Encryption of graphic information by means of transformation matrixes for protection against decofing by neural algorithms

Artificial Intelligence Scientific Journal 25 (2):15-20 (2020)
  Copy   BIBTEX

Abstract

The article deals with the algorithm of encrypting graphic information using transformation matrixes. It presents the actions that can be done with the image. The article also gives algorithms for forming matrixes that are created with the use of random processes. Examples of matrixes and encryption results are shown. Calculations of the analysis of combinations and conclusions to them are carried out. The article shows the possibilities and advantages of this image encryption algorithm. The proposed algorithm will allow to transmit encrypted information through open communication channels. The algorithm uses all possible actions that can be done with the image, namely: image resizing, adding redundant elements to the image, changing the location of the pixels, changing the brightness of the image pixels, inverting the image pixels, changing the colours of the images pixels. A randomized approach to matrix formation will make it impossible to use neural systems. The algorithm of the implementation of writing encryption code is rather simple. It is not possible to decrypt the image without a key as the number of possible combinations is extremely large. This algorithm can be used in the military, intelligence, information security. Encryption does not require significant computing or RAM resources. This algorithm can be implemented in WEB-technology and in mobile applications, it has no recursive functions and loop in loop. The algorithm hides the image size, which in turn adds extra protection. Redundant elements will not allow neural networks to compare pixels. Changing colors, changing brightness, inversion by random processes will not allow neural networks to find the decryption function. The article considers an image encryption algorithm that will give a possibility to generate a key. The key will be a set of two-dimensional arrays formed in a randomized manner. A randomized approach to matrix formation will make it impossible to use neural systems. The algorithm uses all possible actions that can be done with the image, namely: Image resizing. Adding redundant elements to the image. Changing the location of the pixels. Changing the brightness of the image pixels. Inverting the image pixels. Changing the colours of the images pixels. The pixel positioning matrix gives us! combinations. The pixel brightness change matrix gives us 8 *! combinations. The pixel inversion matrix gives us 8 *! combinations. The pixel colour change matrix gives us 6 *! Combinations. The total number of combinations N is equal to: It is not possible to decrypt the image without a key as the number of possible combinations is extremely large. The algorithm of the implementation of writing encryption code is rather simple. This algorithm can be used in the military, intelligence, information security. The advantage of this algorithm is the fact that the encrypted image can be transmitted through open chann

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 91,846

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Analysis and modification of graphic data compression algorithms.Bouza M. K. - 2020 - Artificial Intelligence Scientific Journal 25 (4):32-40.
Bitplanes Block Based Lossy Image Compression.Abdelatief H. Abouali - forthcoming - International Journal of Academic Engineering Research (IJAER) 2 (10):19-27.

Analytics

Added to PP
2021-03-17

Downloads
11 (#1,136,567)

6 months
2 (#1,196,523)

Historical graph of downloads
How can I increase my downloads?