Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

genetic algorithm based image encryption

No description
by

Gayan Rodrigo

on 4 January 2013

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of genetic algorithm based image encryption

Data Security 1/1/2013 Data Security 1/1/2013 Genetic Algorithms
Crossover
Mutation
Encryption
Decryption
Conclusion
Future Work Outline Data Security 1/1/2013 Varma, A., & Erhardt, N. (1997). AI: Genetic Algorithms [WWW page]. URL http://biology.kenyon.edu/slonc/bio3/AI/GEN_ALGO/gen_algo.html
Genetic algorithm [WWW page]. URLhttp://en.wikipedia.org/wiki/Genetic_algorithm
Marek Obitko. (1998). Introduction to Genetic Algorithms [WWW page]. URL http://www.obitko.com/tutorials/genetic-algorithms/introduction.php References Data Security 1/1/2013 New Encryption Algorithm
based on Genetic Algorithm.
using Secret Key system
Use new algorithm as an image encryption technique. Proposed Method Data Security 1/1/2013 It is a search heuristic
It is inspired by natural evolution
Selection
Crossover (Recombination)
Mutation
Can be used in scientific design Genetic Algorithms Data Security 1/1/2013 design a sophisticated software based on this technique to use in highly secure multimedia data transmission applications. Future Work Data Security 1/1/2013 No computational complexity.
Secret Key can not be determined by the Encrypted Image.
No data loss between Encryption and Decryption Conclusion Step 4
Construct the encrypted image from the Blocks Data Security 1/1/2013 Encryption Algorithm Data Security 1/1/2013 Mutation
offspring are identical to their parents but have qualities which their parents don’t have Genetic Algorithms cont. Data Security 1/1/2013 Crossover
offspring are created by recombining the best genes of the previous generation. Genetic Algorithms cont. Data Security 1/1/2013 Selection
the best ones should survive and create new offspring Genetic Algorithms cont. Department of Statistics & Computer Science B.K.G.M. Rodrigo
PS/2007/215 1/1/2013 Data Security Secret Key Encryption Algorithm Using Genetic Algorithm Data Security 1/1/2013 Time for Questions B3 B2 B1 Step 1
Consider an image where width ‘W’ & height ‘H’ in pixels.
Split the image into Blocks of length 8 pixels. (B1, B2…) Data Security 1/1/2013 Encryption Algorithm B3 B2 B1 Step 2 (Crossover)
For every Block:
Swap the pixel values of the positions mentioned by the first two values of the secret key. SECRET KEY
2, 4, 7 Data Security 1/1/2013 Encryption Algorithm B3 B2 B1 Step 3 (Mutation)
For every Block:
Change the pixel value of the position mentioned by the third value of the secret key to ‘M’. Where,
M = 255 - P[KEY(3)] SECRET KEY
2, 4, 7 Data Security 1/1/2013 Encryption Algorithm B1 B1 SECRET KEY
2, 4, 7 Step 4
Construct the decrypted image from the Blocks Step 3 (Reverse Crossover)
For every Block:
Swap the pixel values of the positions mentioned by the first two values of the secret key. Data Security 1/1/2013 Decryption Algorithm B1 B1 SECRET KEY
2, 4, 7 Step 2 (Reverse Mutation)
For every Block:
Change the pixel value of the position mentioned by the third value of the secret key to ‘M’. Where,
M = 255 – (255 - P[KEY(3)]) = P[KEY(3)] Step 1
Split the encrypted image into Blocks of length 8 pixels. (B1, B2…) Data Security 1/1/2013 Decryption Algorithm
Full transcript