Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/448744
Title: Security considerations for image communication
Researcher: kaur, Gurpreet
Guide(s): Agarwal,Rekha
Keywords: Computer Science
Computer Science Information Systems
Engineering and Technology
University: Guru Gobind Singh Indraprastha University
Completed Date: 2021
Abstract: With ever expanding world of digital gadgets and internet services, the information sharing over open networks has also increased manifolds. Thus, protection and security of crucial information from unauthentic usage is an issue of concern. In particular, the security of image information in various application domains like medical, military, biometrics or in banking services is a big challenge. The classical encryption techniques meant for data encryption like AES (Advanced encryption standard) or DES (data Encryption standard) are not suitable for image encryption due to redundancy and highly correlated adjacent image pixels that lead to data inefficiency while transmission. Another reason is that the text encryption methods lack in sufficient speed and power in confusion-diffusion of image data. The images consist of bulk data and encryption may require several rounds of confusion diffusion in order to attain a certain level of secrecy. This makes the process time consuming. Secondly, the algorithm developed for encryption should be optimized for complexity. In other words, there should be a compromise in time and complexity. Thus, the main objective of this work is to design and develop an image security algorithm that may not require several rounds of encryption and moreover it should not be too complex for its hardware implementation. Optical transforms have inherent property of high speed and massive parallelism. However optical implementation requires spatial modulators, lenses and charged coupled devices that need to be alienated very precisely for error free recovery. Therefore, mathematical modelling of these transforms has been extensively used in literature for developing various image encryption algorithms. However, there are certain limitations associated with smaller key space, blind decryption and linearity in the transforms that make the algorithm vulnerable to potential attacks. As a solution to the smaller key space, various researchers have combined chaos-based permutation or substitution or
Pagination: xix,206
URI: http://hdl.handle.net/10603/448744
Appears in Departments:University School of Information and Communication Technology

Files in This Item:
File Description SizeFormat 
80_recommendation.pdfAttached File306.46 kBAdobe PDFView/Open
abstract.pdf101.68 kBAdobe PDFView/Open
chapter 1.pdf1.74 MBAdobe PDFView/Open
chapter 2.pdf622.76 kBAdobe PDFView/Open
chapter 3.pdf7.88 MBAdobe PDFView/Open
chapter 5.pdf29.17 MBAdobe PDFView/Open
chapter 6.pdf1.46 MBAdobe PDFView/Open
chapter 7.pdf702.48 kBAdobe PDFView/Open
prelims.pdf268.51 kBAdobe PDFView/Open
title.pdf114.34 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: