Académique Documents
Professionnel Documents
Culture Documents
CHAPTER 5
RESULTS AND DISCUSSION
Need for security in transmission and storage has become greater and greater
with the ever-increasing amount of data stored in computers and data in transit. In order
to transfer the data/image to the intended user at destination in a secure way, there are
many approaches like Cryptography, Steganography and transposition method, etc. We
have used a strong key, generated using A5/1 algorithm. This work has been
implemented on MATLAB. To study the performance of the proposed system, three
different standard grey scale images and two different colour images are considered as
shown in Figures 5.1 to 5.11.
The original 256*256 gray scale input image, cipher image and decrypted
image of Cameraman image is obtained as shown in Figure 5.1.
Figure 5.1: Encryption and Decryption of 256*256 Gray Scale Cameraman Image
The original 256*256 gray scale input image, cipher image and decrypted image of
Medical image is obtained as shown in Figure 5.2.
Figure 5.2: Encryption and Decryption of 256*256 Gray Scale Medical Image
The original 256*256 gray scale input image, cipher image and decrypted
image of Clock image is obtained as shown in Figure 5.3.
Figure 5.3: Encryption and Decryption of 256*256 Gray Scale Clock Image
The original image, encrypted and decrypted image of 256*256-pixel Dr. AIT
logo colour image, its red, green and blue components are obtained as shown in Figure
5.4 to Figure 5.7.
Figure 5.5(a): Input Red Figure 5.5(b): Encrypted Figure 5.5(c): Decrypted
channel Image Red Channel Image Red Channel Image
Figure 5.5: Encryption and Decryption of 256*256-pixel Red Channel Dr. AIT
logo Image
Figure 5.6: Encryption and Decryption of 256*256-pixel Green Channel Dr. AIT
logo Image
Figure 5.7(a): Input Blue Figure 5.7(b): Encrypted Figure 5.7(c): Decrypted
channel Image Blue Channel Image Blue Channel Image
Figure 5.7: Encryption and Decryption of 256*256-pixel Blue Channel Dr. AIT
logo Image
Figure 5.9(a): Input Red Figure 5.9(b): Encrypted Figure 5.9(c): Decrypted
channel Image Red Channel Image Red Channel Image
Figure 5.9: Encryption and Decryption of 256*256 Red Channel Earth Image
Figure 5.11(a): Input Blue Figure 5.11(b): Encrypted Figure 5.11(c): Decrypted
channel Image Blue Channel Image Blue Channel Image
Histogram has many uses in image processing. The first use of histogram is
that, we can predict about an image by just looking at its histogram. It’s like looking
an x ray of a bone of a body. The second use of histogram is for brightness purposes.
The histogram has wide application in image brightness. Histograms are also used in
adjusting contrast of an image. Another important use of histogram is to equalize an
image.
In this work, Histogram plot of input image, encrypted image and decrypted
image of 256*256 pixels gray scale and colour images are obtained as s shown in Figure
5.12 to Figure 5.20 respectively. It is observed that the histogram plots of input and
decrypted image are identical. It is clearly visible that histogram of cipher image is
fairly uniform and it does not leak any amount of information about the plain image.
Figure 5.12: Histogram Plots of 256*256 Input, Cipher and Decrypted Cameraman
Image
Figure 5.13: Histogram Plots of 256*256 Input, Cipher and Decrypted Medical Image
Figure 5.14: Histogram Plots of 256*256 Input, Cipher and Decrypted Clock Image
Figure 5.15: Histogram Plots of 256*256 Input, Cipher and Decrypted Red Channel
Earth Image
Figure 5.16: Histogram Plots of 256*256 Input, Cipher and Decrypted Green Channel
Earth Image
Figure 5.17: Histogram Plots of 256*256 Input, Cipher and Decrypted Cameraman
Image
Figure 5.18(a): Histogram of Input Red Channel Dr. AIT logo Image
Figure 5.18(b): Histogram of Cipher Red Channel Dr. AIT logo Image
Figure 5.18(c): Histogram of Decrypted Red Channel Dr. AIT logo Image
Figure 5.18: Histogram Plots of 256*256 Input, Cipher and Decrypted Red Channel
Dr. AIT logo Image
Figure 5.19(a): Histogram of Input Green Channel Dr. AIT logo Image
Figure 5.19(b): Histogram of Cipher Green Channel Dr. AIT logo Image
Figure 5.19(c): Histogram of Decrypted Green Channel Dr. AIT logo Image
Figure 5.19: Histogram Plots of 256*256 Input, Cipher and Decrypted Green Channel
Dr. AIT logo Image
Figure 5.20(a): Histogram of Input Blue Channel Dr. AIT logo Image
Figure 5.20(b): Histogram of Cipher Blue Channel Dr. AIT logo Image
Figure 5.20(c): Histogram of Decrypted Blue Channel Dr. AIT logo Image
Figure 5.20: Histogram Plots of 256*256 Input, Cipher and Decrypted Blue Channel
Dr. AIT logo Image
Elapsed time is the amount of time that passes from the beginning of an event
to its end. MATLAB includes two functions TIC and TOC. If TIC is called before
something is to be timed, and TOC is called afterward, then TOC will either print
the elapsed wall clock time if its value is not being copied to a variable, or return the
value of the elapsed wall clock time to a variable. Elapsed time for the generation of
key sequence of 524288 binary bits is obtained as 4.211753 seconds.
CHAPTER 6
CONCLUSSION AND FUTURE SCOPE
In this work, generation of pseudorandom binary key sequence is implemented
using A5/1 algorithm by MATLAB tool. The obtained sequence has high periodicity
of (219 -1) ( 222 -1)(223 -1). Time elapsed for the generation of key is 4.211753 seconds
for 524288 bits. The obtained stream cipher is used for the application of encryption
and decryption of 256*256 gray scale and colour images. Simple EX-OR operation is
operated between input binary pixel value sequence and the generated key sequence
for encryption process (524288 bits). Similarly, EX-OR operation is operated between
encrypted binary pixel value sequence and the same key sequence for decryption
process (524288 bits). It is seen that the input and the decrypted images appears
identical after encryption and decryption process. The cipher image does not resemble
input image at any point and is unrecognizable. This prevents the outsider to hack the
image information while transmitting through a secured channel from transmitter to
receiver.
Performance of the A5/1 algorithm is analyzed by computing Histogram and
the obtained histogram of encrypted image is fairly uniform and it does not leak any
amount of information about the plain image.
6.1 Future Enhancements
To understand the scope of A5/1 algorithm for stream cipher applications, a
simple image encryption is demonstrated in this work. The applications of espresso
algorithm can also be extended to the following.
Audio encryption
Video encryption
Multimedia data encryption etc.,
CHAPTER 7
REFERENCES
[1] AlpeshR. Sankaliya, V. Mishra and AbilashMandoli, “ Implementation of
cryptographic algorithms for GSM cellular standard”, GANPUT University
Journal of engineering and technology, Vol-1, issue-1, Jan-June- 2011.
[6] Li Wei Dai Zibin Nan Longmei, “Research and implementation of a high
speed reconfigurable A5 algorithm”, 2008 IEEE Pacific-Asia Woekshop on
Computational Intelligence and Industrial Application, 978-0-7695-3490-
9/08, 2008 IEEE
[7] Marc Briceno, Ian Goldberg and David Wagner, “A pedagogical
Implementation of the A5/1”, 1999
[6] Li Wei Dai Zibin Nan Longmei, “Research and implementation of a high
speed reconfigurable A5 algorithm”, 2008 IEEE Pacific-Asia Woekshop on
Computational Intelligence and Industrial Application, 978-0-7695-3490-
9/08, 2008 IEEE
[7] Marc Briceno, Ian Goldberg and David Wagner, “A pedagogical
Implementation of the A5/1”, 1999