Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/27972
Title: | Efficient techniques for enhancing Privacy and information assurance |
Researcher: | Kavitha V |
Guide(s): | Easwarakumar K S |
Keywords: | Advanced Encryption Standards Elliptic Curve Cryptography Huffman Lempel Ziv Welch Joint Picture Expert Group Run Length Encoding |
Upload Date: | 17-Nov-2014 |
University: | Anna University |
Completed Date: | 01/11/2007 |
Abstract: | In the computer communication era the present scenario demands newlineefficient transmission of information Data compression and security newlinetechniques like data encryption steganography biometrics etc play a vital newlinerole in transmitting data safetely and effectively Information theory newlineconcentrates on compression and security techniques that have come out with newlinemany data compression and encryption algorithms Data compression newlinetechniques represent same information in a more compact form by removing newlineredundancies Compression algorithms are broadly classified into lossless and newlinelossy algorithms Lossless algorithm decodes the encoded information back to newlineit original whereas the data decoded by lossy algorithms need not be identical newlineto the original one, but preserve the relevant information Compression newlinealgorithms like Run Length Encoding RLE Huffman Lempel Ziv Welch newline LZW Joint Picture Expert Group JPEG and Fractal are now in usage newlineThe aim of cryptography is to protect and to keep the data secret It newlinehas had a nice history from ancient periods and allows secure transformation newlineof data Encryption is a process by which plaintext is converted into cipher newlinetext Crypto algorithms are broadly classified into conventional encryption newlineand public key cryptosystems Recently developed algorithms are Advanced newlineEncryption Standards AES under conventional encryption and Elliptic newlineCurve Cryptography ECC under public key cryptography which provides newlinehigh security newline newline |
Pagination: | xix, 171p. |
URI: | http://hdl.handle.net/10603/27972 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 18.17 kB | Adobe PDF | View/Open |
02_certificate.pdf | 5.55 kB | Adobe PDF | View/Open | |
03_abstract.pdf | 13.55 kB | Adobe PDF | View/Open | |
04_acknowledgement.pdf | 6.82 kB | Adobe PDF | View/Open | |
05_content.pdf | 25.09 kB | Adobe PDF | View/Open | |
06_chapter1.pdf | 244.99 kB | Adobe PDF | View/Open | |
07_chapter2.pdf | 170.82 kB | Adobe PDF | View/Open | |
08_chapter3.pdf | 134.34 kB | Adobe PDF | View/Open | |
09_chapter4.pdf | 245.21 kB | Adobe PDF | View/Open | |
10_chapter5.pdf | 467.49 kB | Adobe PDF | View/Open | |
11_chapter6.pdf | 786.92 kB | Adobe PDF | View/Open | |
12_chapter7.pdf | 11.22 kB | Adobe PDF | View/Open | |
13_reference.pdf | 61.44 kB | Adobe PDF | View/Open | |
14_publication.pdf | 8.13 kB | Adobe PDF | View/Open | |
15_vitae.pdf | 6.15 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: