Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/253192
Title: | Novel multimedia encryption algorithms using chaotic and number theoretic approaches |
Researcher: | Jeyamala C |
Guide(s): | Thiruvengadam S J |
Keywords: | Chaotic and Number Encryption Engineering and Technology,Engineering,Engineering Electrical and Electronic Novel Multimedia Encryption Algorithms Number Theoretic Approaches |
University: | Anna University |
Completed Date: | 2018 |
Abstract: | The recent advances in science and technology, especially in information and communication engineering, have led to an exponential increase of multimedia applications over the internet. Applications like military image databases, personal online photograph albums, video-on-demand, video conferencing and pay-per-view demand fast and secure encryption algorithms for providing confidentiality. Multimedia encryption technology provides an end to end security by encoding the raw data into an unintelligible format. Multimedia data are characterized by large volume, high redundancy, high correlation, format compliance and application specific security requirements. These peculiar characteristics demand an extensive and exclusive study of multimedia encryption techniques. Majority of the research works on multimedia encryption techniques are based on chaotic maps. Chaos based multimedia encryption techniques have two major limitations. The first limitation is that, the chosen chaotic maps are to be iterated for sufficiently a large number of times for generation of session keys. This increased number of iterations prevents the usage of chaos based systems in memory limited and low powered devices. The second limitation is that chaos based systems are implemented in floating point arithmetic which may lead to round off errors. Multimedia encryption in certain applications like telemedicine is highly sensitive because even a small amount of visual degradation can lead to false diagnosis. Such applications are to be free from round off errors. In the first part of the research work, the performance of chaos based image encryption is enhanced by hybridization with Number Theoretic approach. The proposed methodology makes use of modular exponentiation of primitive roots of prime over its residual elements for generation of session keys. The key generation process involves only integer arithmetic and hence it is free from round off errors. newline |
Pagination: | xx, 161p. |
URI: | http://hdl.handle.net/10603/253192 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 87.18 kB | Adobe PDF | View/Open |
02_certificates.pdf | 534.3 kB | Adobe PDF | View/Open | |
03_abstract.pdf | 111.11 kB | Adobe PDF | View/Open | |
04_acknowledgement.pdf | 101.23 kB | Adobe PDF | View/Open | |
05_table of contents.pdf | 117.07 kB | Adobe PDF | View/Open | |
06_list_of_tables.pdf | 100.24 kB | Adobe PDF | View/Open | |
07_list_of_figures.pdf | 102.88 kB | Adobe PDF | View/Open | |
08_list_of_symbols and abbreviations.pdf | 148.57 kB | Adobe PDF | View/Open | |
09_chapter1.pdf | 240.19 kB | Adobe PDF | View/Open | |
10_chapter2.pdf | 335.41 kB | Adobe PDF | View/Open | |
11_chapter3.pdf | 939.62 kB | Adobe PDF | View/Open | |
12_chapter4.pdf | 1.1 MB | Adobe PDF | View/Open | |
13_chapter5.pdf | 476.43 kB | Adobe PDF | View/Open | |
14_conclusion.pdf | 143.29 kB | Adobe PDF | View/Open | |
15_appendices.pdf | 162.4 kB | Adobe PDF | View/Open | |
16_references.pdf | 191.87 kB | Adobe PDF | View/Open | |
17_list_of_publications.pdf | 118.19 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: