Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/338645
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.coverage.spatial | Design and analysis of chaotic map and chaotic key based encryption algorithms for digital images | |
dc.date.accessioned | 2021-09-02T03:55:17Z | - |
dc.date.available | 2021-09-02T03:55:17Z | - |
dc.identifier.uri | http://hdl.handle.net/10603/338645 | - |
dc.description.abstract | The availability and increased usage of multimedia applications has led features such as compression and security gain considerable importance. Digital images are used in many applications such as defense, space, medicine, industry and education. Secure storage and transmission of digital images are essential to avoid major threats and attacks. Cryptography plays an important role in protecting sensitive images from theft and alteration. Conventional data encryption techniques cannot be used on images due to the inherent features of the images such as bulky data, redundancy and high correlation among pixels. Discrete chaotic map based image encryption schemes are most popular in view of their excellent features such as extreme sensitivity to small variations in initial conditions, ergodicity and unpredictability. One of the popular one-dimensional chaotic maps used in the literature is the logistic map considering its low computational cost and simplicity. The focus of this research work is on three major objectives. The first objective is to construct a novel key generation algorithm and to realize a computationally secure double image cryptosystem that possesses combined encryption and compression characteristics and also a single image encryption scheme without compression. The second objective is to design a onedimensional chaotic map suitable for cryptographic applications and to mathematically and experimentally prove the existence of chaos in the designed chaotic map. The third objective is to construct an authenticated secure image cryptosystem using a novel integer-based key generation algorithm designed using a proposed chaotic map and to compare and analyze the encryption algorithms with the existing techniques. In the first part of the research, a key generation algorithm was proposed and a double image symmetric encryption scheme with combined compression and encryption was constructed. The keys used for encryption process have been generated using a novel modified convolution and chaotic mapping technique. First, the four most significant bits of the two images were extracted and combined after permutation employing the proposed logistic mapping. Also, cellular automata based diffusion was performed on the resultant image to strengthen the security further. In this work, both confusion and diffusion have been integrated thereby improvising the encryption scheme. Since two images are compressed and encrypted simultaneously, it is useful in real - time scenarios. Also, a single image encryption scheme without compression was proposed. The test of randomness of the key and the performance results for the proposed single image and double image encryption algorithms were found to be successful. These algorithms provide good robustness to occlusion and noise attack. Therefore, the proposed algorithms can be used for both storage and image newline | |
dc.format.extent | xvii,119 p. | |
dc.language | English | |
dc.relation | p.111-118 | |
dc.rights | university | |
dc.title | Design and analysis of chaotic map and chaotic key based encryption algorithms for digital images | |
dc.title.alternative | ||
dc.creator.researcher | Hanis, S | |
dc.subject.keyword | Engineering and Technology | |
dc.subject.keyword | Computer Science | |
dc.subject.keyword | Computer Science Information Systems | |
dc.subject.keyword | digital images | |
dc.subject.keyword | chaotic map | |
dc.description.note | ||
dc.contributor.guide | Amutha, R | |
dc.publisher.place | Chennai | |
dc.publisher.university | Anna University | |
dc.publisher.institution | Faculty of Information and Communication Engineering | |
dc.date.registered | ||
dc.date.completed | 2020 | |
dc.date.awarded | 2020 | |
dc.format.dimensions | 21cm | |
dc.format.accompanyingmaterial | None | |
dc.source.university | University | |
dc.type.degree | Ph.D. | |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 246.18 kB | Adobe PDF | View/Open |
02_certificates.pdf | 1.03 MB | Adobe PDF | View/Open | |
03_vivaproceedings.pdf | 998.28 kB | Adobe PDF | View/Open | |
04_bonafidecertificate.pdf | 314.68 kB | Adobe PDF | View/Open | |
05_abstracts.pdf | 174.46 kB | Adobe PDF | View/Open | |
06_acknowledgements.pdf | 340 kB | Adobe PDF | View/Open | |
07_contents.pdf | 202.68 kB | Adobe PDF | View/Open | |
08_listoftables.pdf | 295.86 kB | Adobe PDF | View/Open | |
09_listoffigures.pdf | 468.39 kB | Adobe PDF | View/Open | |
10_listofabbreviations.pdf | 173.48 kB | Adobe PDF | View/Open | |
11_chapter1.pdf | 1.62 MB | Adobe PDF | View/Open | |
12_chapter2.pdf | 2.32 MB | Adobe PDF | View/Open | |
13_chapter3.pdf | 8.5 MB | Adobe PDF | View/Open | |
14_chapter4.pdf | 8.67 MB | Adobe PDF | View/Open | |
15_chapter5.pdf | 4.04 MB | Adobe PDF | View/Open | |
16_conclusion.pdf | 548.57 kB | Adobe PDF | View/Open | |
17_references.pdf | 284.32 kB | Adobe PDF | View/Open | |
18_listofpublications.pdf | 256.82 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 397.64 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: