Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/301286
Title: Investigation on diffusion and confusion based image encryption algorithms
Researcher: Premkumar R
Guide(s): Anand S
Keywords: Engineering and Technology
Computer Science
Computer Science Information Systems
Image Encryption Algorithms
Image Encryption
University: Anna University
Completed Date: 2019
Abstract: With the rapid improvement in information technology security is a major concern in the transmission of digital data over various networks and data storage Security mechanisms must be implemented to provide the required protection to the transmitted data Image encryption is a technique which provides security to images by transforming the image to an unreadable format Access control privacy validation and copyright protection are an integral part of this process Three diverse approaches to shield computerized information from unapproved spying are cryptography steganography and watermarking Among these three systems cryptography has turned out to be one of the significant approaches to give maximum security Cryptography manages the advancement of procedures for changing over data amongst coherent and incoherent structures It manages the substance secrecy and access control through encryption and decryption algorithms which are operated by keys Encryption and decryption techniques that use the same secret key are private key cryptography Alternately keys are different for both encryption and decryption such cryptographic methods are known as public key cryptography Any crypto system must satisfy confusion and diffusion property to provide security Confusion property substitutes the pixel values whereas diffusion property rearranges the pixels of an image The limitation of conventional encryption methods are i takes more time to encrypt the plain image ii the size of decrypted plain text must be equal to the original text size Many researchers presented chaos-based image encryption system and selective image encryption schemes for a faster execution of encryption/decryption Also genetic operator based encryption algorithm is presented in the literature in which the level of difficulty set for an unauthorized individual to break the encryption is heightened Nowadays transformation based image encryption algorithms are presented newline
Pagination: xiv, 117p.
URI: http://hdl.handle.net/10603/301286
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File25.35 kBAdobe PDFView/Open
02_certificates.pdf567.69 kBAdobe PDFView/Open
03_abstracts.pdf11.49 kBAdobe PDFView/Open
04_acknowledgements.pdf443.22 kBAdobe PDFView/Open
05_contents.pdf14.95 kBAdobe PDFView/Open
06_listoftables.pdf7.26 kBAdobe PDFView/Open
07_listoffigures.pdf19.83 kBAdobe PDFView/Open
08_listofabbreviations.pdf119.13 kBAdobe PDFView/Open
09_chapter1.pdf125.64 kBAdobe PDFView/Open
10_chapter2.pdf162.57 kBAdobe PDFView/Open
11_chapter3.pdf1.29 MBAdobe PDFView/Open
12_chapter4.pdf1.37 MBAdobe PDFView/Open
13_chapter5.pdf776.41 kBAdobe PDFView/Open
14_conclusion.pdf31.92 kBAdobe PDFView/Open
15_references.pdf157.47 kBAdobe PDFView/Open
16_listofpublications.pdf157.5 kBAdobe PDFView/Open
80_recommendation.pdf124.71 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: