Вы находитесь на странице: 1из 2

Student ID

Group Member 1: MC170202211

Images Encryption and Decryption using Cellular Automaton

Introduction:
Images are frequently stored and transmitted. They have penetrated in all walks of
human life. They are found everywhere like biological images, spy images, commercial
images, manufacturing design images, traffic images, weather images to name a few.
While storing them on some gadget like hard disks, cloud servers, PDAs, USBs and
transmitting them through some public network like internet, they remain under
perennial threat from the potential hackers. So to save them from the unauthorized
access is a very serious and urgent task. Traditionally, this objective has been realized
through some encryption techniques like RSA, IDEA and DES etc. Given the peculiar
characteristics of the images, these techniques can’t be applied. Chaotic maps have
been abundantly employed for the images encryption and decryption. They are
fundamentally mathematical functions which produce chaotic data. In this project, we
will use Intertwining logistic map, piecewise linear chaotic map and Langton’s Ant
cellular automaton to realize the purposes of images encryption and decryption. We
will use the dataset of the images from the following web page:
http://sipi.usc.edu/database/database.php?volume=misc
To gauge the quality of our techniques, we will also employ validation metrics like
histogram analysis, key space analysis, entropy analysis, correlation coefficient
analysis, noise and data loss analysis etc. A key will be used for encrypting and
decrypting the images. Besides, we will use grey scale images in this project.
Functional Requirements:

1. ….to design an algorithm to encrypt the given grey scale image and key.
2. ….to design an algorithm to decrypt the already encrypted image and key.
3. ….to do the security analysis of the proposed encryption scheme using different validation
metrics.

Tools: Tools:
MATLAB version: latest version

Вам также может понравиться