosystem for
Maintaining Image Integrity using Biometric Fingerprint”, IEEE international
conference on parvasive computing 2015.
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Biometric Fingerprint

More Related Content

PPT
SECURE IMAGE RETRIEVAL BASED ON HYBRID FEATURES AND HASHES
PPTX
Image Security
PDF
Image encryption
DOCX
Image encryption using aes key expansion
PDF
Color Image Encryption and Decryption Using Multiple Chaotic Maps
DOCX
(Sample) image encryption
PDF
Secure image encryption using aes
PPTX
Thesis Background
SECURE IMAGE RETRIEVAL BASED ON HYBRID FEATURES AND HASHES
Image Security
Image encryption
Image encryption using aes key expansion
Color Image Encryption and Decryption Using Multiple Chaotic Maps
(Sample) image encryption
Secure image encryption using aes
Thesis Background

What's hot (18)

PDF
Image Steganography Using HBC and RDH Technique
PDF
Image encryption and decryption using aes algorithm
PPTX
Learnable Image Encryption
PPTX
Image encryption using aes key expansion
PDF
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
PDF
Ew4301904907
PDF
Highly secure scalable compression of encrypted images
PPTX
Biometric Hashing technique for Authentication
PDF
A Survey on Different Data Hiding Techniques in Encrypted Images
PDF
An efficient and highly secure technique to encrypt
PPTX
GUI based handwritten digit recognition using CNN
PPTX
Secure Image Retrieval based on Hybrid Features and Hashes
PDF
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
PDF
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
PDF
An improved color image encryption algorithm with
PDF
An improved color image encryption algorithm with pixel permutation and bit s...
PDF
11.data security using cryptosteganography in web application
PDF
Data Hiding and Retrieval using Visual Cryptography
Image Steganography Using HBC and RDH Technique
Image encryption and decryption using aes algorithm
Learnable Image Encryption
Image encryption using aes key expansion
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
Ew4301904907
Highly secure scalable compression of encrypted images
Biometric Hashing technique for Authentication
A Survey on Different Data Hiding Techniques in Encrypted Images
An efficient and highly secure technique to encrypt
GUI based handwritten digit recognition using CNN
Secure Image Retrieval based on Hybrid Features and Hashes
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
An improved color image encryption algorithm with
An improved color image encryption algorithm with pixel permutation and bit s...
11.data security using cryptosteganography in web application
Data Hiding and Retrieval using Visual Cryptography
Ad

Viewers also liked (20)

PDF
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
PPTX
Fp12_Efficient_SCM
PPTX
Socket programing
PPTX
Remote authentication via biometrics1
PPTX
Age verification in real time keeping children safe online biometric solution
PPT
Gsm based smart card information for lost atm cards
PDF
Negative Selection for Algorithm for Anomaly Detection
PPTX
Privacy Preserving Biometrics-Based and User Centric Authentication Protocol
PPTX
DNA secret writing project first review
PPTX
PPTX
DNA based Cryptography_Final_Review
PPT
Big Data (security Issue)
PPTX
Visual Cryptography
PPTX
ATM USER ACCOUNT SECURE BY USING GSM TECHNOLOGY
PPTX
5G Mobile Technology
PPTX
Digital Watermarking Of Medical(DICOM) Images
PPTX
Visual CryptoGraphy
PDF
Fingerprint Recognition Technique(PDF)
PPT
Fingerprint Technology
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Fp12_Efficient_SCM
Socket programing
Remote authentication via biometrics1
Age verification in real time keeping children safe online biometric solution
Gsm based smart card information for lost atm cards
Negative Selection for Algorithm for Anomaly Detection
Privacy Preserving Biometrics-Based and User Centric Authentication Protocol
DNA secret writing project first review
DNA based Cryptography_Final_Review
Big Data (security Issue)
Visual Cryptography
ATM USER ACCOUNT SECURE BY USING GSM TECHNOLOGY
5G Mobile Technology
Digital Watermarking Of Medical(DICOM) Images
Visual CryptoGraphy
Fingerprint Recognition Technique(PDF)
Fingerprint Technology
Ad

Similar to Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Biometric Fingerprint (20)

PDF
IRJET- Lossless Encryption Technique for Finger Biometric Images
PDF
Image encryption approach for security issues
PDF
Security using image processing
PDF
Security using image processing
PDF
A Hybrid Approach for Ensuring Security in Data Communication
PDF
New Watermarking/Encryption Method for Medical ImagesFull Protection in m-Hea...
PDF
Cecimg an ste cryptographic approach for data security in image
PDF
Review On Encrypting and Decrypting Message Via Image Slicing
PDF
Survey on Different Image Encryption Techniques with Tabular Form
PPTX
Authentication technique using visual crypto and stegano
PDF
A novel steganographic scheme based on
PDF
Iaetsd design of image steganography using haar dwt
PDF
Encrypting and Decrypting Message via Image Slicing
PDF
Hybrid information security system via combination of compression, cryptogra...
PDF
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
PDF
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
PDF
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
PDF
18. 23367.pdf
PDF
F1803063236
PDF
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
IRJET- Lossless Encryption Technique for Finger Biometric Images
Image encryption approach for security issues
Security using image processing
Security using image processing
A Hybrid Approach for Ensuring Security in Data Communication
New Watermarking/Encryption Method for Medical ImagesFull Protection in m-Hea...
Cecimg an ste cryptographic approach for data security in image
Review On Encrypting and Decrypting Message Via Image Slicing
Survey on Different Image Encryption Techniques with Tabular Form
Authentication technique using visual crypto and stegano
A novel steganographic scheme based on
Iaetsd design of image steganography using haar dwt
Encrypting and Decrypting Message via Image Slicing
Hybrid information security system via combination of compression, cryptogra...
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
18. 23367.pdf
F1803063236
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE

More from ranjit banshpal (13)

PPT
LCT in day2 day life
PPT
Fingerprint recognition
PPT
“Web crawler”
PPT
Data mining technique for classification and feature evaluation using stream ...
PPTX
Parallelization using open mp
PPTX
Face recognition technology
PPT
using big-data methods analyse the Cross platform aviation
PPT
E mail image spam filtering techniques
PPTX
Hybrid encryption
PPTX
Autocorrelators1
PPT
Static Networks
PPT
Ranjitbanshpal
DOC
Ranjitbanshpal1
LCT in day2 day life
Fingerprint recognition
“Web crawler”
Data mining technique for classification and feature evaluation using stream ...
Parallelization using open mp
Face recognition technology
using big-data methods analyse the Cross platform aviation
E mail image spam filtering techniques
Hybrid encryption
Autocorrelators1
Static Networks
Ranjitbanshpal
Ranjitbanshpal1

Recently uploaded (20)

PPT
Mechanical Engineering MATERIALS Selection
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
web development for engineering and engineering
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPT
Project quality management in manufacturing
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
Well-logging-methods_new................
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Mechanical Engineering MATERIALS Selection
Model Code of Practice - Construction Work - 21102022 .pdf
web development for engineering and engineering
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
Lecture Notes Electrical Wiring System Components
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Project quality management in manufacturing
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Well-logging-methods_new................
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Operating System & Kernel Study Guide-1 - converted.pdf
Automation-in-Manufacturing-Chapter-Introduction.pdf
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026

Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Biometric Fingerprint

  • 1. Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Biometric Fingerprint Presented By: Ranjit R, Banshpal
  • 2. • Introduction • Problem Definition • Literature Survey • Methodology • Project Flow • Tools / Platform • Implementation Detail • Experimental Results • Conclusion • Future Scope • Publications Detail • References Outline
  • 3.  Security is important factor for any communication system.  Like password in ATM,  For social networking sites etc.  Security threat becomes a critical problem that must be solved by new reliable and robust identification, verification or cryptographic techniques .  Biometric method . To reduce the storage space or for fast transmission or for fast sharing of any data compression technique is useful.  Reduced data size. Introduction
  • 4.  System authentication  Data Integrity  Data Confidentiality Contd...
  • 5. In Password based protection, Password can be stolen or forget.  Traditional steganographic technique compresses secret image if its size is larger than cover image. that degrades the quality of secret image.  There is restriction on size of image data which is to be transferred if data hiding technique is used .  Less embedding capacity. Existing system does not uses compression algorithm to efficiently compress image data .  Simple key is used for image encryption and decryption purpose. Problem Definition
  • 6.  To overcome the above drawbacks  Single system is design which provides  System authentication  Data Integrity  Data Confidentiality  Mosaic image method is used for secure transmission of secret image.  Biometric key is used for system authentication and image encryption.
  • 7. Sr.no. Method Name Description 1. LSB Substitution [3][4] • Simple technique for data embedding. • Most significant bits are embedded in least significant bits. • Less embedding Capacity. 2. RGB intensity based Steganography [5] • Data embedding takes place in one of the channel that is Red, Green and blue. • Embedding capacity depends on the intensity value of pixel. 3. Difference Expansion Technique [3] • It uses redundancy in digital images. • If less redundancy in image then performance degraded 4. Reversible Data Hiding technique • Based on histogram technique • Works on only grey- scale images only. Literature Survey
  • 8. Sr.no. Method Name Description 5. Confusion and Diffusion [8] • It is an image encryption method. • First image get scrambled then decomposed into several bit planes. • Uses key to encrypt each bit plain. 6. Secret –Fragment- Visible- Mosaic Image method [1] • Secure image transmission method • It searches database for similar images for data embedding 7. DES based image Encryption [11] • It uses 64 bit block cipher. • 56 bit key. • vulnerable to attack because of small key size 8. Selective Region-Based Method [18] • In first phase the area which contain more information is selected for Encryption. • In second phase non encrypted and encrypted area get interchanged.
  • 9.  SHA -256  One way cryptographic function.  used to generate biometric key from fingerprint. Input 61 62 63 64 65 66 Binary 00111101 00111110 00111111 01000000 01000001 01000010 Hash Ba7816bf 8f01cfea 414140de 5dae2223 b00361a3 96177a9c b410ff61 f20015ad 1010100011100110101010110 1011010101010100001010101 SHA-256 Hex Key Methodology
  • 10.  Secret –Fragment-Visible –Mosaic Image method Advantages No need to compress secret image.  It makes an use of color characteristic of target image. Recovered Secret image is nearly lossless .  No need of database for searching compatible target image.
  • 11.  JPEG Image Compression • It is a lossy image compression. • It divides the image into 8 * 8 blocks • It makes an use of quantization process. Quantization process deals with reducing the number of colors required for representing color image.  AES algorithm • It is a symmetric key algorithm. • There are 3 types of AES, AES- 128, AES - 192, and AES-256 • It is stronger than DES algorithm.
  • 12. Flow graph of Proposed system
  • 13.  Minimum Software Requirement 1. Operating System : Windows- XP or any later version of windows 2. Language : Java 3. Platform : Netbeans IDE 7.2 or later 4. Database : MySQL •Minimum Hardware Requirement 1. Processor : Intel Pentium IV or later 2. RAM : 256 MB or more 3. Hard Disk Capacity : 2 GB or more 4. Fingerprint Scanner / Direct image Tools / Platform
  • 14. Implementation Details  Fig 1. System Login Fig 2 .Generated 256-bit Key
  • 15. Fig 3. Client side Fig 4. Mosaic Image Compression Fig 5. Mosaic Image Encryption
  • 16. Fig 6. Send to receiver Fig 7. At receiver
  • 17. Fig 8. Decompression Fig 9. Secret Image Extraction
  • 18. Secret Image Target Image Target Block Mosaic Image Mosaic Image Creation Experimental Results
  • 19.  PSNR (Peak Signal to Noise Ratio)  RMSE Value ( Root Mean Square Error Value)            M i N j M i N j ijij gf gf ijijMN gfPSNR MN gfRMSE 1 1 2 2 10 1 1 2 )()( ][ 255log )()( 1 10),( ][ 1 , Image Parameters M= Number of pixels in first image N= Number of pixels in second image Where MN= Total number of pixel in images imagefirstinpixelofcoordinate ),( f ji imagesecondofpixelofcoordinate ),( g ji
  • 20. Fig 10. Comparison on the basis of PSNR value Fig 11. Comparison on the basis of RMSE Value Performance Analysis
  • 21. Fig 12. Error value  Above graph shows the distortion between transmitted image and received image.
  • 22. Fig 13. Comparison on the basis of Image Quality and Embedding Capacity
  • 23.  In this project Hybrid system is proposed which is more robust in nature.  Secret fragment visible mosaic image method is used for secure transmission through network. Proposed system has better PSNR value than existing system. System authentication is provided by means of biometric fingerprint and data confidentiality is achieves by means of encryption method. For fast transmission of image data lossy compression technique is used. Thus the proposed system provides data confidentiality, data integrity and system authentication in a single model. Conclusion
  • 24.  Future work Includes  Improving the efficiency of proposed system.  Instead of using single biometric feature like fingerprint for system authentication, multimodal biometric features can be used.  Proposed system can be implemented with different color model other than RGB.  Focus will be on better mosaic image creation. Future Scope
  • 25. Sr. No Authors Title of Paper Journal /Conference Name,Volume, Issue Date / ISBN/ISSN Impact Factor DOI Page No 1. Prashant Dahake Prof. S.U. Nimbhorkar Review on various Methods for Secure Transmission of Images for Maintaining Image Integrity IJCSN (International Journal of Computer Science and Network) Volume 3, Issue 6, December 2014 Impact Factor .274 Published December 2014 450- 454 2. Prashant Dahake Prof. S.U. Nimbhorkar Hybrid Cryptosystem for Maintaining Image Integrity using Biometric Fingerprint . International Conference on Pervasive Computing ICPC 2015 Pune 8-10 january 2015 ISBN 978 - 1 - 4799 - 6272 – 3 Published and Presented 1-5 Publication Detail
  • 26. [1] I-Jen Lai, Wen-Hsiang Tsai, "Secret-Fragment-Visible Mosaic Image–A New Computer Art and Its Application to Information Hiding", Information Forensics and Security, IEEE Transactions on , vol.6, no.3, pp.936,945, Sept. 2011. . [2] Gaurav Bhatnagar, Q. M. Jonathan Wu, “Biometric Inspired Multimedia Encryption Based on Dual Parameter Fractional Fourier Transform”, IEEE Transaction on Systems, Man, and Cybernetics: Systems 2014. [3] Ya-Lin Lee, Wen-Hsiang Tsai, "A New Secure Image Transmission Technique via Secret-Fragment-Visible Mosaic Images by Nearly Reversible Color Transformations", IEEE Transactions on Circuits and Systems for Video Technology, vol.24, no.4, pp.695,703, April 2014. [4] H. Yang, X. Sun, G. Sun, “A High-Capacity Image Data Hiding Scheme Using Adaptive LSB Substitution”, Journal: Radio engineering, vol. 18, no. 4, (2009), pp. 509-516. [5] M. Tanvir Parvez, A. Abdul-Aziz Gutub, “RGB Intensity Based Variable-Bits Image Steganography”, IEEE Asia-Pacific Services Computing Conference, (2008), pp. 1322-1327 References
  • 27. [6] V. Madhu Viswanatham, J. Manikonda, “A Novel Technique for Embedding Data in Spatial Domain”, International Journal on Computer Science and Engineering, IJCSE, vol. 2, (2010). [7] M. Chaumont, W. Puech, “DCT-Based Data Hiding Method To Embed the Color Information in a JPEG Grey Level Image”, 14th European Signal Processing Conference (EUSIPCO 2006), Florence, Italy, copyright by EURASIP, (2006) September 4-8. [8] Naik,K. Pal, A.K., "An image cryptosystem based on diffusion of significant bit- planes of a scrambled image with generated binary key matrices" , IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), pp.1,4, 26-28 Dec. 2013. [9] Priyanka dixit, Mayanka dixit, “Study of JPEG Image Compression Technique Using Discrete Cosine Transformation”, International Journal of Interdisciplinary Research and Innovations Vol. 1, Issue 1, pp: (32-35), October-December 2013. [10] Ritu Pahal ,Vikas kumar, “Efficient Implementation of AES”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 7, July 2013. .
  • 28. [11] Qian Gong-bin, Jiang Qing-feng, Qiu Shui-sheng, "A new image encryption scheme based on DES algorithm and Chua's circuit," IEEE International Workshop on Imaging Systems and Technique, pp.168,172, 11-12 May 2009. [12]Pia Singh, Prof. Karamjeet Singh, “Image Encryption and Decryption Using Blowfish Algorithm In Matlab”, International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013. [13] U. Uludag, S. Pankanti, S. Prabhakar and A.K. Jain, “Biometric cryptosystems: issues and challenges”, Proceedings of the IEEE, Vol. 92, No. 6, Pp. 948 –960, 2004. [14] Yao-Jen Chang, Wende Zhang, Tsuhan Chen, “Biometrics-based cryptographic key generation”, IEEE International Conference on Multimedia and Expo (ICME), Vol. 3, Pp. 2203 – 2206, 2004. [15]Bhammar M.B, Mehta K.A, “Survey of Various Image Compression Techniques”, Ijdi-Eret- International Journal of Darashan Institute On Engineering Research & Emerging Technology Vol. 1, No. 1, 2012. [16] Singh A., Gahlawa M. “Image Compression and its Various”, International Journal of Advanced Research in Computer Science and Software Engineering. Volume 3, Issue 6, June 2013.
  • 29. [17]Hae-Yeoun Lee, “Generation of Photo-Mosaic Images through Block Matching and Color Adjustment”, International Journal of Computer, Information, Systems and Control Engineering Vol. 8 No.3, 2014. [18] Ullah, I, Iqbal, W.; Masood, A, "Selective region based images encryption", 2nd National Conference on Information Assurance (NCIA), pp.125,128, 11-12 IEEE 2013. [19] V. Madhu Viswanatham, J. Manikonda, “A Novel Technique for Embedding Data in Spatial Domain”, International Journal on Computer Science and Engineering, IJCSE, vol. 2, (2010). [20]Prashant Dahake and Sonali Nimbhorkar, “Review on Various Methods for Secure Transmission of Images for Maintaining Image Integrity”, IJCSN Journal Volume 3, Issue 6, December 2014. [21] Prashant Dahake and Sonali Nimbhorkar, “Hybrid Cryptosystem for Maintaining Image Integrity using Biometric Fingerprint”, IEEE international conference on parvasive computing 2015.