Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/301286
Title: | Investigation on diffusion and confusion based image encryption algorithms |
Researcher: | Premkumar R |
Guide(s): | Anand S |
Keywords: | Engineering and Technology Computer Science Computer Science Information Systems Image Encryption Algorithms Image Encryption |
University: | Anna University |
Completed Date: | 2019 |
Abstract: | With the rapid improvement in information technology security is a major concern in the transmission of digital data over various networks and data storage Security mechanisms must be implemented to provide the required protection to the transmitted data Image encryption is a technique which provides security to images by transforming the image to an unreadable format Access control privacy validation and copyright protection are an integral part of this process Three diverse approaches to shield computerized information from unapproved spying are cryptography steganography and watermarking Among these three systems cryptography has turned out to be one of the significant approaches to give maximum security Cryptography manages the advancement of procedures for changing over data amongst coherent and incoherent structures It manages the substance secrecy and access control through encryption and decryption algorithms which are operated by keys Encryption and decryption techniques that use the same secret key are private key cryptography Alternately keys are different for both encryption and decryption such cryptographic methods are known as public key cryptography Any crypto system must satisfy confusion and diffusion property to provide security Confusion property substitutes the pixel values whereas diffusion property rearranges the pixels of an image The limitation of conventional encryption methods are i takes more time to encrypt the plain image ii the size of decrypted plain text must be equal to the original text size Many researchers presented chaos-based image encryption system and selective image encryption schemes for a faster execution of encryption/decryption Also genetic operator based encryption algorithm is presented in the literature in which the level of difficulty set for an unauthorized individual to break the encryption is heightened Nowadays transformation based image encryption algorithms are presented newline |
Pagination: | xiv, 117p. |
URI: | http://hdl.handle.net/10603/301286 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 25.35 kB | Adobe PDF | View/Open |
02_certificates.pdf | 567.69 kB | Adobe PDF | View/Open | |
03_abstracts.pdf | 11.49 kB | Adobe PDF | View/Open | |
04_acknowledgements.pdf | 443.22 kB | Adobe PDF | View/Open | |
05_contents.pdf | 14.95 kB | Adobe PDF | View/Open | |
06_listoftables.pdf | 7.26 kB | Adobe PDF | View/Open | |
07_listoffigures.pdf | 19.83 kB | Adobe PDF | View/Open | |
08_listofabbreviations.pdf | 119.13 kB | Adobe PDF | View/Open | |
09_chapter1.pdf | 125.64 kB | Adobe PDF | View/Open | |
10_chapter2.pdf | 162.57 kB | Adobe PDF | View/Open | |
11_chapter3.pdf | 1.29 MB | Adobe PDF | View/Open | |
12_chapter4.pdf | 1.37 MB | Adobe PDF | View/Open | |
13_chapter5.pdf | 776.41 kB | Adobe PDF | View/Open | |
14_conclusion.pdf | 31.92 kB | Adobe PDF | View/Open | |
15_references.pdf | 157.47 kB | Adobe PDF | View/Open | |
16_listofpublications.pdf | 157.5 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 124.71 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: