Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/403310
Title: Development of New Cryptography Method Based on Novel ICA Algorithm
Researcher: Dheeraj Tandon
Guide(s): HARSH DEV and DEEPAK KUMAR SINGH
Keywords: Computer Science
Computer Science Cybernetics
Engineering and Technology
University: Dr. A.P.J. Abdul Kalam Technical University
Completed Date: 2022
Abstract: and#8213;Cryptology, or the study of cryptosystems, is divided into three categories. Cryptography is concerned with the design of cryptosystems, whereas cryptanalysis is concerned with the detection of cryptosystem breaches and security testing is concerned with the development of different applicable methods for assessing the security of the cryptosystem in question. These three domains are interwoven; security analysis is crucial when developing a cryptosystem, and evaluating its strength against analytics is also critical. Modern communication technologies, which rely on computers linked to networks, make all data more vulnerable to these threats. In addition, previously unnoticed problems have appeared. newlineIn a variety of disciplines, including communications and medical engineering, Independent Component Analysis (ICA) has been used to portray the Blind Source (BSS) Classification. On the other hand, its use in photo encryption and speech was unusual. Many unresolved mathematical problems underpin ICA and Principal Component Analysis (PCA) as a BSS-based approach for picture and audio encryption that uses the Blind Source Separation (BSS) as a safe encryption methodology. They use key signals to produce the right BSS issue with less particular encryption, avoiding the difficulties of key coding signals. The BSS-based approach may achieve a high level of security through construction, matrix mixing, and the creation of crucial signals. newlineBecause everyone nowadays wants to share their photographs over the network in a safe manner, photo encryption plays a vital role in information security. Encryption may be used to ensure security in photographs. Humans have been able to interact with one another through various techniques such as the Internet, SMS, Facebook, Google Talk, and other communication technologies since the invention of communication technology. However, as the number of individuals using the Internet grows, there is a need to secure the information that is exchanged online.
Pagination: 
URI: http://hdl.handle.net/10603/403310
Appears in Departments:dean PG Studies and Research

Files in This Item:
File Description SizeFormat 
80_recommendation.pdfAttached File247.42 kBAdobe PDFView/Open
abstract.pdf130.62 kBAdobe PDFView/Open
acknowledgement.pdf130.31 kBAdobe PDFView/Open
certificate.pdf333.68 kBAdobe PDFView/Open
chapter1.pdf346.53 kBAdobe PDFView/Open
chapter2.pdf191.67 kBAdobe PDFView/Open
chapter3.pdf502.2 kBAdobe PDFView/Open
chapter4.pdf914.28 kBAdobe PDFView/Open
chapter5.pdf451.79 kBAdobe PDFView/Open
chapter6.pdf554.62 kBAdobe PDFView/Open
chapter7.pdf542.44 kBAdobe PDFView/Open
chapter8.pdf716.6 kBAdobe PDFView/Open
declration.pdf126.96 kBAdobe PDFView/Open
list of table and graphs .pdf420.34 kBAdobe PDFView/Open
table of contents.pdf251.92 kBAdobe PDFView/Open
title page.pdf28.36 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: