SlideShare a Scribd company logo
A neural cryptography approach for digital
image security using Vigenère cipher and
tree parity machine
M A Budiman, Handrizal, William
1/12/2020
International Conference on Computing and
Applied Informatics 2020
Presented by William
Background
 Use of cryptography to secure private image
 Symmetric-key cryptosystem
 Security depends heavily on secrecy of the key
 The key distribution has to be done through private channel
 Public-key cryptosystem
 Requires high computational power and long computational time
 the encrypted file size is usually much higher than the original file
1/12/2020
Research Objective
Considering the limitations of both cryptosystems, another
method of securing data is necessary.
 Objective :
 To find an alternative method to secure images without
facing the limitation mentioned earlier
 Make use of Vigenère Cipher algorithm and Tree Parity
Machine neural network
1/12/2020
Vigenère Cipher
 One of the classic polyalphabetic substitution cipher.
 Histrorically used to encrypt alphabetic character.
 Operates by using shifting mechanism, where each character
is shifted by some amount of places.
 Mathematically, can be written as follows :
1/12/2020
Problem with the algorithm
 Due to the repeating nature of the key, the colors of pixels will likely be
shifted by the same key value.
 As a result, there is little visual change between plainimage and
cipherimage as can be seen below :
 Solution ?
 Multiplying the key value with the
y-axis (vertical axis) of the image.
Tree Parity Machine (TPM)
 A unique type of neural network in which it has only one output neuron (𝜏) in
the output layer.
 Classified as multi-layer network.
 Composed of K hidden neuron (𝜎), KxN input neuron (𝑥).
 Consists of weights (W) whose values ranging from –L to L (synaptic depth)
The Proposed Method
 There are 2 main procedures involved in this method: key
generation stage and encryption/decrypton.
Results
 The simulations were run on an Intel Core i3-4030U 1.90 GHz CPU
with 16 GB of RAM.
 TPM with K = 4, N = 4 and L = 50
 This process took about 217 ms to complete and the learning steps
required for both TPM to achieve full synchronization state are 4363
steps
Key: 49 24 50 50 50 27 50 48 49 50 41 50 50 5 49 50
Performance
 In the table below, it can be seen that the larger the size of the
network, the longer it will take to synchronize.
 Similarity of initial chosen weights also affects synchronization time.
Performance
 The weights of both TPM are not guaranteed to always be closer to each
other. This can be seen from the downward slope in some learning steps.
 The chance of attractive or repulsive step will occur depends on the
randomly generated input vectors.
 The more the attractive step occurs, the faster the synchronzation time will
be and vice versa.
 In the figure, two TPM with
K = 3, N = 12, L = 10, are
involved in neural
synchronization. The
process took 472 steps to
complete which is marked
by the value of cosine
similarity, 1
Conclusion
 A neural cryptography approach can be used to enhance
the effectiveness of digital image security.
 The weakness of vigenère cipher can be overcome by
multiplying the key value with the y-axis of the image.
 The result of experiments show that neural synchronization
time depends on the size of network, initial weights and
randomly generated input vector.
1/12/2020
References
 Maqsood F, Ahmed M, Ali M M, Shah M A, "Cryptography: A Comparative
Analysis for Modern Techniques," International Journal of Advanced Computer
Science and Applications, 2017.
 Alese B K, Philemon E D, Falaki S O, "Comparative Analysis of Public-Key
Encryption Schemes," International Journal of Engineering and Technology,
volume 2 No. 9, September, 2012.
 Dian Rachmawati et al 2018 IOP Conf. Ser.: Mater. Sci. Eng. 300 012042
 Sowmya D, Priyanka B R, "Design of Word Based Stream Cipher using Tree Parity
Machine," Imperial Journal of Interdisciplinary Research, Vol-2, Issue-10, 2016.
 Pattanayak S, Ludwig S A, “Encryption Based on Neural Cryptography,” (eds)
Hybrid Intelligent Systems, Advances in Intelligent Systems and Computing, vol
734, pp. 321–330, March 2018.
 Fadlil A, Riadi I, Nugrahantoro A, "Kombinasi Sinkronisasi Jaringan Syaraf Tiruan
dan Vigenere Cipher untuk Optimasi Keamanan Informasi," Digitalzone: Jurnal
Teknologi Informasi dan Komunikasi, vol 11, no 1, May 2020.
1/12/2020
References
 Kester Q, "A cryptosystem based on Vigenère cipher with varying key,"
International Journal of Advanced Research in Computer Engineering &
Technology, Vol 1, Issue 10, December 2012.
 Klein E, Mislovaty R, Kanter I, Ruttor A, Kinzel W, "Synchronization of neural
networks by mutual learning and its application to cryptography," Advances in
Neural Information Processing Systems, 17, MIT Press, Cambridge, 2005, 689-696.
 Dolecki M, Ryszard K, "Distribution of the Tree Parity Machine synchronization
time," Advances in Science and Technology Research Journal, volume 7, No. 18,
June 2013, pp. 20–27.
 Klimov A, Mityaguine A, Shamir A, "Analysis of Neural Cryptography", Advances
in Cryptology—ASIACRYPT, 2003, p288.
1/12/2020
Ad

Recommended

A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
IJCI JOURNAL
 
Az24339344
Az24339344
IJERA Editor
 
A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...
A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...
ijcsit
 
A New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECF
IJAEMSJORNAL
 
5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala
Oyeniyi Samuel
 
Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...
ijeei-iaes
 
Bespoke Technique for Secret Messaging
Bespoke Technique for Secret Messaging
Ajay Kumar
 
Techniques of lattice based
Techniques of lattice based
ijcsa
 
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
ijsrd.com
 
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
IJNSA Journal
 
A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images
IJECEIAES
 
File transfer with multiple security mechanism
File transfer with multiple security mechanism
Shubham Patil
 
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
Association of Scientists, Developers and Faculties
 
survey paper on object oriented cryptographic security for runtime entities
survey paper on object oriented cryptographic security for runtime entities
INFOGAIN PUBLICATION
 
Ijetcas14 355
Ijetcas14 355
Iasir Journals
 
Improving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA Algorithm
paperpublications3
 
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
IJNSA Journal
 
Neural Cryptography for Secret Key Exchange
Neural Cryptography for Secret Key Exchange
IJMTST Journal
 
Image encryption using aes key expansion
Image encryption using aes key expansion
Sreeda Perikamana
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...
IOSR Journals
 
Public key steganography using lsb method with chaotic neural network
Public key steganography using lsb method with chaotic neural network
IAEME Publication
 
10.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.12
Arindam Paul
 
A new hybrid text encryption approach over mobile ad hoc network
A new hybrid text encryption approach over mobile ad hoc network
IJECEIAES
 
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
IJCNCJournal
 
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
IJTRET-International Journal of Trendy Research in Engineering and Technology
 
Innovative field of cryptography: DNA cryptography
Innovative field of cryptography: DNA cryptography
cscpconf
 
Two level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automata
eSAT Publishing House
 
Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...
IJCNCJournal
 
IRJET- Symmetric Cryptography using Neural Networks
IRJET- Symmetric Cryptography using Neural Networks
IRJET Journal
 
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
Sagun Man Singh Shrestha
 

More Related Content

What's hot (20)

Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
ijsrd.com
 
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
IJNSA Journal
 
A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images
IJECEIAES
 
File transfer with multiple security mechanism
File transfer with multiple security mechanism
Shubham Patil
 
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
Association of Scientists, Developers and Faculties
 
survey paper on object oriented cryptographic security for runtime entities
survey paper on object oriented cryptographic security for runtime entities
INFOGAIN PUBLICATION
 
Ijetcas14 355
Ijetcas14 355
Iasir Journals
 
Improving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA Algorithm
paperpublications3
 
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
IJNSA Journal
 
Neural Cryptography for Secret Key Exchange
Neural Cryptography for Secret Key Exchange
IJMTST Journal
 
Image encryption using aes key expansion
Image encryption using aes key expansion
Sreeda Perikamana
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...
IOSR Journals
 
Public key steganography using lsb method with chaotic neural network
Public key steganography using lsb method with chaotic neural network
IAEME Publication
 
10.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.12
Arindam Paul
 
A new hybrid text encryption approach over mobile ad hoc network
A new hybrid text encryption approach over mobile ad hoc network
IJECEIAES
 
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
IJCNCJournal
 
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
IJTRET-International Journal of Trendy Research in Engineering and Technology
 
Innovative field of cryptography: DNA cryptography
Innovative field of cryptography: DNA cryptography
cscpconf
 
Two level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automata
eSAT Publishing House
 
Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...
IJCNCJournal
 
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
ijsrd.com
 
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
IJNSA Journal
 
A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images
IJECEIAES
 
File transfer with multiple security mechanism
File transfer with multiple security mechanism
Shubham Patil
 
survey paper on object oriented cryptographic security for runtime entities
survey paper on object oriented cryptographic security for runtime entities
INFOGAIN PUBLICATION
 
Improving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA Algorithm
paperpublications3
 
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
IJNSA Journal
 
Neural Cryptography for Secret Key Exchange
Neural Cryptography for Secret Key Exchange
IJMTST Journal
 
Image encryption using aes key expansion
Image encryption using aes key expansion
Sreeda Perikamana
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...
IOSR Journals
 
Public key steganography using lsb method with chaotic neural network
Public key steganography using lsb method with chaotic neural network
IAEME Publication
 
10.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.12
Arindam Paul
 
A new hybrid text encryption approach over mobile ad hoc network
A new hybrid text encryption approach over mobile ad hoc network
IJECEIAES
 
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
IJCNCJournal
 
Innovative field of cryptography: DNA cryptography
Innovative field of cryptography: DNA cryptography
cscpconf
 
Two level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automata
eSAT Publishing House
 
Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...
IJCNCJournal
 

Similar to A neural cryptography approach for digital image security using vigenere cipher and tree parity machine (20)

IRJET- Symmetric Cryptography using Neural Networks
IRJET- Symmetric Cryptography using Neural Networks
IRJET Journal
 
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
Sagun Man Singh Shrestha
 
Visually Image Encryption and Compression using a CNN-Based Autoencoder
Visually Image Encryption and Compression using a CNN-Based Autoencoder
IJCNCJournal
 
Visually Image Encryption and Compression using a CNN-Based Autoencoder
Visually Image Encryption and Compression using a CNN-Based Autoencoder
IJCNCJournal
 
PRIVACY PRESERVING BACK-PROPOGATION NEURAL NETWORK LEARNING MADE PRACTICAL WI...
PRIVACY PRESERVING BACK-PROPOGATION NEURAL NETWORK LEARNING MADE PRACTICAL WI...
Thushara Maruthiyat
 
Analytical Study On Artificial Neural Network
Analytical Study On Artificial Neural Network
Kristen Carter
 
Cryptanalysis of Cipher texts using Artificial Neural Networks: A comparative...
Cryptanalysis of Cipher texts using Artificial Neural Networks: A comparative...
IRJET Journal
 
Final Year Project Synopsis: Post Quantum Encryption using Neural Networks
Final Year Project Synopsis: Post Quantum Encryption using Neural Networks
JPC Hanson
 
Project presentation
Project presentation
Madhv Kushawah
 
research review committe review paper for discussion
research review committe review paper for discussion
deanacademics47
 
research review committee review status new
research review committee review status new
deanacademics47
 
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
IOSR Journals
 
Secured transmission through multi layer perceptron in wireless communication...
Secured transmission through multi layer perceptron in wireless communication...
ijmnct
 
575 579
575 579
Editor IJARCET
 
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
pijans
 
Cryptography using artificial neural network
Cryptography using artificial neural network
Mahira Banu
 
Performance Analysis of Encryption Algorithm for Network Security on Parallel...
Performance Analysis of Encryption Algorithm for Network Security on Parallel...
ijsrd.com
 
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data Security
IRJET Journal
 
Cryptography presentation graduate level
Cryptography presentation graduate level
aKhalid9
 
Crptography Electrical engineering .pptx
Crptography Electrical engineering .pptx
aKhalid9
 
IRJET- Symmetric Cryptography using Neural Networks
IRJET- Symmetric Cryptography using Neural Networks
IRJET Journal
 
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
Sagun Man Singh Shrestha
 
Visually Image Encryption and Compression using a CNN-Based Autoencoder
Visually Image Encryption and Compression using a CNN-Based Autoencoder
IJCNCJournal
 
Visually Image Encryption and Compression using a CNN-Based Autoencoder
Visually Image Encryption and Compression using a CNN-Based Autoencoder
IJCNCJournal
 
PRIVACY PRESERVING BACK-PROPOGATION NEURAL NETWORK LEARNING MADE PRACTICAL WI...
PRIVACY PRESERVING BACK-PROPOGATION NEURAL NETWORK LEARNING MADE PRACTICAL WI...
Thushara Maruthiyat
 
Analytical Study On Artificial Neural Network
Analytical Study On Artificial Neural Network
Kristen Carter
 
Cryptanalysis of Cipher texts using Artificial Neural Networks: A comparative...
Cryptanalysis of Cipher texts using Artificial Neural Networks: A comparative...
IRJET Journal
 
Final Year Project Synopsis: Post Quantum Encryption using Neural Networks
Final Year Project Synopsis: Post Quantum Encryption using Neural Networks
JPC Hanson
 
research review committe review paper for discussion
research review committe review paper for discussion
deanacademics47
 
research review committee review status new
research review committee review status new
deanacademics47
 
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
IOSR Journals
 
Secured transmission through multi layer perceptron in wireless communication...
Secured transmission through multi layer perceptron in wireless communication...
ijmnct
 
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
pijans
 
Cryptography using artificial neural network
Cryptography using artificial neural network
Mahira Banu
 
Performance Analysis of Encryption Algorithm for Network Security on Parallel...
Performance Analysis of Encryption Algorithm for Network Security on Parallel...
ijsrd.com
 
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data Security
IRJET Journal
 
Cryptography presentation graduate level
Cryptography presentation graduate level
aKhalid9
 
Crptography Electrical engineering .pptx
Crptography Electrical engineering .pptx
aKhalid9
 
Ad

Recently uploaded (20)

cnc-processing-centers-centateq-p-110-en.pdf
cnc-processing-centers-centateq-p-110-en.pdf
AmirStern2
 
AI vs Human Writing: Can You Tell the Difference?
AI vs Human Writing: Can You Tell the Difference?
Shashi Sathyanarayana, Ph.D
 
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
pcprocore
 
9-1-1 Addressing: End-to-End Automation Using FME
9-1-1 Addressing: End-to-End Automation Using FME
Safe Software
 
Agentic AI for Developers and Data Scientists Build an AI Agent in 10 Lines o...
Agentic AI for Developers and Data Scientists Build an AI Agent in 10 Lines o...
All Things Open
 
Raman Bhaumik - Passionate Tech Enthusiast
Raman Bhaumik - Passionate Tech Enthusiast
Raman Bhaumik
 
"Database isolation: how we deal with hundreds of direct connections to the d...
"Database isolation: how we deal with hundreds of direct connections to the d...
Fwdays
 
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Priyanka Aash
 
Quantum AI: Where Impossible Becomes Probable
Quantum AI: Where Impossible Becomes Probable
Saikat Basu
 
PyCon SG 25 - Firecracker Made Easy with Python.pdf
PyCon SG 25 - Firecracker Made Easy with Python.pdf
Muhammad Yuga Nugraha
 
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
yosra Saidani
 
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
revolcs10
 
From Manual to Auto Searching- FME in the Driver's Seat
From Manual to Auto Searching- FME in the Driver's Seat
Safe Software
 
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Priyanka Aash
 
Curietech AI in action - Accelerate MuleSoft development
Curietech AI in action - Accelerate MuleSoft development
shyamraj55
 
The Growing Value and Application of FME & GenAI
The Growing Value and Application of FME & GenAI
Safe Software
 
Securing Account Lifecycles in the Age of Deepfakes.pptx
Securing Account Lifecycles in the Age of Deepfakes.pptx
FIDO Alliance
 
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Safe Software
 
"Scaling in space and time with Temporal", Andriy Lupa.pdf
"Scaling in space and time with Temporal", Andriy Lupa.pdf
Fwdays
 
Techniques for Automatic Device Identification and Network Assignment.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Priyanka Aash
 
cnc-processing-centers-centateq-p-110-en.pdf
cnc-processing-centers-centateq-p-110-en.pdf
AmirStern2
 
AI vs Human Writing: Can You Tell the Difference?
AI vs Human Writing: Can You Tell the Difference?
Shashi Sathyanarayana, Ph.D
 
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
pcprocore
 
9-1-1 Addressing: End-to-End Automation Using FME
9-1-1 Addressing: End-to-End Automation Using FME
Safe Software
 
Agentic AI for Developers and Data Scientists Build an AI Agent in 10 Lines o...
Agentic AI for Developers and Data Scientists Build an AI Agent in 10 Lines o...
All Things Open
 
Raman Bhaumik - Passionate Tech Enthusiast
Raman Bhaumik - Passionate Tech Enthusiast
Raman Bhaumik
 
"Database isolation: how we deal with hundreds of direct connections to the d...
"Database isolation: how we deal with hundreds of direct connections to the d...
Fwdays
 
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Priyanka Aash
 
Quantum AI: Where Impossible Becomes Probable
Quantum AI: Where Impossible Becomes Probable
Saikat Basu
 
PyCon SG 25 - Firecracker Made Easy with Python.pdf
PyCon SG 25 - Firecracker Made Easy with Python.pdf
Muhammad Yuga Nugraha
 
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
yosra Saidani
 
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
revolcs10
 
From Manual to Auto Searching- FME in the Driver's Seat
From Manual to Auto Searching- FME in the Driver's Seat
Safe Software
 
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Priyanka Aash
 
Curietech AI in action - Accelerate MuleSoft development
Curietech AI in action - Accelerate MuleSoft development
shyamraj55
 
The Growing Value and Application of FME & GenAI
The Growing Value and Application of FME & GenAI
Safe Software
 
Securing Account Lifecycles in the Age of Deepfakes.pptx
Securing Account Lifecycles in the Age of Deepfakes.pptx
FIDO Alliance
 
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Safe Software
 
"Scaling in space and time with Temporal", Andriy Lupa.pdf
"Scaling in space and time with Temporal", Andriy Lupa.pdf
Fwdays
 
Techniques for Automatic Device Identification and Network Assignment.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Priyanka Aash
 
Ad

A neural cryptography approach for digital image security using vigenere cipher and tree parity machine

  • 1. A neural cryptography approach for digital image security using Vigenère cipher and tree parity machine M A Budiman, Handrizal, William 1/12/2020 International Conference on Computing and Applied Informatics 2020 Presented by William
  • 2. Background  Use of cryptography to secure private image  Symmetric-key cryptosystem  Security depends heavily on secrecy of the key  The key distribution has to be done through private channel  Public-key cryptosystem  Requires high computational power and long computational time  the encrypted file size is usually much higher than the original file 1/12/2020
  • 3. Research Objective Considering the limitations of both cryptosystems, another method of securing data is necessary.  Objective :  To find an alternative method to secure images without facing the limitation mentioned earlier  Make use of Vigenère Cipher algorithm and Tree Parity Machine neural network 1/12/2020
  • 4. Vigenère Cipher  One of the classic polyalphabetic substitution cipher.  Histrorically used to encrypt alphabetic character.  Operates by using shifting mechanism, where each character is shifted by some amount of places.  Mathematically, can be written as follows : 1/12/2020
  • 5. Problem with the algorithm  Due to the repeating nature of the key, the colors of pixels will likely be shifted by the same key value.  As a result, there is little visual change between plainimage and cipherimage as can be seen below :  Solution ?  Multiplying the key value with the y-axis (vertical axis) of the image.
  • 6. Tree Parity Machine (TPM)  A unique type of neural network in which it has only one output neuron (𝜏) in the output layer.  Classified as multi-layer network.  Composed of K hidden neuron (𝜎), KxN input neuron (𝑥).  Consists of weights (W) whose values ranging from –L to L (synaptic depth)
  • 7. The Proposed Method  There are 2 main procedures involved in this method: key generation stage and encryption/decrypton.
  • 8. Results  The simulations were run on an Intel Core i3-4030U 1.90 GHz CPU with 16 GB of RAM.  TPM with K = 4, N = 4 and L = 50  This process took about 217 ms to complete and the learning steps required for both TPM to achieve full synchronization state are 4363 steps Key: 49 24 50 50 50 27 50 48 49 50 41 50 50 5 49 50
  • 9. Performance  In the table below, it can be seen that the larger the size of the network, the longer it will take to synchronize.  Similarity of initial chosen weights also affects synchronization time.
  • 10. Performance  The weights of both TPM are not guaranteed to always be closer to each other. This can be seen from the downward slope in some learning steps.  The chance of attractive or repulsive step will occur depends on the randomly generated input vectors.  The more the attractive step occurs, the faster the synchronzation time will be and vice versa.  In the figure, two TPM with K = 3, N = 12, L = 10, are involved in neural synchronization. The process took 472 steps to complete which is marked by the value of cosine similarity, 1
  • 11. Conclusion  A neural cryptography approach can be used to enhance the effectiveness of digital image security.  The weakness of vigenère cipher can be overcome by multiplying the key value with the y-axis of the image.  The result of experiments show that neural synchronization time depends on the size of network, initial weights and randomly generated input vector. 1/12/2020
  • 12. References  Maqsood F, Ahmed M, Ali M M, Shah M A, "Cryptography: A Comparative Analysis for Modern Techniques," International Journal of Advanced Computer Science and Applications, 2017.  Alese B K, Philemon E D, Falaki S O, "Comparative Analysis of Public-Key Encryption Schemes," International Journal of Engineering and Technology, volume 2 No. 9, September, 2012.  Dian Rachmawati et al 2018 IOP Conf. Ser.: Mater. Sci. Eng. 300 012042  Sowmya D, Priyanka B R, "Design of Word Based Stream Cipher using Tree Parity Machine," Imperial Journal of Interdisciplinary Research, Vol-2, Issue-10, 2016.  Pattanayak S, Ludwig S A, “Encryption Based on Neural Cryptography,” (eds) Hybrid Intelligent Systems, Advances in Intelligent Systems and Computing, vol 734, pp. 321–330, March 2018.  Fadlil A, Riadi I, Nugrahantoro A, "Kombinasi Sinkronisasi Jaringan Syaraf Tiruan dan Vigenere Cipher untuk Optimasi Keamanan Informasi," Digitalzone: Jurnal Teknologi Informasi dan Komunikasi, vol 11, no 1, May 2020. 1/12/2020
  • 13. References  Kester Q, "A cryptosystem based on Vigenère cipher with varying key," International Journal of Advanced Research in Computer Engineering & Technology, Vol 1, Issue 10, December 2012.  Klein E, Mislovaty R, Kanter I, Ruttor A, Kinzel W, "Synchronization of neural networks by mutual learning and its application to cryptography," Advances in Neural Information Processing Systems, 17, MIT Press, Cambridge, 2005, 689-696.  Dolecki M, Ryszard K, "Distribution of the Tree Parity Machine synchronization time," Advances in Science and Technology Research Journal, volume 7, No. 18, June 2013, pp. 20–27.  Klimov A, Mityaguine A, Shamir A, "Analysis of Neural Cryptography", Advances in Cryptology—ASIACRYPT, 2003, p288. 1/12/2020