際際滷

際際滷Share a Scribd company logo
PRESENTED BY
T A B I S H F A W A D 1 3 - M S - E E - 0 1 4
R I Z W A N A L I 1 3 - M S - E E - 0 1 9
Comparison of image
Encryption using different
transforms/techniques
1
Contents
 Introduction
 Discrete cosine transforms
 Discrete Wavelet transforms
 Security Analysis
 Proposed Algorithm
 Security table
 Conclusion
2
Introduction
 Encryption is the conversion of data or information from its original
form to some other form that basically hides the information in it.
 The protection of image data from unauthorized access is important.
 Encryption is employed to increase the data security.
 Decryption is the inverse process of Encryption.
 In decryption, Original image is recovered from the encrypted image.
3
Discrete Cosine Transform
 The Discrete Cosine Transform (DCT) is a widely used transform
coding technique.
 The DCT represents an image as a sum of sinusoids of varying
magnitudes and frequencies.
 The role of the DCT is to decompose the original signal into its DC and
AC components.
 DCT is a linear transformation it transforms the function f(i) into a
function f (u). (1Dimensional DCT)
 The role of the IDCT is to reconstruct the original signal.
4
Cosine Basis Function
 The basis functions should be orthogonal
巨  . 巨  = 0  #
 The basis functions should be orthonormal if they are orthogonal
巨  . 巨  = 1   = 
cos 2i + 1/16   . (cos 2i + 1/16 . q = 0
1
=0
  # 
(
C p
2
 cos 2i +
1
16
 p 
C q
2
 cos 2i +
1
16
 q = 1   = 
1
=0
5
2D DCT & IDCT
 DCT
 ,  =
2   
   .
.
1
=0
cos 2 + 1 /2 
1
=0
 
cos 2 + 1
2
 p (, )
 IDCT
 ,  =
2   
   .
.
1
=0
cos 2 + 1 /2 
1
=0
 
cos 2 + 1
2
 p (, )
6
Wavelet Transform
 In multi resolution analysis (MRA), a scaling function is used to
create a series of approximations of an the image.
 Each differing by the factor of 2 in resolution from its nearest
neighbouring approximations.
 It seeks to represents a signal with good resolution in both time
and frequency by using a set of basis functions called wavelets
{ ()}.
 Wavelets are used to encode the difference in information
between adjacent approximations.
  =     ()
1

7
Discrete Wavelet transform
 DWT is a mathematical tool for decomposing an image.
 The DWT splits the signal into high and low frequency parts.
 The low frequency part is split again into high and low frequency parts.
 For each level of decomposition we first perform the DWT in the
vertical direction followed by the DWT in the horizontal direction.
8
Wavelet Decomposition
 For 2nd level of decomposition, there are 4 sub-bands
LL1, LH1, HL1, and HH1.
 For each successive level of decomposition, the LL sub band of the
previous level is used as the input.
 To perform second level decomposition, the DWT is applied to LL1
band which decomposes the LL1 band into the four sub- bands LL2,
LH2, HL2, and HH2.
9
Wavelet Functions
告,  = 2

2  2    
 = {告,()}
f (x) =   告,()
Orthogonality and orthonormality condition must be met.
10
Discrete wavelet transform
 Forward DWT
 ,  =
1

()倹,()

  ,  =
1

()告,() j  jo
 Inverse DWT
  = 1/   ,  倹,() +1/    ,  告,()
も  = 2 
11
Security Analysis
 Correlation
Correlation is used to determine the similarity between images, Mathematically,
駒 =   袖    袖  (, )/ 
 Mean Square Error
MSE is used to measure the difference between values implied by an
estimator and the true values of the quantity being estimated, Mathematically,
 =
1
  
[1 ,   2(, )]2

=0

=0
 PSNR
Mathematically,
PSNR=10  10 基2
/MSE
 Histogram testing
Histogram testing is used to check the quality of Encryption.
12
Proposed Algorithm
Discrete Cosine transform
CorrelationPSNRMSE
Discrete Wavelet transform
MSE PSNR Correlation
Image Size (M*N)
Histogram
testing
Histogram
testing
13
Security table (Comparison)
Correlation MSE PSNR
-0.0161 -0.0882 18.6475dB
Discrete Cosine Transform
Decomposition
level
Correlation MSE PSNR
L1 0.0046 1.0773 17.8076dB
L2 0.0049 1.0779 17.8092dB
L3 0.0049 -1.3339 16.8795dB
L4 0.0034 0.8831 18.6705dB
Discrete Wavelet Transform
14
Conclusion
We applied DCT & DWT on a 256*256 size image.
DWT has been a better transform and is a better
decomposition technique.
Each Level of decomposition has a different
correlation and PSNR.
15
16

More Related Content

What's hot (20)

2021 03-01-on the relationship between self-attention and convolutional layers
2021 03-01-on the relationship between self-attention and convolutional layers2021 03-01-on the relationship between self-attention and convolutional layers
2021 03-01-on the relationship between self-attention and convolutional layers
JAEMINJEONG5
Adams_SIAMCSE15
Adams_SIAMCSE15Adams_SIAMCSE15
Adams_SIAMCSE15
Karen Pao
DNN and RBM
DNN and RBMDNN and RBM
DNN and RBM
Masayuki Tanaka
Neural Network Tutorial | Introduction to Neural Network | Deep Learning Tuto...
Neural Network Tutorial | Introduction to Neural Network | Deep Learning Tuto...Neural Network Tutorial | Introduction to Neural Network | Deep Learning Tuto...
Neural Network Tutorial | Introduction to Neural Network | Deep Learning Tuto...
Edureka!
Oleksandr Obiednikov Affine transforms and how CNN lives with them
Oleksandr Obiednikov Affine transforms and how CNN lives with themOleksandr Obiednikov Affine transforms and how CNN lives with them
Oleksandr Obiednikov Affine transforms and how CNN lives with them
Lviv Startup Club
Clustering tutorial
Clustering tutorialClustering tutorial
Clustering tutorial
Lio Gon巽alves
discrete wavelet transform
discrete wavelet transformdiscrete wavelet transform
discrete wavelet transform
piyush_11
Final document
Final documentFinal document
Final document
ramyasree_ssj
Data comparation
Data comparationData comparation
Data comparation
Jay Choudhary
2021 05-04-u2-net
2021 05-04-u2-net2021 05-04-u2-net
2021 05-04-u2-net
JAEMINJEONG5
Restricted Boltzmann Machine | Neural Network Tutorial | Deep Learning Tutori...
Restricted Boltzmann Machine | Neural Network Tutorial | Deep Learning Tutori...Restricted Boltzmann Machine | Neural Network Tutorial | Deep Learning Tutori...
Restricted Boltzmann Machine | Neural Network Tutorial | Deep Learning Tutori...
Edureka!
2021 06-02-tabnet
2021 06-02-tabnet2021 06-02-tabnet
2021 06-02-tabnet
JAEMINJEONG5
Lecture 16 KL Transform in Image Processing
Lecture 16 KL Transform in Image ProcessingLecture 16 KL Transform in Image Processing
Lecture 16 KL Transform in Image Processing
VARUN KUMAR
Two port-networks
Two port-networksTwo port-networks
Two port-networks
Hemanth Reddy 9966884562
Dynamic clustering algorithm using fuzzy c means
Dynamic clustering algorithm using fuzzy c meansDynamic clustering algorithm using fuzzy c means
Dynamic clustering algorithm using fuzzy c means
Wrishin Bhattacharya
DAOR - Bridging the Gap between Community and Node Representations: Graph Emb...
DAOR - Bridging the Gap between Community and Node Representations: Graph Emb...DAOR - Bridging the Gap between Community and Node Representations: Graph Emb...
DAOR - Bridging the Gap between Community and Node Representations: Graph Emb...
Artem Lutov
An Efficient Multiplierless Transform algorithm for Video Coding
An Efficient Multiplierless Transform algorithm for Video CodingAn Efficient Multiplierless Transform algorithm for Video Coding
An Efficient Multiplierless Transform algorithm for Video Coding
CSCJournals
Fuzzy c-Means Clustering Algorithms
Fuzzy c-Means Clustering AlgorithmsFuzzy c-Means Clustering Algorithms
Fuzzy c-Means Clustering Algorithms
Justin Cletus
Illustrative Introductory CNN
Illustrative Introductory CNNIllustrative Introductory CNN
Illustrative Introductory CNN
YasutoTamura1
Minimax optimal alternating minimization \\ for kernel nonparametric tensor l...
Minimax optimal alternating minimization \\ for kernel nonparametric tensor l...Minimax optimal alternating minimization \\ for kernel nonparametric tensor l...
Minimax optimal alternating minimization \\ for kernel nonparametric tensor l...
Taiji Suzuki
2021 03-01-on the relationship between self-attention and convolutional layers
2021 03-01-on the relationship between self-attention and convolutional layers2021 03-01-on the relationship between self-attention and convolutional layers
2021 03-01-on the relationship between self-attention and convolutional layers
JAEMINJEONG5
Adams_SIAMCSE15
Adams_SIAMCSE15Adams_SIAMCSE15
Adams_SIAMCSE15
Karen Pao
Neural Network Tutorial | Introduction to Neural Network | Deep Learning Tuto...
Neural Network Tutorial | Introduction to Neural Network | Deep Learning Tuto...Neural Network Tutorial | Introduction to Neural Network | Deep Learning Tuto...
Neural Network Tutorial | Introduction to Neural Network | Deep Learning Tuto...
Edureka!
Oleksandr Obiednikov Affine transforms and how CNN lives with them
Oleksandr Obiednikov Affine transforms and how CNN lives with themOleksandr Obiednikov Affine transforms and how CNN lives with them
Oleksandr Obiednikov Affine transforms and how CNN lives with them
Lviv Startup Club
discrete wavelet transform
discrete wavelet transformdiscrete wavelet transform
discrete wavelet transform
piyush_11
2021 05-04-u2-net
2021 05-04-u2-net2021 05-04-u2-net
2021 05-04-u2-net
JAEMINJEONG5
Restricted Boltzmann Machine | Neural Network Tutorial | Deep Learning Tutori...
Restricted Boltzmann Machine | Neural Network Tutorial | Deep Learning Tutori...Restricted Boltzmann Machine | Neural Network Tutorial | Deep Learning Tutori...
Restricted Boltzmann Machine | Neural Network Tutorial | Deep Learning Tutori...
Edureka!
2021 06-02-tabnet
2021 06-02-tabnet2021 06-02-tabnet
2021 06-02-tabnet
JAEMINJEONG5
Lecture 16 KL Transform in Image Processing
Lecture 16 KL Transform in Image ProcessingLecture 16 KL Transform in Image Processing
Lecture 16 KL Transform in Image Processing
VARUN KUMAR
Dynamic clustering algorithm using fuzzy c means
Dynamic clustering algorithm using fuzzy c meansDynamic clustering algorithm using fuzzy c means
Dynamic clustering algorithm using fuzzy c means
Wrishin Bhattacharya
DAOR - Bridging the Gap between Community and Node Representations: Graph Emb...
DAOR - Bridging the Gap between Community and Node Representations: Graph Emb...DAOR - Bridging the Gap between Community and Node Representations: Graph Emb...
DAOR - Bridging the Gap between Community and Node Representations: Graph Emb...
Artem Lutov
An Efficient Multiplierless Transform algorithm for Video Coding
An Efficient Multiplierless Transform algorithm for Video CodingAn Efficient Multiplierless Transform algorithm for Video Coding
An Efficient Multiplierless Transform algorithm for Video Coding
CSCJournals
Fuzzy c-Means Clustering Algorithms
Fuzzy c-Means Clustering AlgorithmsFuzzy c-Means Clustering Algorithms
Fuzzy c-Means Clustering Algorithms
Justin Cletus
Illustrative Introductory CNN
Illustrative Introductory CNNIllustrative Introductory CNN
Illustrative Introductory CNN
YasutoTamura1
Minimax optimal alternating minimization \\ for kernel nonparametric tensor l...
Minimax optimal alternating minimization \\ for kernel nonparametric tensor l...Minimax optimal alternating minimization \\ for kernel nonparametric tensor l...
Minimax optimal alternating minimization \\ for kernel nonparametric tensor l...
Taiji Suzuki

Similar to Presentation (20)

40120140501004
4012014050100440120140501004
40120140501004
IAEME Publication
40120140501004
4012014050100440120140501004
40120140501004
IAEME Publication
An Optimized Transform for ECG Signal Compression
An Optimized Transform for ECG Signal CompressionAn Optimized Transform for ECG Signal Compression
An Optimized Transform for ECG Signal Compression
IDES Editor
PPT Image Analysis(IRDE, DRDO)
PPT Image Analysis(IRDE, DRDO)PPT Image Analysis(IRDE, DRDO)
PPT Image Analysis(IRDE, DRDO)
Nidhi Gopal
International Journal of Engineering Research and Development (IJERD)
 International Journal of Engineering Research and Development (IJERD) International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMSFINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS
csandit
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMSFINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS
csandit
Pycon openlcdfdm
Pycon openlcdfdmPycon openlcdfdm
Pycon openlcdfdm
Zong-han Xie
Fast dct algorithm using winograds method
Fast dct algorithm using winograds methodFast dct algorithm using winograds method
Fast dct algorithm using winograds method
IAEME Publication
Basics of edge detection and forier transform
Basics of edge detection and forier transformBasics of edge detection and forier transform
Basics of edge detection and forier transform
Simranjit Singh
Lect5 v2
Lect5 v2Lect5 v2
Lect5 v2
Senthilnathan Subramaniyam
Effect of Block Sizes on the Attributes of Watermarking Digital Images
Effect of Block Sizes on the Attributes of Watermarking Digital ImagesEffect of Block Sizes on the Attributes of Watermarking Digital Images
Effect of Block Sizes on the Attributes of Watermarking Digital Images
Dr. Michael Agbaje
Lossy
LossyLossy
Lossy
anithabalaprabhu
Investigation of repeated blasts at Aitik mine using waveform cross correlation
Investigation of repeated blasts at Aitik mine using waveform cross correlationInvestigation of repeated blasts at Aitik mine using waveform cross correlation
Investigation of repeated blasts at Aitik mine using waveform cross correlation
Ivan Kitov
Performance Analysis of Image Enhancement Using Dual-Tree Complex Wavelet Tra...
Performance Analysis of Image Enhancement Using Dual-Tree Complex Wavelet Tra...Performance Analysis of Image Enhancement Using Dual-Tree Complex Wavelet Tra...
Performance Analysis of Image Enhancement Using Dual-Tree Complex Wavelet Tra...
IJERD Editor
On The Fundamental Aspects of Demodulation
On The Fundamental Aspects of DemodulationOn The Fundamental Aspects of Demodulation
On The Fundamental Aspects of Demodulation
CSCJournals
Implementation performance analysis of cordic
Implementation performance analysis of cordicImplementation performance analysis of cordic
Implementation performance analysis of cordic
iaemedu
A Review on Image Denoising using Wavelet Transform
A Review on Image Denoising using Wavelet TransformA Review on Image Denoising using Wavelet Transform
A Review on Image Denoising using Wavelet Transform
ijsrd.com
Fx3111501156
Fx3111501156Fx3111501156
Fx3111501156
IJERA Editor
Chaotic signals denoising using empirical mode decomposition inspired by mult...
Chaotic signals denoising using empirical mode decomposition inspired by mult...Chaotic signals denoising using empirical mode decomposition inspired by mult...
Chaotic signals denoising using empirical mode decomposition inspired by mult...
IJECEIAES
An Optimized Transform for ECG Signal Compression
An Optimized Transform for ECG Signal CompressionAn Optimized Transform for ECG Signal Compression
An Optimized Transform for ECG Signal Compression
IDES Editor
PPT Image Analysis(IRDE, DRDO)
PPT Image Analysis(IRDE, DRDO)PPT Image Analysis(IRDE, DRDO)
PPT Image Analysis(IRDE, DRDO)
Nidhi Gopal
International Journal of Engineering Research and Development (IJERD)
 International Journal of Engineering Research and Development (IJERD) International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMSFINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS
csandit
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMSFINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS
csandit
Pycon openlcdfdm
Pycon openlcdfdmPycon openlcdfdm
Pycon openlcdfdm
Zong-han Xie
Fast dct algorithm using winograds method
Fast dct algorithm using winograds methodFast dct algorithm using winograds method
Fast dct algorithm using winograds method
IAEME Publication
Basics of edge detection and forier transform
Basics of edge detection and forier transformBasics of edge detection and forier transform
Basics of edge detection and forier transform
Simranjit Singh
Effect of Block Sizes on the Attributes of Watermarking Digital Images
Effect of Block Sizes on the Attributes of Watermarking Digital ImagesEffect of Block Sizes on the Attributes of Watermarking Digital Images
Effect of Block Sizes on the Attributes of Watermarking Digital Images
Dr. Michael Agbaje
Investigation of repeated blasts at Aitik mine using waveform cross correlation
Investigation of repeated blasts at Aitik mine using waveform cross correlationInvestigation of repeated blasts at Aitik mine using waveform cross correlation
Investigation of repeated blasts at Aitik mine using waveform cross correlation
Ivan Kitov
Performance Analysis of Image Enhancement Using Dual-Tree Complex Wavelet Tra...
Performance Analysis of Image Enhancement Using Dual-Tree Complex Wavelet Tra...Performance Analysis of Image Enhancement Using Dual-Tree Complex Wavelet Tra...
Performance Analysis of Image Enhancement Using Dual-Tree Complex Wavelet Tra...
IJERD Editor
On The Fundamental Aspects of Demodulation
On The Fundamental Aspects of DemodulationOn The Fundamental Aspects of Demodulation
On The Fundamental Aspects of Demodulation
CSCJournals
Implementation performance analysis of cordic
Implementation performance analysis of cordicImplementation performance analysis of cordic
Implementation performance analysis of cordic
iaemedu
A Review on Image Denoising using Wavelet Transform
A Review on Image Denoising using Wavelet TransformA Review on Image Denoising using Wavelet Transform
A Review on Image Denoising using Wavelet Transform
ijsrd.com
Chaotic signals denoising using empirical mode decomposition inspired by mult...
Chaotic signals denoising using empirical mode decomposition inspired by mult...Chaotic signals denoising using empirical mode decomposition inspired by mult...
Chaotic signals denoising using empirical mode decomposition inspired by mult...
IJECEIAES

Presentation

  • 1. PRESENTED BY T A B I S H F A W A D 1 3 - M S - E E - 0 1 4 R I Z W A N A L I 1 3 - M S - E E - 0 1 9 Comparison of image Encryption using different transforms/techniques 1
  • 2. Contents Introduction Discrete cosine transforms Discrete Wavelet transforms Security Analysis Proposed Algorithm Security table Conclusion 2
  • 3. Introduction Encryption is the conversion of data or information from its original form to some other form that basically hides the information in it. The protection of image data from unauthorized access is important. Encryption is employed to increase the data security. Decryption is the inverse process of Encryption. In decryption, Original image is recovered from the encrypted image. 3
  • 4. Discrete Cosine Transform The Discrete Cosine Transform (DCT) is a widely used transform coding technique. The DCT represents an image as a sum of sinusoids of varying magnitudes and frequencies. The role of the DCT is to decompose the original signal into its DC and AC components. DCT is a linear transformation it transforms the function f(i) into a function f (u). (1Dimensional DCT) The role of the IDCT is to reconstruct the original signal. 4
  • 5. Cosine Basis Function The basis functions should be orthogonal 巨 . 巨 = 0 # The basis functions should be orthonormal if they are orthogonal 巨 . 巨 = 1 = cos 2i + 1/16 . (cos 2i + 1/16 . q = 0 1 =0 # ( C p 2 cos 2i + 1 16 p C q 2 cos 2i + 1 16 q = 1 = 1 =0 5
  • 6. 2D DCT & IDCT DCT , = 2 . . 1 =0 cos 2 + 1 /2 1 =0 cos 2 + 1 2 p (, ) IDCT , = 2 . . 1 =0 cos 2 + 1 /2 1 =0 cos 2 + 1 2 p (, ) 6
  • 7. Wavelet Transform In multi resolution analysis (MRA), a scaling function is used to create a series of approximations of an the image. Each differing by the factor of 2 in resolution from its nearest neighbouring approximations. It seeks to represents a signal with good resolution in both time and frequency by using a set of basis functions called wavelets { ()}. Wavelets are used to encode the difference in information between adjacent approximations. = () 1 7
  • 8. Discrete Wavelet transform DWT is a mathematical tool for decomposing an image. The DWT splits the signal into high and low frequency parts. The low frequency part is split again into high and low frequency parts. For each level of decomposition we first perform the DWT in the vertical direction followed by the DWT in the horizontal direction. 8
  • 9. Wavelet Decomposition For 2nd level of decomposition, there are 4 sub-bands LL1, LH1, HL1, and HH1. For each successive level of decomposition, the LL sub band of the previous level is used as the input. To perform second level decomposition, the DWT is applied to LL1 band which decomposes the LL1 band into the four sub- bands LL2, LH2, HL2, and HH2. 9
  • 10. Wavelet Functions 告, = 2 2 2 = {告,()} f (x) = 告,() Orthogonality and orthonormality condition must be met. 10
  • 11. Discrete wavelet transform Forward DWT , = 1 ()倹,() , = 1 ()告,() j jo Inverse DWT = 1/ , 倹,() +1/ , 告,() も = 2 11
  • 12. Security Analysis Correlation Correlation is used to determine the similarity between images, Mathematically, 駒 = 袖 袖 (, )/ Mean Square Error MSE is used to measure the difference between values implied by an estimator and the true values of the quantity being estimated, Mathematically, = 1 [1 , 2(, )]2 =0 =0 PSNR Mathematically, PSNR=10 10 基2 /MSE Histogram testing Histogram testing is used to check the quality of Encryption. 12
  • 13. Proposed Algorithm Discrete Cosine transform CorrelationPSNRMSE Discrete Wavelet transform MSE PSNR Correlation Image Size (M*N) Histogram testing Histogram testing 13
  • 14. Security table (Comparison) Correlation MSE PSNR -0.0161 -0.0882 18.6475dB Discrete Cosine Transform Decomposition level Correlation MSE PSNR L1 0.0046 1.0773 17.8076dB L2 0.0049 1.0779 17.8092dB L3 0.0049 -1.3339 16.8795dB L4 0.0034 0.8831 18.6705dB Discrete Wavelet Transform 14
  • 15. Conclusion We applied DCT & DWT on a 256*256 size image. DWT has been a better transform and is a better decomposition technique. Each Level of decomposition has a different correlation and PSNR. 15
  • 16. 16