Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/333459
Title: | Performance analysis of diverse techniques to improve the confidentiality of image Cryptosystems |
Researcher: | Geetha, P |
Guide(s): | Jayanthi, V S and Jayanthi, A N |
Keywords: | Wireless Network Cryptography Encryption |
University: | Anna University |
Completed Date: | 2019 |
Abstract: | Development in technology has led to the improvisation of various tools in communication which has made transfer of information easier. Exchange of digital data between the communicating parties in a protected and controlled environment is the need of the day. With the advancement in the connectivity among various digital entities, the access to outside world has increased to a larger extent. Measures to avoid disclosure of information by any unauthorized users before enduring any loss of information should be taken care of. Confidentiality, integrity and authentication are the three important security features needed to be addressed in the secured transmission of data. Encryption offers an appropriate solution to achieve these security features. In this regard, an attempt to explore the possibilities of combining various encryption techniques for secured transmission of images has been done in this work. This thesis provides a structured and comprehensive study of various encryption techniques to offer confidentiality, authentication and integrity in transmission of images. A cipher scheme using two bit and four bit pixel expansion to divide the image into meaningless shares is done using two out of two visual cryptography. The bit planes obtained by binary bit plane decomposition are further diffused to uncorrelate the pixel values. These shares are encrypted using the symmetric cipher RC6 to provide confidentiality. The quality of the decrypted image is analyzed using image quality parameters such as Peak Signal to Noise Ratio, Mean Squared Error, Correlation Coefficient and Structural Similarity Index Measure. The resistance of the cryptosystem against the statistical attacks is analyzed using histogram analysis and correlation of adjacent pixels. A security system using electronic code book block modes using DNA cryptography wherein the image is diffused through the asymmetric encryption scheme RSA is compared with the same scheme without using block modes. The performance of the encryption scheme is also a |
Pagination: | xviii,154 p. |
URI: | http://hdl.handle.net/10603/333459 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 18.25 kB | Adobe PDF | View/Open |
02_certificates.pdf | 243.14 kB | Adobe PDF | View/Open | |
03_vivaproceedings.pdf | 587.2 kB | Adobe PDF | View/Open | |
04_bonafidecertificate.pdf | 363.63 kB | Adobe PDF | View/Open | |
05_abstracts.pdf | 177.44 kB | Adobe PDF | View/Open | |
06_acknowledgements.pdf | 339.28 kB | Adobe PDF | View/Open | |
07_contents.pdf | 189.48 kB | Adobe PDF | View/Open | |
08_listoftables.pdf | 176.01 kB | Adobe PDF | View/Open | |
09_listoffigures.pdf | 298.43 kB | Adobe PDF | View/Open | |
10_listofabbreviations.pdf | 181.76 kB | Adobe PDF | View/Open | |
11_chapter1.pdf | 408.4 kB | Adobe PDF | View/Open | |
12_chapter2.pdf | 466.69 kB | Adobe PDF | View/Open | |
13_chapter3.pdf | 1.15 MB | Adobe PDF | View/Open | |
14_chapter4.pdf | 1.09 MB | Adobe PDF | View/Open | |
15_chapter5.pdf | 1.76 MB | Adobe PDF | View/Open | |
16_conclusion.pdf | 354.33 kB | Adobe PDF | View/Open | |
17_references.pdf | 440.13 kB | Adobe PDF | View/Open | |
18_listofpublications.pdf | 292.7 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 206.4 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: