Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/333459
Title: Performance analysis of diverse techniques to improve the confidentiality of image Cryptosystems
Researcher: Geetha, P
Guide(s): Jayanthi, V S and Jayanthi, A N
Keywords: Wireless Network
Cryptography
Encryption
University: Anna University
Completed Date: 2019
Abstract: Development in technology has led to the improvisation of various tools in communication which has made transfer of information easier. Exchange of digital data between the communicating parties in a protected and controlled environment is the need of the day. With the advancement in the connectivity among various digital entities, the access to outside world has increased to a larger extent. Measures to avoid disclosure of information by any unauthorized users before enduring any loss of information should be taken care of. Confidentiality, integrity and authentication are the three important security features needed to be addressed in the secured transmission of data. Encryption offers an appropriate solution to achieve these security features. In this regard, an attempt to explore the possibilities of combining various encryption techniques for secured transmission of images has been done in this work. This thesis provides a structured and comprehensive study of various encryption techniques to offer confidentiality, authentication and integrity in transmission of images. A cipher scheme using two bit and four bit pixel expansion to divide the image into meaningless shares is done using two out of two visual cryptography. The bit planes obtained by binary bit plane decomposition are further diffused to uncorrelate the pixel values. These shares are encrypted using the symmetric cipher RC6 to provide confidentiality. The quality of the decrypted image is analyzed using image quality parameters such as Peak Signal to Noise Ratio, Mean Squared Error, Correlation Coefficient and Structural Similarity Index Measure. The resistance of the cryptosystem against the statistical attacks is analyzed using histogram analysis and correlation of adjacent pixels. A security system using electronic code book block modes using DNA cryptography wherein the image is diffused through the asymmetric encryption scheme RSA is compared with the same scheme without using block modes. The performance of the encryption scheme is also a
Pagination: xviii,154 p.
URI: http://hdl.handle.net/10603/333459
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File18.25 kBAdobe PDFView/Open
02_certificates.pdf243.14 kBAdobe PDFView/Open
03_vivaproceedings.pdf587.2 kBAdobe PDFView/Open
04_bonafidecertificate.pdf363.63 kBAdobe PDFView/Open
05_abstracts.pdf177.44 kBAdobe PDFView/Open
06_acknowledgements.pdf339.28 kBAdobe PDFView/Open
07_contents.pdf189.48 kBAdobe PDFView/Open
08_listoftables.pdf176.01 kBAdobe PDFView/Open
09_listoffigures.pdf298.43 kBAdobe PDFView/Open
10_listofabbreviations.pdf181.76 kBAdobe PDFView/Open
11_chapter1.pdf408.4 kBAdobe PDFView/Open
12_chapter2.pdf466.69 kBAdobe PDFView/Open
13_chapter3.pdf1.15 MBAdobe PDFView/Open
14_chapter4.pdf1.09 MBAdobe PDFView/Open
15_chapter5.pdf1.76 MBAdobe PDFView/Open
16_conclusion.pdf354.33 kBAdobe PDFView/Open
17_references.pdf440.13 kBAdobe PDFView/Open
18_listofpublications.pdf292.7 kBAdobe PDFView/Open
80_recommendation.pdf206.4 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: