Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/356260
Title: Design and Analysis of Key Generation Algorithms for Secured Images
Researcher: Sharma, Alpana
Guide(s): Marriboyina, Venkatadri
Keywords: Computer Science
Computer Science Software Engineering
Engineering and Technology
University: Amity University Madhya Pradesh
Completed Date: 2021
Abstract: In the digital world, mode of communication type grows exponentially beyond newlineimagination. Due to the advancements in communication technologies, the invention of newlineMachine to Machine communication with the Internet of Things (IoT), the technology newlineadvancements in high-end computing devices lead to huge digital data transmission. newlineThereby, digital information not only comprises text, and it also has a large volume of newlinemultimedia data, video/audio, and image, comparatively heavier than the textual newlineinformation. newlineThere are certain sectors looking for secure communication especially newlineunderwater object identification in military communications, image transfer in newlinehealthcare data communications, enhance the security in data transfer in the machine to newlinemachine communications through images in the Internet of Things (IoT) and in digital newlineimage communication in smart city infrastructure. For digital image communication, newlinemany image encryption algorithms are available to protect the content to be delivered newlinebut, very few are at par with the desired goals i.e. speed, reliability and security. The newlinetransmission of an image needs to be fast, highly reliable and secure. Since newlinecommunication between digital devices takes place in a public network, the necessity newlineof security for digital images becomes vital. Therefore, applications grow exponentially newlinebut it requires faster digital data communication and with better image quality for object newlineidentification and secure information transmission. newlineIn the Present Digital Era communication with images, it is very essential to newlineapply state of the art computational techniques to enhance the underwater images to newlineknow the exact locations, features of the image underwater. Maintain the security in newlineunderwater images data transfer plays a vital role in military and other data-sensitive newlinecommunications since communication between digital devices takes place in an open newlinenetwork. The enhanced image needs to transfer from source to destination in a most newlinesecured transaction with a novel key generation for a secured image. newline
Pagination: 149
URI: http://hdl.handle.net/10603/356260
Appears in Departments:Computer Science and Engineering

Files in This Item:
File Description SizeFormat 
80_recommendation.pdfAttached File117.09 kBAdobe PDFView/Open
abstract.pdf47.74 kBAdobe PDFView/Open
appendix.pdf44.11 kBAdobe PDFView/Open
certificate.pdf243.5 kBAdobe PDFView/Open
chapter-1 introduction.pdf329.85 kBAdobe PDFView/Open
chapter-2.pdf550.25 kBAdobe PDFView/Open
chapter-3.pdf858.03 kBAdobe PDFView/Open
chapter-4.pdf972.3 kBAdobe PDFView/Open
chapter-5.pdf1.27 MBAdobe PDFView/Open
pre pages.pdf311.96 kBAdobe PDFView/Open
references.pdf242.8 kBAdobe PDFView/Open
title.pdf47.29 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: