SlideShare une entreprise Scribd logo
1  sur  8
Télécharger pour lire hors ligne
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 6, June (2014), pp. 45-52 © IAEME
45
EFFICIENT WAY OF IMAGE ENCRYPTION USING GENERALIZED
WEIGHTED FRACTIONAL FOURIER TRANSFORM WITH DOUBLE
RANDOM PHASE ENCODING
Priyanka Chauhan1
, Girish Chandra Thakur2
M. Tech. Scholar1
, Associate Professor2
,
Dept. of Electronics & Communication Engg., Institute of Engineering & Technology,
Alwar-301030 (Raj.), India
ABSTRACT
Data transfer between the users over different network technologies is increasing day by day.
With the data transfer, concern about the information theft by any eavesdropper is also increasing.
To prevent this information theft, our information is converted in to unreadable form using some
algorithm and it can only be converted into readable form using key. This process of conversion the
information into secured form is called encryption. At present information transfer is also in the form
of images. In this paper we are going to discuss some of the methods of encrypting the images. In
any encryption technique, the major role is played by its key i.e. larger the number of parameters in
the key stronger is the encryption technique. So in the thesis we will develop the GWFRFT which is
based on the properties of conventional FRFT and discuss random phase encoding technique in
FRFT domain. Then study random phase encoding technique in GWFRFT domain. And at last to
make the scheme more efficient and strong we encrypt two images in to single image.
Keywords: Encryption, FRFT, FT, GWFRFT, Image.
1. INTRODUCTION
In cryptography, encryption is the process of transforming information (referred to as
plaintext) using an algorithm (called a cipher) to make it unreadable to anyone except those
possessing extra ordinary information, more often than not referred to while a key. This product of
the process is encrypted in order in cryptography, referred to cipher text. The invalidate process, i.e.,
to make the encrypted information readable again, is referred to as decryption (i.e. to make it
unencrypted). In recent years there have been numerous reports of confidential data such as
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH
IN ENGINEERING AND TECHNOLOGY (IJARET)
ISSN 0976 - 6480 (Print)
ISSN 0976 - 6499 (Online)
Volume 5, Issue 6, June (2014), pp. 45-52
© IAEME: http://www.iaeme.com/IJARET.asp
Journal Impact Factor (2014): 7.8273 (Calculated by GISI)
www.jifactor.com
IJARET
© I A E M E
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 6, June (2014), pp. 45-52 © IAEME
46
customers’ personal records being exposed through loss or theft of laptops or endorsement drives.
Encrypting like files at rest help guard them should physical security events fail. Digital liberties
organization systems which prevent unauthorized use or reproduction of copyrighted material and
protect software against reverse engineering (see also copy protection) are another somewhat
different example of using encryption on data at rest. There have been numerous reports of data in
transit being intercepted in current years. Encrypting information in shipment also helps to secure it
as it is often difficult to physically secure all access to networks. In this paper we are using
Generalized Weighted Fractional Fourier Transform with random phase encoding technique for the
encryption of two images in to single image. GWFRFT will be derived from the FRFT. The
fractional Fourier transform (FRFT) is a superset of the Fourier transform and has been applied in
optics, quantum mechanics, and signal processing areas [15,20,21].In this paper, we discuss a
generalized weighted fractional Fourier transform (GWFRFT) which is weighted sum of the integer
order fractional Fourier transform.
2. DEFINITION OF FRFT AND GWFRFT
FRFT is a generalization of FT [1, 13]. It is not only richer in theory and more flexible in
application, but is also not expensive in implementation. It is a powerful tool for the analysis of time-
varying signals. With the advent of FRFT and related concepts, it is seen that the properties and
applications of the conventional FT are special cases of those of the FRFT. However, in every area
where FT and frequency domain concepts are used, there exists the potential for generalization and
implementation by using FRFT. Mathematically, α th
order FRFT is the α th
power of FT operator.
Hence α th
order FRFT of any signal 2
( ) ( )s t L R∈ is given by
[ ( )] ( ) ( ; , )F s t s t K t dtα
α ω
+∞
−∞
= ∫ (1)
Where
2 2
( ; , ) ( )exp[( ( ) ( ) ( ) )]K t K B C t B tα ω α α ω α ω α= − + (2)
Is the kernel of Fα
, α is the fraction, and
[1 cot( )]
( )
2
j
K
α
α
π
−
= (3)
( ) cot( )B α α= (4)
1
( )
sin( )
C α
α
= (5)
2
aπ
α = (6)
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 6, June (2014), pp. 45-52 © IAEME
47
For integer values of α it can be deduced that any fractional Fourier transform repeat itself at
an interval of 4 that can be shown as
4
[ ( )] [ ( )]m l l
F s t F s t+
= (7)
Where m is any integer and l can be any real number.
As we discussed the periodic nature of integral order fractional Fourier transform in the
previous chapter i.e. integer order fractional Fourier transform is periodic with period 4. So now it is
given that α th
order FRFT of any signal can be represented in terms of these four integral order
FRFT i.e.
0 1 2 3
0 1 2 3[ ( )] ( ) [ ( )] ( ) [ ( )] ( ) [ ( )] ( ) [ ( )]wF s t A F s t A F s t A F s t A F s tα
α α α α= + + + (8)
Where the coefficients ( )lA α , l = 0,1,2,3 are continuous functions ofα .
Generalized weighted fractional Fourier transform obeys the following axioms.
I. Continuity axiom: 2 2
: ( ) ( )wF L R L Rα
→ is continuous in fractional order α .
II. Boundary axiom: wFα
degenerates into Fα
when α is an integer multiple of
2
π
or α is an
integer. i.e. for integer order the weighted fraction Fourier transform reduces into the normal
Fourier transform of signal s(t ) or the signal itself. For different integer values of order a, the
values of weighted coefficient is shown in the Table 1.
III. Additive axiom: For real numbers α and β , the GWFRFT operator wFα
has the following
additive property
w w w w wF F F F Fα β β α α β+
= = (9)
So using these properties and calculating the value of coefficient ( )lA α the final
equation of generalized weighted fractional Fourier transform comes out to be
3 3
( , )
0 0
[ ( )] exp{( 2 / 4)[(4 1) (4 ) ]} [ ( )]l
w M N k k
l k
F s t j m n k kl F s tα
π α
= =
= − + + −∑∑ (10)
A(or α) A0 A1 A2 A3
0 (or 0) 1 0 0 0
1 (or π/2) 0 1 0 0
2 (or π) 0 0 1 0
3 (or 3π/2) 0 0 0 1
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 6, June (2014), pp. 45-52 © IAEME
48
3. PROPOSED IDEA OF DOUBLE IMAGE ENCRYPTION BASED ON RANDOM PHASE
ENCODING USING GWFRFT
Most of the encryption techniques in the literature are dealing with a single amplitude image
(i.e. binary text, grayscale or color image). However, in somecases, one need to encrypt two images
with certain relations such as two pictures of an object or a picture and its binary text for description,
etc., which are often stored or transmitted together. Encrypting the two images directly using the
single-image encryption algorithms mentioned in the literature results in two separate encrypted
images with random noise distribution, and sometimes, there arises the difficulty in distinguishing
between them before decryption and the decryption has to be conducted twice to recover the two
images. Multiple images can also be encrypted by using wavelength multiplexing [18] or position
multiplexing methods [21], but the qualities of decrypted images are not perfect due to the cross-talk
effects between images. Inspired by the architecture of the fully phase encoding [2, 17] and pixel
scrambling (random shifting) techniques [18, 20]. The schematic of a method which can convert two
images into one encrypted image based on the random phase encoding in the generalized weighted
fractional Fourier domain is given in Fig 1.
Let f (x0) and g(x0) represent the two primary normalized amplitude images to be encrypted
together, J denotes the pixel scrambling operation [20], which interchanges the pixels according to
some random permutation, and the image can be retrieved by repositioning the disturbed image
according to the special order. For encryption, the pixel scrambling is applied to one of the primary
images g(x0), and then, the scrambled result J [g(x0)] is encoded into a phase only function, which
can be mathematically expressed as exp[jπ J [g(x0)]],within the range [0,π ] of the phase variation.
Fig 1: Schematic of double image encryption
The resulting function is multiplied by the other primary image f (x0) to obtain the complex
combination signal
0 0 0( ) ( )exp[ [ ( )]]C x f x j J g xπ= (11)
Let us consider R1=exp[jφ1(x0)] and R2=exp[jφ2(xa)] are the two random phase masks,where
φ1(x0) and φ2(xa) are statistically independent white sequences uniformly distributed in [ 0,2π ] . As
shown in Fig 1, C( x0 ) is first multiplied by the first random phase mask R1 , then transformed by
GWFRFT with order α with two 4-D vectors (M1 , N1) , multiplied by the second random phase mask
R2 , and then transformed by GWFRFT with order β with two 4-D vectors (M2 , N2). Thus, we obtain
the final expression of the output encrypted image ψ(xb) , which is given by
2 2 1 1( , ) ( , ) 0 1 0 2( ) {[ ( ( ) [ ( ( )])] [ ( ( )]}b w M N w M N ax F F C x exp j x exp j xβ α
ψ φ φ= ⋅ ⋅ ⊗ ⊗ (12)
Where ⊗ represent the element-by-element multiplication operation of matrices and the
input image for encryption ``f ” is assumed to be real and nonnegative.
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 6, June (2014), pp. 45-52 © IAEME
49
The Decryption shown in Fig 2 is the reverse process of the encryption. For decryption, ψ(xb)
is transformed by the -βth GWFRFT and the resultant function is multiplied by the conjugate of the
second random phase mask R2 , then GWFRFT of order -αth is then applied, resulting in the
following decrypted combination function C(x0) after multiplying by the conjugate of the first
random phase mask R1 i.e.
1 1 2 20 ( , ) ( , ) 1 0 2( ) { [( ( )) [ ( ( )]]} [ ( ( )]w M N w M N b aC x F F x exp j x exp j xα β
ψ φ φ− −
= ⋅ ⋅ ⊗ − ⊗ − (13)
Now the amplitude-based image f (x0)can be simply retrieved from the decoded C(x0)by
taking amplitude, whereas the phase-based image g(x0) requires extracting the phase of C(x0), and
dividing it by π, then taking the inverse pixel scrambling transform denoted by J-1
as shown in Fig 2.
Fig 2: Schematic of double image decryption
3. SIMULATION RESULTS
Computer simulations are performed to verify the proposed encryption technique for double
images. Two types of amplitude image, image of college main gate and college logo (Fig 3), are
serving as the two primary images to be encrypted together. Each of them has a size of 256 × 256
pixels. We use college main gate image as the amplitude-based image f(x0), and college logo image
as the phase-based image g(x0). The two random phase masks, order and 4D vector are as follow(a,
b, c, d) is (0.4,3.8,1.7,2.9) and 4D vector are M1=[ 1309 ], M2=[ 102338 ], M3=[12309],
M4=[42338], N1=[8257], N2=[79464], N 3 =[ 925111 ] , N 4 =[ 79164 ] .
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 6, June (2014), pp. 45-52 © IAEME
50
Then the encrypted and decrypted images are shown in fig 4 and 5 respectively.
Fig 3: Primary Images which are used for encryption
Fig 4: Single encrypted image using double random phase encoding using GWFRFT
Fig 5: Decrypted Images after applying the reverse process
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 6, June (2014), pp. 45-52 © IAEME
51
4. COMPARISION WITH THE EXISTING TECHNOLOGY
Advanced encryption technique is the symmetric key algorithm similar to double image
encryption where we are using the same key for encryption as well as decryption. AES is introduced
in year 2001 and since then it is the standard technique for encryption. AES comes for different key
sizes like 128 bit, 192 bits or 256 bits.
Number of permutations for AES-128 = 2128
Number of permutations for AES-192 = 2192
Now let us calculate the number of permutation required in double image encryption.
Let M1 = [0-63, 0-63, 0-63, 0-63] = [26
, 26
, 26
, 26
]
Similar to M1 other vectors i.e. M2, M3, M4, N1, N2, N3, N4 also can take any value between 0-63.
Number of possible permutations from vectors = (26
)32
= 2192
Now order “a” can take any value between 0-100 with an interval of 0.1 i.e. 0.1 0.2, 0.3, 0.4 and so
on.
So Number of possible permutation for order “a” = 1000 ≈ 210
Number of possible permutation for order “(a, b, c,d )” ≈ 240
So, Total number of possible permutation = 2192
* 240
= 2232
As from this the key size is 232 bits and for this key size AES also require 2232
permutations
so the performance of this encryption technique is comparable to the AES.
5. CONCLUSION
In this paper, a novel approach to implement the image encryption is discussed. As in any
encryption the key which is used for encryption serves an important role means larger the number of
parameters in the key stronger the encryption techniques. So in GWFRFT, order as well as 4D
vectors served as the key making encryption stronger than the encoding in FRFT. To make this
encryption technique more efficient and stronger an encryption technique is proposed in which two
images is converted into a single complex distribution and finally encrypted into a single image. This
proposed encoding technique is successfully implemented for encryption and decryption. And in the
last the double image phase random encoding encryption technique is compared with the advanced
encryption techniques (AES) using the number of permutation required by the eavesdropper to
decode the key in a brute force method of attacking. By this comparison it is clearly shown that
proposed encryption technique is more efficient and robust against any attack.
REFERENCES
[1] V. Namias, “The fractional order Fourier transform and its application to quantum
mechanics,” J. Inst. Math. Appl., vol. 25, 1980, pp. 241–265.
[2] A. W. Lohmann, “Image rotation, Wigner rotation, and the fractional Fourier transform,”
J. Opt. Soc. Am. A 10, 2181- (1993).
[3] C. C. Shih, “Fractionalization of Fourier transform,” Opt. Commun., no. 118,Aug. 1, 1995,
pp. 495–498.
[4] P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane
random encoding,” Opt. Lett., vol. 20, 1995, pp. 767–769.
[5] Ozaktas H M, Arikan O, Kutay M A, et al. Digital computation of the fractional Fourier
transform. IEEE Trans Signal Process, 1996, 44: 2141–2150.
[6] J. Hua, L. Liu, and G. Li, “Extended fractional Fourier transforms,” J. Opt. Soc. Am. A 14,
3316-3322 (1997).
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 6, June (2014), pp. 45-52 © IAEME
52
[7] N. Towghi, B. Javidi, and Z. Luo, “Fully phase encrypted image processor,” J. Opt. Soc. Am. A
16, 1915 (1999).
[8] G. Unnikrishnan and K. Singh, “ Random fractional Fourier domain encoding for optical
security,” Opt. Eng., vol. 39, 2000, pp. 2853–2859.
[9] G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by random phase encoding in the
fractional Fourier domain,” Opt. Lett. 25, 887-889 (2000).
[10] Candan C, Kutay M, Ozaktas H. The discrete fractional Fourier transform. IEEE Trans Signal
Process, 2000, 48: 1329–1337.
[11] H. M. Ozaktas, Z. Zalevsky, and M. A. Kutay “The Fractional Fourier Transform with
Applications in Optics and Signal Processing” New York: Wiley, 2000.
[12] B. Javidi, N. Towghi, N. Maghzi, and S. C. Verrall, “Error-reduction techniques and error
analysis for fully phase- and amplitude-based encryption,” Appl. Opt. 39, 4117–4130 (2000).
[13] N. K. Nishchal, G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption using a localized
fractional Fourier transform,” Opt. Eng. 42, 3566-3571, (2003).
[14] N. K. Nishchal, J. Joseph, and K. Singh, “Fully phase encryption using fractional Fourier
transform,” Opt. Eng. 42, 1583–1588 (2003).
[15] N. K. Nishchal, J. Joseph, and K. Singh, “Fully phase-based encryption using fractional order
Fourier domain random phase encoding: Error analysis,” Opt. Eng. 43, 2266-2273 (2004).
[16] A. Sinha, K. Singh, “Image encryption by using fractional Fourier transform and jigsaw
transform in image bit planes,” Opt. Eng. 44, 057001 (2005).
[17] G. Situ and J. Zhang, “Multiple-image encryption by wavelength multiplexing,” Opt. Lett. 30,
1306-1308 (2005).
[18] J. Zhao, H. Lu, X.S. Song, J.F. Li, and Y.H. Ma, “ Image encryption based on multistage
fractional Fourier transforms and pixel scrambling technique,” Opt. Commun. 249, 493-499,
(2005).
[19] G. Situ and J. Zhang, “Position multiplexing for multiple-image encryption,” J. Opt. A: Pure
Appl. Opt. 8, 391 (2006).
[20] Ozaydin M, Nemati S, Yeary M, et al. Orthogonal projections and discrete fractional Fourier
transforms. In IEEE 12th-Signal Processing Education Workshop, Teton National Park,
Wyoming, 2006. 429–433.
[21] Ran Tao, Yi Xin, and YueWang, “Image encryption based on random phase encoding in the
fractional Fourier domain ,”Optical Express-2007, Vol. 15, No. 24.
[22] Z. Liu and S. Liu, “Double image encryption based on iterative fractional Fourier transform,”
Opt. Commun. 275, 324–329 (2007).
[23] R. Tao, J. Lang, Y. Wang. “Image encryption based on the multiple-parameter fractional Fourier
transform,” Opt. Lett. vol. 33, 2008, pp. 581-583.
[24] Jun LANG , Ran TAO and Yue WANG, “The Generalized Weighted Fractional Fourier
Transform and Its Application to Image Encryption ,” Image and Signal Processing, 2009.
CISP ’09. 2nd International Conference, IEEE, 978-1-4244-4131-0.
[25] Lang J, Tao R, Wang Y. Image encryption based on the multiple-parameter discrete fractional
Fourier transform and chaos function. Opt Comm. 2010, 283: 2092–2096.
[26] Prof. Maher K. Mahmood and Jinan N. Shehab, “Image Encryption and Compression Based on
Compressive Sensing and Chaos”, International journal of Computer Engineering & Technology
(IJCET), Volume 5, Issue 1, 2014, pp. 68 - 84, ISSN Print: 0976 – 6367, ISSN Online:
0976 – 6375.
[27] Vismita Nagrale, Ganesh Zambre and Aamir Agwani,, “Image Stegano-Cryptography Based on
LSB Insertion & Symmetric Key Encryption”, International Journal of Electronics and
Communication Engineering & Technology (IJECET), Volume 2, Issue 1, 2011, pp. 35 - 42,
ISSN Print: 0976- 6464, ISSN Online: 0976 –6472.

Contenu connexe

Tendances

Realizing xor and_xnor_functions_using_tunnel_field-effect_transistors
Realizing xor and_xnor_functions_using_tunnel_field-effect_transistorsRealizing xor and_xnor_functions_using_tunnel_field-effect_transistors
Realizing xor and_xnor_functions_using_tunnel_field-effect_transistorsjoker438417
 
1_VTC_Qian
1_VTC_Qian1_VTC_Qian
1_VTC_QianQian Han
 
DESIGN OF DELAY COMPUTATION METHOD FOR CYCLOTOMIC FAST FOURIER TRANSFORM
DESIGN OF DELAY COMPUTATION METHOD FOR CYCLOTOMIC FAST FOURIER TRANSFORMDESIGN OF DELAY COMPUTATION METHOD FOR CYCLOTOMIC FAST FOURIER TRANSFORM
DESIGN OF DELAY COMPUTATION METHOD FOR CYCLOTOMIC FAST FOURIER TRANSFORMsipij
 
A comparative study on multicast routing using dijkstra’s, prims and ant colo...
A comparative study on multicast routing using dijkstra’s, prims and ant colo...A comparative study on multicast routing using dijkstra’s, prims and ant colo...
A comparative study on multicast routing using dijkstra’s, prims and ant colo...IAEME Publication
 
A comparative study on multicast routing using dijkstra’s
A comparative study on multicast routing using dijkstra’sA comparative study on multicast routing using dijkstra’s
A comparative study on multicast routing using dijkstra’siaemedu
 
An Efficient Multiplierless Transform algorithm for Video Coding
An Efficient Multiplierless Transform algorithm for Video CodingAn Efficient Multiplierless Transform algorithm for Video Coding
An Efficient Multiplierless Transform algorithm for Video CodingCSCJournals
 
Fixed Point Realization of Iterative LR-Aided Soft MIMO Decoding Algorithm
Fixed Point Realization of Iterative LR-Aided Soft MIMO Decoding AlgorithmFixed Point Realization of Iterative LR-Aided Soft MIMO Decoding Algorithm
Fixed Point Realization of Iterative LR-Aided Soft MIMO Decoding AlgorithmCSCJournals
 
論文紹介 Combining Model-Based and Model-Free Updates for Trajectory-Centric Rein...
論文紹介 Combining Model-Based and Model-Free Updates for Trajectory-Centric Rein...論文紹介 Combining Model-Based and Model-Free Updates for Trajectory-Centric Rein...
論文紹介 Combining Model-Based and Model-Free Updates for Trajectory-Centric Rein...Kusano Hitoshi
 
Iaetsd finger print recognition by cordic algorithm and pipelined fft
Iaetsd finger print recognition by cordic algorithm and pipelined fftIaetsd finger print recognition by cordic algorithm and pipelined fft
Iaetsd finger print recognition by cordic algorithm and pipelined fftIaetsd Iaetsd
 
Pilot induced cyclostationarity based method for dvb system identification
Pilot induced cyclostationarity based method for dvb system identificationPilot induced cyclostationarity based method for dvb system identification
Pilot induced cyclostationarity based method for dvb system identificationiaemedu
 
Performance Analysis of OFDM Transceiver with Folded FFT and LMS Filter
Performance Analysis of OFDM Transceiver with Folded FFT and LMS FilterPerformance Analysis of OFDM Transceiver with Folded FFT and LMS Filter
Performance Analysis of OFDM Transceiver with Folded FFT and LMS Filteridescitation
 
Physical security layer with friendly jammer in half-duplex relaying networks...
Physical security layer with friendly jammer in half-duplex relaying networks...Physical security layer with friendly jammer in half-duplex relaying networks...
Physical security layer with friendly jammer in half-duplex relaying networks...journalBEEI
 
FURTHER RESULTS ON THE DIRAC DELTA APPROXIMATION AND THE MOMENT GENERATING FU...
FURTHER RESULTS ON THE DIRAC DELTA APPROXIMATION AND THE MOMENT GENERATING FU...FURTHER RESULTS ON THE DIRAC DELTA APPROXIMATION AND THE MOMENT GENERATING FU...
FURTHER RESULTS ON THE DIRAC DELTA APPROXIMATION AND THE MOMENT GENERATING FU...IJCNC
 

Tendances (17)

Realizing xor and_xnor_functions_using_tunnel_field-effect_transistors
Realizing xor and_xnor_functions_using_tunnel_field-effect_transistorsRealizing xor and_xnor_functions_using_tunnel_field-effect_transistors
Realizing xor and_xnor_functions_using_tunnel_field-effect_transistors
 
1_VTC_Qian
1_VTC_Qian1_VTC_Qian
1_VTC_Qian
 
DESIGN OF DELAY COMPUTATION METHOD FOR CYCLOTOMIC FAST FOURIER TRANSFORM
DESIGN OF DELAY COMPUTATION METHOD FOR CYCLOTOMIC FAST FOURIER TRANSFORMDESIGN OF DELAY COMPUTATION METHOD FOR CYCLOTOMIC FAST FOURIER TRANSFORM
DESIGN OF DELAY COMPUTATION METHOD FOR CYCLOTOMIC FAST FOURIER TRANSFORM
 
A comparative study on multicast routing using dijkstra’s, prims and ant colo...
A comparative study on multicast routing using dijkstra’s, prims and ant colo...A comparative study on multicast routing using dijkstra’s, prims and ant colo...
A comparative study on multicast routing using dijkstra’s, prims and ant colo...
 
A comparative study on multicast routing using dijkstra’s
A comparative study on multicast routing using dijkstra’sA comparative study on multicast routing using dijkstra’s
A comparative study on multicast routing using dijkstra’s
 
An Efficient Multiplierless Transform algorithm for Video Coding
An Efficient Multiplierless Transform algorithm for Video CodingAn Efficient Multiplierless Transform algorithm for Video Coding
An Efficient Multiplierless Transform algorithm for Video Coding
 
Fixed Point Realization of Iterative LR-Aided Soft MIMO Decoding Algorithm
Fixed Point Realization of Iterative LR-Aided Soft MIMO Decoding AlgorithmFixed Point Realization of Iterative LR-Aided Soft MIMO Decoding Algorithm
Fixed Point Realization of Iterative LR-Aided Soft MIMO Decoding Algorithm
 
論文紹介 Combining Model-Based and Model-Free Updates for Trajectory-Centric Rein...
論文紹介 Combining Model-Based and Model-Free Updates for Trajectory-Centric Rein...論文紹介 Combining Model-Based and Model-Free Updates for Trajectory-Centric Rein...
論文紹介 Combining Model-Based and Model-Free Updates for Trajectory-Centric Rein...
 
Hm2513521357
Hm2513521357Hm2513521357
Hm2513521357
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Iaetsd finger print recognition by cordic algorithm and pipelined fft
Iaetsd finger print recognition by cordic algorithm and pipelined fftIaetsd finger print recognition by cordic algorithm and pipelined fft
Iaetsd finger print recognition by cordic algorithm and pipelined fft
 
Pilot induced cyclostationarity based method for dvb system identification
Pilot induced cyclostationarity based method for dvb system identificationPilot induced cyclostationarity based method for dvb system identification
Pilot induced cyclostationarity based method for dvb system identification
 
Performance Analysis of OFDM Transceiver with Folded FFT and LMS Filter
Performance Analysis of OFDM Transceiver with Folded FFT and LMS FilterPerformance Analysis of OFDM Transceiver with Folded FFT and LMS Filter
Performance Analysis of OFDM Transceiver with Folded FFT and LMS Filter
 
Physical security layer with friendly jammer in half-duplex relaying networks...
Physical security layer with friendly jammer in half-duplex relaying networks...Physical security layer with friendly jammer in half-duplex relaying networks...
Physical security layer with friendly jammer in half-duplex relaying networks...
 
Vertex frequency
Vertex frequencyVertex frequency
Vertex frequency
 
FURTHER RESULTS ON THE DIRAC DELTA APPROXIMATION AND THE MOMENT GENERATING FU...
FURTHER RESULTS ON THE DIRAC DELTA APPROXIMATION AND THE MOMENT GENERATING FU...FURTHER RESULTS ON THE DIRAC DELTA APPROXIMATION AND THE MOMENT GENERATING FU...
FURTHER RESULTS ON THE DIRAC DELTA APPROXIMATION AND THE MOMENT GENERATING FU...
 
Fx3111501156
Fx3111501156Fx3111501156
Fx3111501156
 

En vedette

UN Joint Program on Fostering and Enabling Environment for Gender Equality in...
UN Joint Program on Fostering and Enabling Environment for Gender Equality in...UN Joint Program on Fostering and Enabling Environment for Gender Equality in...
UN Joint Program on Fostering and Enabling Environment for Gender Equality in...UNDP Türkiye
 
Ata enege xxxv enegeo
Ata enege xxxv enegeoAta enege xxxv enegeo
Ata enege xxxv enegeoenege
 
Stress reduction using semi elliptical slots in axially loaded plate having c...
Stress reduction using semi elliptical slots in axially loaded plate having c...Stress reduction using semi elliptical slots in axially loaded plate having c...
Stress reduction using semi elliptical slots in axially loaded plate having c...IAEME Publication
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
 
ODD EVEN BASED BINARY SEARCH
ODD EVEN BASED BINARY SEARCHODD EVEN BASED BINARY SEARCH
ODD EVEN BASED BINARY SEARCHIAEME Publication
 

En vedette (10)

20120140506024
2012014050602420120140506024
20120140506024
 
UN Joint Program on Fostering and Enabling Environment for Gender Equality in...
UN Joint Program on Fostering and Enabling Environment for Gender Equality in...UN Joint Program on Fostering and Enabling Environment for Gender Equality in...
UN Joint Program on Fostering and Enabling Environment for Gender Equality in...
 
Ata enege xxxv enegeo
Ata enege xxxv enegeoAta enege xxxv enegeo
Ata enege xxxv enegeo
 
50120140506014
5012014050601450120140506014
50120140506014
 
50120140506004
5012014050600450120140506004
50120140506004
 
Stress reduction using semi elliptical slots in axially loaded plate having c...
Stress reduction using semi elliptical slots in axially loaded plate having c...Stress reduction using semi elliptical slots in axially loaded plate having c...
Stress reduction using semi elliptical slots in axially loaded plate having c...
 
20120140506005
2012014050600520120140506005
20120140506005
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
 
ODD EVEN BASED BINARY SEARCH
ODD EVEN BASED BINARY SEARCHODD EVEN BASED BINARY SEARCH
ODD EVEN BASED BINARY SEARCH
 
Ijmet 07 06_005
Ijmet 07 06_005Ijmet 07 06_005
Ijmet 07 06_005
 

Similaire à 20120140506008 2

Key exchange based on Diffie-Hellman protocol and image registration
Key exchange based on Diffie-Hellman protocol and image  registrationKey exchange based on Diffie-Hellman protocol and image  registration
Key exchange based on Diffie-Hellman protocol and image registrationnooriasukmaningtyas
 
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)IJNSA Journal
 
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)IJNSA Journal
 
Iaetsd computational performances of ofdm using
Iaetsd computational performances of ofdm usingIaetsd computational performances of ofdm using
Iaetsd computational performances of ofdm usingIaetsd Iaetsd
 
PERFORMANCE EVALUATIONS OF GRIORYAN FFT AND COOLEY-TUKEY FFT ONTO XILINX VIRT...
PERFORMANCE EVALUATIONS OF GRIORYAN FFT AND COOLEY-TUKEY FFT ONTO XILINX VIRT...PERFORMANCE EVALUATIONS OF GRIORYAN FFT AND COOLEY-TUKEY FFT ONTO XILINX VIRT...
PERFORMANCE EVALUATIONS OF GRIORYAN FFT AND COOLEY-TUKEY FFT ONTO XILINX VIRT...cscpconf
 
Performance evaluations of grioryan fft and cooley tukey fft onto xilinx virt...
Performance evaluations of grioryan fft and cooley tukey fft onto xilinx virt...Performance evaluations of grioryan fft and cooley tukey fft onto xilinx virt...
Performance evaluations of grioryan fft and cooley tukey fft onto xilinx virt...csandit
 
Implementation Of Grigoryan FFT For Its Performance Case Study Over Cooley-Tu...
Implementation Of Grigoryan FFT For Its Performance Case Study Over Cooley-Tu...Implementation Of Grigoryan FFT For Its Performance Case Study Over Cooley-Tu...
Implementation Of Grigoryan FFT For Its Performance Case Study Over Cooley-Tu...ijma
 
The fourier transform for satellite image compression
The fourier transform for satellite image compressionThe fourier transform for satellite image compression
The fourier transform for satellite image compressioncsandit
 
Image encryption technique incorporating wavelet transform and hash integrity
Image encryption technique incorporating wavelet transform and hash integrityImage encryption technique incorporating wavelet transform and hash integrity
Image encryption technique incorporating wavelet transform and hash integrityeSAT Journals
 
Color image analyses using four deferent transformations
Color image analyses using four deferent transformationsColor image analyses using four deferent transformations
Color image analyses using four deferent transformationsAlexander Decker
 
Color image analyses using four deferent transformations
Color image analyses using four deferent transformationsColor image analyses using four deferent transformations
Color image analyses using four deferent transformationsAlexander Decker
 
THE FOURIER TRANSFORM FOR SATELLITE IMAGE COMPRESSION
THE FOURIER TRANSFORM FOR SATELLITE IMAGE COMPRESSIONTHE FOURIER TRANSFORM FOR SATELLITE IMAGE COMPRESSION
THE FOURIER TRANSFORM FOR SATELLITE IMAGE COMPRESSIONcscpconf
 
Text file encryption using fft technique in lab view 8.6
Text file encryption using fft technique in lab view 8.6Text file encryption using fft technique in lab view 8.6
Text file encryption using fft technique in lab view 8.6eSAT Publishing House
 
Text file encryption using fft technique in lab view 8.6
Text file encryption using fft technique in lab view 8.6Text file encryption using fft technique in lab view 8.6
Text file encryption using fft technique in lab view 8.6eSAT Journals
 
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...ijistjournal
 
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...ijistjournal
 
Steganographic Scheme Based on Message-Cover matching
Steganographic Scheme Based on Message-Cover matchingSteganographic Scheme Based on Message-Cover matching
Steganographic Scheme Based on Message-Cover matchingIJECEIAES
 

Similaire à 20120140506008 2 (20)

Key exchange based on Diffie-Hellman protocol and image registration
Key exchange based on Diffie-Hellman protocol and image  registrationKey exchange based on Diffie-Hellman protocol and image  registration
Key exchange based on Diffie-Hellman protocol and image registration
 
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)
 
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)
 
Iaetsd computational performances of ofdm using
Iaetsd computational performances of ofdm usingIaetsd computational performances of ofdm using
Iaetsd computational performances of ofdm using
 
PERFORMANCE EVALUATIONS OF GRIORYAN FFT AND COOLEY-TUKEY FFT ONTO XILINX VIRT...
PERFORMANCE EVALUATIONS OF GRIORYAN FFT AND COOLEY-TUKEY FFT ONTO XILINX VIRT...PERFORMANCE EVALUATIONS OF GRIORYAN FFT AND COOLEY-TUKEY FFT ONTO XILINX VIRT...
PERFORMANCE EVALUATIONS OF GRIORYAN FFT AND COOLEY-TUKEY FFT ONTO XILINX VIRT...
 
Performance evaluations of grioryan fft and cooley tukey fft onto xilinx virt...
Performance evaluations of grioryan fft and cooley tukey fft onto xilinx virt...Performance evaluations of grioryan fft and cooley tukey fft onto xilinx virt...
Performance evaluations of grioryan fft and cooley tukey fft onto xilinx virt...
 
Implementation Of Grigoryan FFT For Its Performance Case Study Over Cooley-Tu...
Implementation Of Grigoryan FFT For Its Performance Case Study Over Cooley-Tu...Implementation Of Grigoryan FFT For Its Performance Case Study Over Cooley-Tu...
Implementation Of Grigoryan FFT For Its Performance Case Study Over Cooley-Tu...
 
The fourier transform for satellite image compression
The fourier transform for satellite image compressionThe fourier transform for satellite image compression
The fourier transform for satellite image compression
 
Image encryption technique incorporating wavelet transform and hash integrity
Image encryption technique incorporating wavelet transform and hash integrityImage encryption technique incorporating wavelet transform and hash integrity
Image encryption technique incorporating wavelet transform and hash integrity
 
40120140501004
4012014050100440120140501004
40120140501004
 
40120140501004
4012014050100440120140501004
40120140501004
 
Color image analyses using four deferent transformations
Color image analyses using four deferent transformationsColor image analyses using four deferent transformations
Color image analyses using four deferent transformations
 
Color image analyses using four deferent transformations
Color image analyses using four deferent transformationsColor image analyses using four deferent transformations
Color image analyses using four deferent transformations
 
THE FOURIER TRANSFORM FOR SATELLITE IMAGE COMPRESSION
THE FOURIER TRANSFORM FOR SATELLITE IMAGE COMPRESSIONTHE FOURIER TRANSFORM FOR SATELLITE IMAGE COMPRESSION
THE FOURIER TRANSFORM FOR SATELLITE IMAGE COMPRESSION
 
Text file encryption using fft technique in lab view 8.6
Text file encryption using fft technique in lab view 8.6Text file encryption using fft technique in lab view 8.6
Text file encryption using fft technique in lab view 8.6
 
Text file encryption using fft technique in lab view 8.6
Text file encryption using fft technique in lab view 8.6Text file encryption using fft technique in lab view 8.6
Text file encryption using fft technique in lab view 8.6
 
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
 
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
 
Steganographic Scheme Based on Message-Cover matching
Steganographic Scheme Based on Message-Cover matchingSteganographic Scheme Based on Message-Cover matching
Steganographic Scheme Based on Message-Cover matching
 
40120140503001 2-3
40120140503001 2-340120140503001 2-3
40120140503001 2-3
 

Plus de IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

Plus de IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Dernier

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 

Dernier (20)

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 

20120140506008 2

  • 1. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 6, June (2014), pp. 45-52 © IAEME 45 EFFICIENT WAY OF IMAGE ENCRYPTION USING GENERALIZED WEIGHTED FRACTIONAL FOURIER TRANSFORM WITH DOUBLE RANDOM PHASE ENCODING Priyanka Chauhan1 , Girish Chandra Thakur2 M. Tech. Scholar1 , Associate Professor2 , Dept. of Electronics & Communication Engg., Institute of Engineering & Technology, Alwar-301030 (Raj.), India ABSTRACT Data transfer between the users over different network technologies is increasing day by day. With the data transfer, concern about the information theft by any eavesdropper is also increasing. To prevent this information theft, our information is converted in to unreadable form using some algorithm and it can only be converted into readable form using key. This process of conversion the information into secured form is called encryption. At present information transfer is also in the form of images. In this paper we are going to discuss some of the methods of encrypting the images. In any encryption technique, the major role is played by its key i.e. larger the number of parameters in the key stronger is the encryption technique. So in the thesis we will develop the GWFRFT which is based on the properties of conventional FRFT and discuss random phase encoding technique in FRFT domain. Then study random phase encoding technique in GWFRFT domain. And at last to make the scheme more efficient and strong we encrypt two images in to single image. Keywords: Encryption, FRFT, FT, GWFRFT, Image. 1. INTRODUCTION In cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called a cipher) to make it unreadable to anyone except those possessing extra ordinary information, more often than not referred to while a key. This product of the process is encrypted in order in cryptography, referred to cipher text. The invalidate process, i.e., to make the encrypted information readable again, is referred to as decryption (i.e. to make it unencrypted). In recent years there have been numerous reports of confidential data such as INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND TECHNOLOGY (IJARET) ISSN 0976 - 6480 (Print) ISSN 0976 - 6499 (Online) Volume 5, Issue 6, June (2014), pp. 45-52 © IAEME: http://www.iaeme.com/IJARET.asp Journal Impact Factor (2014): 7.8273 (Calculated by GISI) www.jifactor.com IJARET © I A E M E
  • 2. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 6, June (2014), pp. 45-52 © IAEME 46 customers’ personal records being exposed through loss or theft of laptops or endorsement drives. Encrypting like files at rest help guard them should physical security events fail. Digital liberties organization systems which prevent unauthorized use or reproduction of copyrighted material and protect software against reverse engineering (see also copy protection) are another somewhat different example of using encryption on data at rest. There have been numerous reports of data in transit being intercepted in current years. Encrypting information in shipment also helps to secure it as it is often difficult to physically secure all access to networks. In this paper we are using Generalized Weighted Fractional Fourier Transform with random phase encoding technique for the encryption of two images in to single image. GWFRFT will be derived from the FRFT. The fractional Fourier transform (FRFT) is a superset of the Fourier transform and has been applied in optics, quantum mechanics, and signal processing areas [15,20,21].In this paper, we discuss a generalized weighted fractional Fourier transform (GWFRFT) which is weighted sum of the integer order fractional Fourier transform. 2. DEFINITION OF FRFT AND GWFRFT FRFT is a generalization of FT [1, 13]. It is not only richer in theory and more flexible in application, but is also not expensive in implementation. It is a powerful tool for the analysis of time- varying signals. With the advent of FRFT and related concepts, it is seen that the properties and applications of the conventional FT are special cases of those of the FRFT. However, in every area where FT and frequency domain concepts are used, there exists the potential for generalization and implementation by using FRFT. Mathematically, α th order FRFT is the α th power of FT operator. Hence α th order FRFT of any signal 2 ( ) ( )s t L R∈ is given by [ ( )] ( ) ( ; , )F s t s t K t dtα α ω +∞ −∞ = ∫ (1) Where 2 2 ( ; , ) ( )exp[( ( ) ( ) ( ) )]K t K B C t B tα ω α α ω α ω α= − + (2) Is the kernel of Fα , α is the fraction, and [1 cot( )] ( ) 2 j K α α π − = (3) ( ) cot( )B α α= (4) 1 ( ) sin( ) C α α = (5) 2 aπ α = (6)
  • 3. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 6, June (2014), pp. 45-52 © IAEME 47 For integer values of α it can be deduced that any fractional Fourier transform repeat itself at an interval of 4 that can be shown as 4 [ ( )] [ ( )]m l l F s t F s t+ = (7) Where m is any integer and l can be any real number. As we discussed the periodic nature of integral order fractional Fourier transform in the previous chapter i.e. integer order fractional Fourier transform is periodic with period 4. So now it is given that α th order FRFT of any signal can be represented in terms of these four integral order FRFT i.e. 0 1 2 3 0 1 2 3[ ( )] ( ) [ ( )] ( ) [ ( )] ( ) [ ( )] ( ) [ ( )]wF s t A F s t A F s t A F s t A F s tα α α α α= + + + (8) Where the coefficients ( )lA α , l = 0,1,2,3 are continuous functions ofα . Generalized weighted fractional Fourier transform obeys the following axioms. I. Continuity axiom: 2 2 : ( ) ( )wF L R L Rα → is continuous in fractional order α . II. Boundary axiom: wFα degenerates into Fα when α is an integer multiple of 2 π or α is an integer. i.e. for integer order the weighted fraction Fourier transform reduces into the normal Fourier transform of signal s(t ) or the signal itself. For different integer values of order a, the values of weighted coefficient is shown in the Table 1. III. Additive axiom: For real numbers α and β , the GWFRFT operator wFα has the following additive property w w w w wF F F F Fα β β α α β+ = = (9) So using these properties and calculating the value of coefficient ( )lA α the final equation of generalized weighted fractional Fourier transform comes out to be 3 3 ( , ) 0 0 [ ( )] exp{( 2 / 4)[(4 1) (4 ) ]} [ ( )]l w M N k k l k F s t j m n k kl F s tα π α = = = − + + −∑∑ (10) A(or α) A0 A1 A2 A3 0 (or 0) 1 0 0 0 1 (or π/2) 0 1 0 0 2 (or π) 0 0 1 0 3 (or 3π/2) 0 0 0 1
  • 4. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 6, June (2014), pp. 45-52 © IAEME 48 3. PROPOSED IDEA OF DOUBLE IMAGE ENCRYPTION BASED ON RANDOM PHASE ENCODING USING GWFRFT Most of the encryption techniques in the literature are dealing with a single amplitude image (i.e. binary text, grayscale or color image). However, in somecases, one need to encrypt two images with certain relations such as two pictures of an object or a picture and its binary text for description, etc., which are often stored or transmitted together. Encrypting the two images directly using the single-image encryption algorithms mentioned in the literature results in two separate encrypted images with random noise distribution, and sometimes, there arises the difficulty in distinguishing between them before decryption and the decryption has to be conducted twice to recover the two images. Multiple images can also be encrypted by using wavelength multiplexing [18] or position multiplexing methods [21], but the qualities of decrypted images are not perfect due to the cross-talk effects between images. Inspired by the architecture of the fully phase encoding [2, 17] and pixel scrambling (random shifting) techniques [18, 20]. The schematic of a method which can convert two images into one encrypted image based on the random phase encoding in the generalized weighted fractional Fourier domain is given in Fig 1. Let f (x0) and g(x0) represent the two primary normalized amplitude images to be encrypted together, J denotes the pixel scrambling operation [20], which interchanges the pixels according to some random permutation, and the image can be retrieved by repositioning the disturbed image according to the special order. For encryption, the pixel scrambling is applied to one of the primary images g(x0), and then, the scrambled result J [g(x0)] is encoded into a phase only function, which can be mathematically expressed as exp[jπ J [g(x0)]],within the range [0,π ] of the phase variation. Fig 1: Schematic of double image encryption The resulting function is multiplied by the other primary image f (x0) to obtain the complex combination signal 0 0 0( ) ( )exp[ [ ( )]]C x f x j J g xπ= (11) Let us consider R1=exp[jφ1(x0)] and R2=exp[jφ2(xa)] are the two random phase masks,where φ1(x0) and φ2(xa) are statistically independent white sequences uniformly distributed in [ 0,2π ] . As shown in Fig 1, C( x0 ) is first multiplied by the first random phase mask R1 , then transformed by GWFRFT with order α with two 4-D vectors (M1 , N1) , multiplied by the second random phase mask R2 , and then transformed by GWFRFT with order β with two 4-D vectors (M2 , N2). Thus, we obtain the final expression of the output encrypted image ψ(xb) , which is given by 2 2 1 1( , ) ( , ) 0 1 0 2( ) {[ ( ( ) [ ( ( )])] [ ( ( )]}b w M N w M N ax F F C x exp j x exp j xβ α ψ φ φ= ⋅ ⋅ ⊗ ⊗ (12) Where ⊗ represent the element-by-element multiplication operation of matrices and the input image for encryption ``f ” is assumed to be real and nonnegative.
  • 5. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 6, June (2014), pp. 45-52 © IAEME 49 The Decryption shown in Fig 2 is the reverse process of the encryption. For decryption, ψ(xb) is transformed by the -βth GWFRFT and the resultant function is multiplied by the conjugate of the second random phase mask R2 , then GWFRFT of order -αth is then applied, resulting in the following decrypted combination function C(x0) after multiplying by the conjugate of the first random phase mask R1 i.e. 1 1 2 20 ( , ) ( , ) 1 0 2( ) { [( ( )) [ ( ( )]]} [ ( ( )]w M N w M N b aC x F F x exp j x exp j xα β ψ φ φ− − = ⋅ ⋅ ⊗ − ⊗ − (13) Now the amplitude-based image f (x0)can be simply retrieved from the decoded C(x0)by taking amplitude, whereas the phase-based image g(x0) requires extracting the phase of C(x0), and dividing it by π, then taking the inverse pixel scrambling transform denoted by J-1 as shown in Fig 2. Fig 2: Schematic of double image decryption 3. SIMULATION RESULTS Computer simulations are performed to verify the proposed encryption technique for double images. Two types of amplitude image, image of college main gate and college logo (Fig 3), are serving as the two primary images to be encrypted together. Each of them has a size of 256 × 256 pixels. We use college main gate image as the amplitude-based image f(x0), and college logo image as the phase-based image g(x0). The two random phase masks, order and 4D vector are as follow(a, b, c, d) is (0.4,3.8,1.7,2.9) and 4D vector are M1=[ 1309 ], M2=[ 102338 ], M3=[12309], M4=[42338], N1=[8257], N2=[79464], N 3 =[ 925111 ] , N 4 =[ 79164 ] .
  • 6. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 6, June (2014), pp. 45-52 © IAEME 50 Then the encrypted and decrypted images are shown in fig 4 and 5 respectively. Fig 3: Primary Images which are used for encryption Fig 4: Single encrypted image using double random phase encoding using GWFRFT Fig 5: Decrypted Images after applying the reverse process
  • 7. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 6, June (2014), pp. 45-52 © IAEME 51 4. COMPARISION WITH THE EXISTING TECHNOLOGY Advanced encryption technique is the symmetric key algorithm similar to double image encryption where we are using the same key for encryption as well as decryption. AES is introduced in year 2001 and since then it is the standard technique for encryption. AES comes for different key sizes like 128 bit, 192 bits or 256 bits. Number of permutations for AES-128 = 2128 Number of permutations for AES-192 = 2192 Now let us calculate the number of permutation required in double image encryption. Let M1 = [0-63, 0-63, 0-63, 0-63] = [26 , 26 , 26 , 26 ] Similar to M1 other vectors i.e. M2, M3, M4, N1, N2, N3, N4 also can take any value between 0-63. Number of possible permutations from vectors = (26 )32 = 2192 Now order “a” can take any value between 0-100 with an interval of 0.1 i.e. 0.1 0.2, 0.3, 0.4 and so on. So Number of possible permutation for order “a” = 1000 ≈ 210 Number of possible permutation for order “(a, b, c,d )” ≈ 240 So, Total number of possible permutation = 2192 * 240 = 2232 As from this the key size is 232 bits and for this key size AES also require 2232 permutations so the performance of this encryption technique is comparable to the AES. 5. CONCLUSION In this paper, a novel approach to implement the image encryption is discussed. As in any encryption the key which is used for encryption serves an important role means larger the number of parameters in the key stronger the encryption techniques. So in GWFRFT, order as well as 4D vectors served as the key making encryption stronger than the encoding in FRFT. To make this encryption technique more efficient and stronger an encryption technique is proposed in which two images is converted into a single complex distribution and finally encrypted into a single image. This proposed encoding technique is successfully implemented for encryption and decryption. And in the last the double image phase random encoding encryption technique is compared with the advanced encryption techniques (AES) using the number of permutation required by the eavesdropper to decode the key in a brute force method of attacking. By this comparison it is clearly shown that proposed encryption technique is more efficient and robust against any attack. REFERENCES [1] V. Namias, “The fractional order Fourier transform and its application to quantum mechanics,” J. Inst. Math. Appl., vol. 25, 1980, pp. 241–265. [2] A. W. Lohmann, “Image rotation, Wigner rotation, and the fractional Fourier transform,” J. Opt. Soc. Am. A 10, 2181- (1993). [3] C. C. Shih, “Fractionalization of Fourier transform,” Opt. Commun., no. 118,Aug. 1, 1995, pp. 495–498. [4] P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett., vol. 20, 1995, pp. 767–769. [5] Ozaktas H M, Arikan O, Kutay M A, et al. Digital computation of the fractional Fourier transform. IEEE Trans Signal Process, 1996, 44: 2141–2150. [6] J. Hua, L. Liu, and G. Li, “Extended fractional Fourier transforms,” J. Opt. Soc. Am. A 14, 3316-3322 (1997).
  • 8. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 6, June (2014), pp. 45-52 © IAEME 52 [7] N. Towghi, B. Javidi, and Z. Luo, “Fully phase encrypted image processor,” J. Opt. Soc. Am. A 16, 1915 (1999). [8] G. Unnikrishnan and K. Singh, “ Random fractional Fourier domain encoding for optical security,” Opt. Eng., vol. 39, 2000, pp. 2853–2859. [9] G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887-889 (2000). [10] Candan C, Kutay M, Ozaktas H. The discrete fractional Fourier transform. IEEE Trans Signal Process, 2000, 48: 1329–1337. [11] H. M. Ozaktas, Z. Zalevsky, and M. A. Kutay “The Fractional Fourier Transform with Applications in Optics and Signal Processing” New York: Wiley, 2000. [12] B. Javidi, N. Towghi, N. Maghzi, and S. C. Verrall, “Error-reduction techniques and error analysis for fully phase- and amplitude-based encryption,” Appl. Opt. 39, 4117–4130 (2000). [13] N. K. Nishchal, G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption using a localized fractional Fourier transform,” Opt. Eng. 42, 3566-3571, (2003). [14] N. K. Nishchal, J. Joseph, and K. Singh, “Fully phase encryption using fractional Fourier transform,” Opt. Eng. 42, 1583–1588 (2003). [15] N. K. Nishchal, J. Joseph, and K. Singh, “Fully phase-based encryption using fractional order Fourier domain random phase encoding: Error analysis,” Opt. Eng. 43, 2266-2273 (2004). [16] A. Sinha, K. Singh, “Image encryption by using fractional Fourier transform and jigsaw transform in image bit planes,” Opt. Eng. 44, 057001 (2005). [17] G. Situ and J. Zhang, “Multiple-image encryption by wavelength multiplexing,” Opt. Lett. 30, 1306-1308 (2005). [18] J. Zhao, H. Lu, X.S. Song, J.F. Li, and Y.H. Ma, “ Image encryption based on multistage fractional Fourier transforms and pixel scrambling technique,” Opt. Commun. 249, 493-499, (2005). [19] G. Situ and J. Zhang, “Position multiplexing for multiple-image encryption,” J. Opt. A: Pure Appl. Opt. 8, 391 (2006). [20] Ozaydin M, Nemati S, Yeary M, et al. Orthogonal projections and discrete fractional Fourier transforms. In IEEE 12th-Signal Processing Education Workshop, Teton National Park, Wyoming, 2006. 429–433. [21] Ran Tao, Yi Xin, and YueWang, “Image encryption based on random phase encoding in the fractional Fourier domain ,”Optical Express-2007, Vol. 15, No. 24. [22] Z. Liu and S. Liu, “Double image encryption based on iterative fractional Fourier transform,” Opt. Commun. 275, 324–329 (2007). [23] R. Tao, J. Lang, Y. Wang. “Image encryption based on the multiple-parameter fractional Fourier transform,” Opt. Lett. vol. 33, 2008, pp. 581-583. [24] Jun LANG , Ran TAO and Yue WANG, “The Generalized Weighted Fractional Fourier Transform and Its Application to Image Encryption ,” Image and Signal Processing, 2009. CISP ’09. 2nd International Conference, IEEE, 978-1-4244-4131-0. [25] Lang J, Tao R, Wang Y. Image encryption based on the multiple-parameter discrete fractional Fourier transform and chaos function. Opt Comm. 2010, 283: 2092–2096. [26] Prof. Maher K. Mahmood and Jinan N. Shehab, “Image Encryption and Compression Based on Compressive Sensing and Chaos”, International journal of Computer Engineering & Technology (IJCET), Volume 5, Issue 1, 2014, pp. 68 - 84, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [27] Vismita Nagrale, Ganesh Zambre and Aamir Agwani,, “Image Stegano-Cryptography Based on LSB Insertion & Symmetric Key Encryption”, International Journal of Electronics and Communication Engineering & Technology (IJECET), Volume 2, Issue 1, 2011, pp. 35 - 42, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472.