Inverse Wavelet Transform

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Information Representation
Chapter 4 Systems of Linear Equations; Matrices
Chapter 4 Systems of Linear Equations; Matrices
Review of HTML Ch. 1.
CSCI 3 Chapter 1.8 Data Compression. Chapter 1.8 Data Compression  For the purpose of storing or transferring data, it is often helpful to reduce the.
Huffman Codes Message consisting of five characters: a, b, c, d,e
Introduction to Computing Using Python Chapter 6  Encoding of String Characters  Randomness and Random Sampling.
Chapter 2 Data Representation. Define data types. Visualize how data are stored inside a computer. Understand the differences between text, numbers, images,
IT-101 Section 001 Lecture #3 Introduction to Information Technology.
Data Representation.
Introduction to Computer Design CMPT 150 Section: D Ch. 1 Digital Computers and Information CMPT 150, Chapter 1, Tariq Nuruddin, Fall 06, SFU 1.
Robert Edge  Dr. James Walker  Mathematics  University of Wisconsin-Eau Claire Universal Image Quality PSNR IQI BEST IQI BOATASWDRJPEGASWDRJPEG 1:
DATA REPRESENTATION CHAPTER DATA TYPES Different types of data (Fig. 2.1) The computer industry uses the term “MULTIMEDIA” to define information.
4.4 Identity and Inverse Matrices
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
Learning Objectives for Section 4.5 Inverse of a Square Matrix
Data Representation. What is data? Data is information that has been translated into a form that is more convenient to process As information take different.
Compression of a Dictionary Jan Lánský, Michal Žemlička Dept. of Software Engineering Faculty of Mathematics.
Characters CS240.
Notes Over 4.4 Finding the Inverse of 2 x 2 Matrix.
Cryptography Cryptography is the use of mathematics to encode messages and prevent them from being read by anyone who doesn’t know the code. One way that.
Understanding Computers
Number Systems. The position of each digit in a weighted number system is assigned a weight based on the base or radix of the system. The radix of decimal.
Understanding Binary Understanding Computers. Understanding Computers L3 – Understanding Binary Learning Objectives All will Understand why all data is.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
1 Non-Numeric Data Representation V1.0 (22/10/2005)
Chapter 1: Data Storage.
Chapter 4 Systems of Linear Equations; Matrices
Design and Implementation of Lossless DWT/IDWT (Discrete Wavelet Transform & Inverse Discrete Wavelet Transform) for Medical Images.
Understanding binary Understanding Computers.
Section 2.1 Simplifying Algebraic Expressions
3.3 Fundamentals of data representation
Unit 2.6 Data Representation Lesson 2 ‒ Characters
Chapter 2 Variables.
NUMBER SYSTEMS.
Binary 1 Basic conversions.
IMAGE PROCESSING IMAGE COMPRESSION
Binary Numbers and ASCII and EDCDIC
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Simplifying Algebraic Expressions
Chapter 3 Data Storage.
Chapter 3 Data Representation
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Applications of Matrices
Chapter 1 Number Systems, Number Representations, and Codes
Condensed Lesson Plan*
Unit-2 Objects and Classes
AES Objectives ❏ To review a short history of AES
Ch2: Data Representation
PART VII Security.
Applications of Inverse Matrices
Chapter 2 Variables.
Topics Introduction Hardware and Software How Computers Store Data
Chapter 2 Data Representation.
Chapter Nine: Data Transmission
Simple Encryption- Lesson 5
Chapter 3 DataStorage Foundations of Computer Science ã Cengage Learning.
Learning Objectives for Section 4.5 Inverse of a Square Matrix
Several Transformations
Chapter 4 Systems of Linear Equations; Matrices
Chapter 2 Variables.
EKRJGTU CTG CYGUQOG! Can you break the code?.
C Programming Language
Huffman Coding Greedy Algorithm
Chapter 4 Systems of Linear Equations; Matrices
Digital Representation of Data
ASCII and Unicode.
A New Method of Cryptography II:
Presentation transcript:

Inverse Wavelet Transform A New Method of Cryptography: Jacqueline Christy  Dr. James Walker  Mathematics University of Wisconsin-Eau Claire This project was funded by UWEC Differential Tuition and by the UWEC Foundation. Decoding: Introduction: Encoded Message De-altered Inverse Wavelet Transform Plain Text Using Visual Basic 6.0, a program implementing a new cryptographic scheme was developed. The new cryptographic scheme combines the wavelet transform based scheme with a series of random alteration values to encode finite sequences of integers. The encoded message of integers is converted into bytes. These bytes are de-altered, first by subtracting 100 and the seven sets of alteration values obtained from δ , and then by using the inverse wavelet transform. These de-altered bytes are converted back into text using the key set up earlier. The decoded message is displayed. The Program: Coding: Plain Text (bytes) Wavelet Transform Randomly Altered Encoded Message Wavelet Transform: In this program, a wavelet based transform often used with video compression, the Daub 5/3 integer-to-integer transform, was used to compress the messages into an encoded set of integers. This was done by applying the following lifting equations: A key is set up in which an integer is assigned to every symbol on the common 104-key US English QWERTY keyboard (for each letter, the uppercase and lowercase versions are considered). Using this key, each character from the text is converted into an integer, and these integers are then converted into bytes. The bytes are then altered using the wavelet transform.* Seven random integers are chosen between the integers 1 and 255. These integers are used to generate seven sets of integers (of length n / 7, where n is the number of characters in the original text) from the irrational number δ . These sets are generated into random sequences by multiplying each digit by (-1) if it is odd, and by (+1) if it is even. These integers are then added to the wavelet transform values. dk = f2k – ½(f2k-1 + f2k+1) + ½ ak = f2k-1 + ¼(dk-1 + dk) + ½ Because this transform combines five adjacent values in the ak values, and these values are iterated on four times, it removes any short-term relations between characters that are present in the English language. Results: δ = 0.1234567891011121314151617181920212223… Original Message Encoded Message Each number is bumped up by 100 to avoid overflow. The encoded message is displayed. *See explanation in later section