Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Presentation

Presentation introduction to machine learning

Rating
-
Sold
-
Pages
11
Uploaded on
04-02-2025
Written in
2024/2025

Presentation introduction to machine learning

Institution
Course

Content preview

Implementation on Magic Square Based Spatial Domain Image Obfuscation

Vybhavi. B1, Dr.K.Mani2,Dr.Umadevi3,Dr.S.Kumar Chandar4

1
Research Scholar, Department of computer science
Nehru Memorial College (Autonomous)Puthanampatti
Tiruchirappalli, Affiliated to Bharathidasan University,
Tamil Nadu-621007
2
Dr.K.Mani,Associate Professor Head
Department of computer science
Nehru Memorial College (Autonomous)Puthanampatti
Tiruchirappalli, Affiliated to Bharathidasan University,
Tamil Nadu.

3
Assistant Professor Department of computer science Nehru
Memorial College (Autonomous)Puthanampatti Tiruchirappalli,
Affiliated to Bharathidasan University,
Tamil Nadu.

, Abstract
One essential method for preventing unwanted access to sensitive images is digital image
encryption. A promising new approach to image encryption that has gained popularity recently
is the magic square methodology. Magic square-based encryption algorithms may produce a
large range of encryption keys and are simple to accept and use. Furthermore, hybrid picture
encryption algorithms that combine the benefits of several encryption approaches can be
created using magic squares. This paper gives a thorough introduction to the properties of
magic square-based digital image encryption. It implements current magic square values
correlated with RGB values using encryption techniques, this has been implemented looking at
the constraint to increase the speed transition. Images are encrypted using Raster Scan format.

Keywords: Digital image encryption, Magic square methodology, Raster Scan format,Contor
pairing function.

1. Introduction
In cryptography, image encryption is a procedure which converts plain image to an encrypted
image by employing a secret key. The decryption process decrypts the cipher image into the
original image by employing the secret key. The main objective of image encryption is to
encrypt the images for security purposes using cryptography techniques. When image reaches
intended receiver, he must first enter required keys. Based on the key and algorithm used by
the sender he can decrypt it. The entire image in the original format will appear to the
receiver. Thus, we encrypt and securely send images over the internet using encryption
algorithm [1].

Digital images are a common form of multimedia that are utilized extensively in various
contexts. Effective techniques to secure the data that images contain are constantly needed,
given the massive needed that are being shared publicly in various sectors, including the
military, medical, and political. Digital images are among the most widely used multimedia
and are utilized extensively in a variety of fields viz., politics, economics, education etc.
Certain industries, like business, military affairs, and medical care, are particularly concerned
about security during image transmission.

Despite being a very old field of study, encryption has a big influence on modern information
security. However, current encryption methods barely meet these expectations because of the
enormous quantity of digital image files and the requirement for real-time encryption [2]. Chaos
theory has been used in a variety of fields, including mathematics, physics, astronomy,
information technology, and more, since it was first introduced as a new field of study in the
1970s. It has continuously resulted in advancements in various fields. Image encryption with
cryptography is the process of using a secret key to transform a plain image into an encrypted
image. Using the secret key, the decryption procedure converts the cipher image back into the
original image. The primary goal of image encryption is to encrypt the images for security
purposes using cryptography techniques. Fig 1 shows the process of securing images through
image encryption

Written for

Institution
Course

Document information

Uploaded on
February 4, 2025
Number of pages
11
Written in
2024/2025
Type
PRESENTATION
Person
Unknown

Subjects

$8.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
jerryantonys

Get to know the seller

Seller avatar
jerryantonys campion anglo indian school
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
1 year
Number of followers
0
Documents
1
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions