ThesisBook-Chapter 1

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

1.

1 Introduction
In recent years Data privacy is one of the most concerned issues. In this
era of super-fast technology, we are always using Smart phones, Digital Camera,
Laptops and many other digital devices. We are very much dependent on data and
information processing, because the internet has made almost every impossible
think possible nowadays. We are processing thousand of data by just clicking the
screens or pressing some keys. The concept of global village has become so
popular, sharing of data is now very easy, simpler and faster than before. As we are
sharing thousands of data every day, the privacy is becoming the biggest concern
of information and communication technology. Every smart phone is having very
high-quality digital camera due to this easy access to multimedia technology our
day-to-day tasks are now more on image and video based instead of texts. Images
are an integral part of our life. It has become customary to record occasions
through images. We use CT scans and MRI images for diagnosis of abnormal
symptoms. Often, patients seek second opinion and face with the problem of
maintaining privacy as well as secure transmission of their CT or MRI images.
Military and medical images can be confidential and must be kept out of the reach
of unauthorized users [1]. So as its most common and important means of data
nowadays, to protect the privacy of the user’s protection of multimedia data is very
important. In order to protect multimedia data, we have to do “Image Encryption”.
Image encryption is a hiding of information. An original important and
confidential plaintext is converted into cipher text that is apparently random
nonsense. This cipher text can be saved or transmitted over the network. At the
receiver, the cipher text can be transformed back into the original plaintext by
using a decryption algorithm [2].
In the security system of digital information, encryption technology is a very
common technique and method. In this technology we use some fixed method to
encrypt an image or data to ensure the security by replacing it with a non-readable
data which can be again decrypt or restored by a fixed method of decryption. The
history of data inception is so long. As the importance of data security was always
there from the starting of human civilization. If we start from the beginning There
are several possibilities to exactly how encryption first started, but it is known that
it did start in ancient Egypt. One of the beliefs of how encryption started is that the
Egyptian wished to preserve the secrecy of the religious rituals from the casual
observer or another reason is it might have been a political move to promote their
religion. Then again it might have been to give their scripts/documents a formal
appearance, unfortunately we will never know [3]. There is many abidance of data
encryption or be more specific cryptography was found in Geake, spartan and
another ancient human civilization. If we come to modern human civilization in
world wars the cryptography played a very important role. In 1932 Polish
cryptographer “Marian Rejewski” discovered how Enigma (a thing that is
mysterious or difficult to understand) works. In 1939, Poland shared this
information with the French and British intelligence services, allowing
cryptographers like Alan Turing to figure out how to crack the key, which changes
daily. It proved crucial to the Allies' World War II victory. In 1945 Claude E.
Shannon of Bell Labs published an article called "A mathematical theory of
cryptography." It's the starting point of modern cryptography. After that, in the
early 1970s, IBM formed a 'crypto group,' which designed a block cypher to
protect its customers' data. In 1973, the US adopted it as a national standard - the
Data Encryption Standard, or DES. It remained in use until it cracked in 1997 [4].
Many technologies and methods of image encryption developed in the modern day.
There are many advance technologies of image encryption exist now which are
maybe easier process than before and more secure. So, if we want to mention some
image encryption technique to have an introduction with them, they are [1]:
 Chaos-Based Encryption.
 Arnold Transform.
 DNA Sequence Operation.
 Rubik Cube Transform.
 Fractional Fourier Transform.
 Elliptic Curve and Advanced Encryption System.
 Wavelet Transform.
 Using Artificial Neural Networks.
 Using Henon Map.
 Using generalized Vigenére-type table in Virtual Planet Domain.

Chaos communications is application of chaos theory which is to provide security


in the transmission of information. Chaos theory describes the behavior of certain
nonlinear dynamic system that under specific conditions exhibit dynamics that are
sensitive to initial conditions. Properties of chaotic systems are the sensitivity to
initial conditions. A large number of uncorrelated, random, deterministic signals
can be generated by changing initial values to system [2].
A Neural network is a machine that is designed to represent the way in which brain
performs any particular task. The network is implemented by using electronic
components or is simulated in software on a digital computer. The input images are
encrypted with an encryption function on Artificial Neural Network and that
images are decrypted using another ANN at receiver side in order to attain the
initial image.[2]
As mentioned, earlier there are many image encryption systems and methods like
simple symmetric key encryption algorithms or chaotic based or artificial Neural
Network based, each of them has their own advantages and limitations. Neural
networks are now being used in almost every field. This can be attributed to its
learning nature and accuracy. This method proposed by Yousef, Karim, Nooshin
aims at taking advantage of chaotic systems and neural networks by combining
them into a single platform for image encryption. The input image is fed into a
chaotic neural layer in which methods like Chua and Liu systems are employed to
bring the chaotic behavior. The output is then fed into a permutation neural
network where a nonlinear mapping is performed to obtain the final encrypted
output. The decryption phase is the inverse of the encryption phase. The entropy of
the resulting image is high, and the histograms of the original and encrypted image
bear no resemblance. The only limitation of this method is that it is difficult to
implement [1].
In software on a digital computer. A neural network is a massively parallel
distributed processor made up of simple processing units, which has a natural
propensity for storing experimental knowledge and making it available for use. It
resembles the brain in two respects:
 Knowledge is acquired by the network from its environment through a
learning process.
 Interneuron connection strengths, known as synaptic weights, are used to
store the acquired knowledge [5].

1.2 Objective of This Project


The objectives of our project are stated below-
 Analyzing chaotic based ANN.
 To provide more security over cryptosystem.
 The faults and limitations of image encryption.
 Comparison of chaotic based ANN with other image encryption
processes.
 Future of this field.
 Investigating the above points and suggestion making.

1.3 Outline of This Project


To complete the task of image encryption in the context of Bangladesh,
we have followed the standard procedure. The whole image encryption is a
massive study topic. So, we have chosen a particular segment in which image
encryption is done with chaotic system in developed countries and some of our
neighboring countries. We have studied topic very well and written this research-
based project paper. In this project the process and schemes of image encryption
techniques that provide privacy and security are reviewed.
Below is the outline of this paper:
After the formal introduction of image encryption, ANN and cryptography we
have reviewed some scholarly articles, news articles, research papers and literature
on image encryption. Especially on chaotic based ANN. we have provided that
information in chapter two (literature review of this paper). Also, it includes the
theoretical perspectives of the topic we have studied in detail.
Following the literature review, we have started the research methodology of our
study in chapter three. In this chapter we have discussed the procedure in which we
have done the whole research. It also includes the way how we have gathered the
data necessary and implemented those in our study.
In chapter four of our research paper, we have summarized the findings of our
study.
Current scenario of Image encryption using chaotic based artificial neural network
is one of the keywords of our research.
Finally, we have concluded the paper with a few suggestions about the proper
application of Chaotic Based ANN.
References:
1. M. Kumar, A. M. Lahcen, R. N. Mohapatra, C. Alwala and S. V. K. Kurella
“Review of Image Encryption Techniques”, IOSR Journal of Computer
Engineering (IOSR-JCE), e-ISSN: 2278-0661, p-ISSN: 2278-8727, Volume
22, Issue 1, Ser. I (Jan - Feb 2020), PP 31-37.
2. M. Chauhan, R. Prajapati “Image Encryption Using Chaotic Cryptosystems
and Artificial Neural Network Cryptosystems: A Review”, International
Journal of Scientific & Engineering Research, Vol.5, Issue 5, May-2014.
3. Roger A. Prichard, “History of Encryption”, January 26, 2002.
4. www.thalesgroup.com , Accessed on- 15th August 2022.
5. Minal Chauhan, Rashmin Prajapati “Image Encryption Using Chaotic
Cryptosystems and Artificial Neural Network Cryptosystems: A Review”
Volume 5, Issue 5, May-2014

You might also like