Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/423199
Title: | Development of Efficient Color Image Encryption Techniques Using Evolutionary Approaches |
Researcher: | Kaur, Manjit |
Guide(s): | Kumar, Vijay |
Keywords: | Computer Science Computer Science Software Engineering Engineering and Technology Image analysis Image encryption |
University: | Thapar Institute of Engineering and Technology |
Completed Date: | 2019 |
Abstract: | The advancements in multimedia applications are rapidly increasing nowadays. A number of confidential images are transferred over the public networks day-by-day. Therefore, secure transmission of images has become a significant research area. Several image encryption techniques have been designed to achieve the particular necessities raised by different users. The image encryption techniques convert confidential image into a noisy image using secret key. The actual image is recovered if and only if the receiver has an authenticated secret key. Various techniques such as chaotic maps, evolutionary, DNA, cellular automata, etc. have been used to encrypt the images. Image encryption differs from text encryption as a result of few numbers of inherent characteristics such as huge size and redundancy. The traditional text encryption techniques fail to handle huge size and redundancy of images. The main challenges of image encryption are robustness against attacks, keyspace, key sensitivity, and diffusion. The chaotic maps are extensively utilized in the field of image encryption to generate the secret keys. However, these maps suffer from parameter tuning problem. Recent studies have shown that the improper selection of parameter values makes secret keys generated from chaotic system vulnerable. Therefore, many meta-heuristic techniques have been introduced in the literature for image encryption to improve the selection of chaotic system s parameters. However, these techniques suffer from poor computational speed. Also, designing an efficient multi-objective fitness function is still a challenging issue. To overcome these issues, meta-heuristic based image encryption techniques are proposed in this thesis. An efficient image encryption technique in nonsubsampled contourlet transform using genetic algorithm (IGN) is proposed. Initially, nonsubsampled contourlet transform is utilized to decompose the input image into sub-bands. The beta chaotic map is used to develop a pseudo-random key that encrypts the c |
Pagination: | xiv, 148p. |
URI: | http://hdl.handle.net/10603/423199 |
Appears in Departments: | Department of Computer Science and Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 66.02 kB | Adobe PDF | View/Open |
02_prelim pages.pdf | 566.93 kB | Adobe PDF | View/Open | |
03_content.pdf | 48.44 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 84.6 kB | Adobe PDF | View/Open | |
05_chapter 1.pdf | 1.1 MB | Adobe PDF | View/Open | |
06_chapter 2.pdf | 1.06 MB | Adobe PDF | View/Open | |
07_chapter 3.pdf | 2.23 MB | Adobe PDF | View/Open | |
08_chapter 4.pdf | 866.08 kB | Adobe PDF | View/Open | |
09_chapter 5.pdf | 730.34 kB | Adobe PDF | View/Open | |
10_chapter 6.pdf | 3.75 MB | Adobe PDF | View/Open | |
11_chapter 7.pdf | 380.42 kB | Adobe PDF | View/Open | |
12_chapter 8.pdf | 85.84 kB | Adobe PDF | View/Open | |
13_annexures.pdf | 125.39 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 110.16 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: