Sign In to Follow Application
View All Documents & Correspondence

Gan Based Image Encoder Decoder

Abstract: In previous decades, files are used to securing using passwords and cryptographic keys. But, nowadays with high computational power, Supercomputers are accessible to most of the hackers it can be easily cracked thus, there is a great need to develop better security systems to provide confidentiality. Therefore, the proposed Encoder provides a highly secure technique of encoding images.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
25 November 2019
Publication Number
50/2019
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
Parent Application

Applicants

1. MR.VIVANK SHARMA
VELLORE INSTITUTE OF TECHNOLOGY, GORBACHEV ROAD, VELLORE, TAMILNADU, INDIA-632014.
2. MS.MANSI SHUKLA
VELLORE INSTITUTE OF TECHNOLOGY, GORBACHEV ROAD, VELLORE, TAMILNADU, INDIA-632014.
3. DR.NEELU KHARE
VELLORE INSTITUTE OF TECHNOLOGY, GORBACHEV ROAD, VELLORE, TAMILNADU, INDIA-632014.

Inventors

1. MR.VIVANK SHARMA
VELLORE INSTITUTE OF TECHNOLOGY, GORBACHEV ROAD, VELLORE, TAMILNADU, INDIA-632014.
2. MS.MANSI SHUKLA
VELLORE INSTITUTE OF TECHNOLOGY, GORBACHEV ROAD, VELLORE, TAMILNADU, INDIA-632014.
3. DR.NEELU KHARE
VELLORE INSTITUTE OF TECHNOLOGY, GORBACHEV ROAD, VELLORE, TAMILNADU, INDIA-632014.

Specification

An image encoder for protecting images from getting hacked and altered when transmitted over a network. When an image is captured by UAV (Unmanned Aerial Vehicle) and transmitted over a network for further communication, it is vulnerable to many cyber threats. The image might be decoded and altered on the way which might destroy the objective of communication. This image encoder encodes the image in the form of image matrix and hides the matrix inside another image using Steganography such that while transferring the image over a network, the matrix hidden inside the image for the original image cannot be decoded.

BACKGROUND AND PROBLEM WITH EXISTING ART
1. The RSA (Rivest-Shadir-Adleman) Algorithm is mainly used for encoding images for UAV. It consists of a public key and a private key.
2. The Public key is known to everyone and used for encrypting messages. Messages encrypted with the public key can be decrypted using the private key.
3. The main disadvantage of encryption is related to keys is that the security of data becomes the security of the encryption key. Hence, if data is lost the key is lost.
4. Data encryption and key generation are necessary to encrypt and decrypt the data, which is computationally expensive.
5. Another drawback is the reduction in overall performance of the system.
A poor encryption implementation may results in the false security solution or in fact it is wide open to get attacked.
SUMMARY OF THE INVENTION
In this invention a unique encryption technique is developed to provide highly secure, reliable end-to-end encryption method for transferring images over a network, so that the transferred important information should not be hacked and altered. This technique can be used in numerous applications, particularly in transmission of images captured by UAV. Dynamic images with moving background in the form of video are captured by UAV. Those dynamic parts of the video can be encrypted so that the originality of the captured video is maintained while transferring it over the network.
LIST OF PREFERRED AND OPTIONAL FEATURES
1. End-to-end communication could be established for improved security.
2. CAN based encoding-decoding is used for attaining a security for image transfer.
3. Steganography is used for image hiding.
BRIEF DESCRIPTION OF THE DIAGRAM
Figure: 1 shows the schematic diagram of the GAN Based Image Encoder-Decoder system It depicts the flow chart of end-to-end image transfer in the system.

DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS
The proposed GAN based Image Encoder-Decoder comprises of an image to matrix converter, GAN module, hiding GAN based image matrix inside a random image module at transmitting end, and extract image, decode image and decrypt modules at receiving end. The GAN Based Image Encoder-Decoder works in four steps; (1) The input image / is encrypted into an image matrix A and passed to GAN algorithm module.(2) GAN module transforms A into encrypted image matrix AGAN . (3) Then, AGAN will be hidden into a random image IR to obtain IGA#+R. (4)The image IGAN+R is then transmitted over the network and on the receiver end, the image AGAN can be extracted and then decoded image matrix A. Further, image matrix A will be used to recover original image /.

5. CLAIMS :
1. A novel Encryption algorithm of converting image to a matrix.
2. Steganography is used for hiding the image matrix generated by GAN inside another random image.
3. GAN is used again to decrypt the encrypted matrix back to the original image.
i

Documents

Application Documents

# Name Date
1 Form9_Earlier Publication_25-11-2019.pdf 2019-11-25
2 Form5_As Filed_25-11-2019.pdf 2019-11-25
3 Form3_As Filed_25-11-2019.pdf 2019-11-25
4 Form2 Title Page_Complete_25-11-2019.pdf 2019-11-25
5 Form1_As Filed_25-11-2019.pdf 2019-11-25
6 Form18_Normal Request_25-11-2019.pdf 2019-11-25
7 Drawing_As Filed_25-11-2019.pdf 2019-11-25
8 Description Complete_As Filed_25-11-2019.pdf 2019-11-25
9 Correspondence by Applicant_As Filed_25-11-2019.pdf 2019-11-25
10 Abstract_As Filed_25-11-2019.pdf 2019-11-25
11 201941048005-FER.pdf 2021-10-17

Search Strategy

1 SearchE_04-06-2021.pdf