Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/521445
Title: New Chaos based Secure Image Encryption and Analysis
Researcher: Suman, Rajiv Ranjan
Guide(s): Mandal, Tarni
Keywords: Mathematics
Mathematics Interdisciplinary Applications
Physical Sciences
University: National Institute of Technology Jamshedpur
Completed Date: 2023
Abstract: newline Images have now become integral parts of digital data stored and processed in computer databases and transferred over the Internet. Confidentiality of such digital images newlineis a major concern. This thesis is focused on development of three image encryption newlinealgorithms based on permutation (confusion) and pixel value modification (diffusion) newlineprocesses with the help of pseudo random number sequences (PRNS) generated by newlinechaotic mathematical functions. High computational overhead resulting in considerable newlinedelay in encryption/decryption process is the main limitations of most of the encryption newlineschemes reported in literature during the last two decades. The proposed algorithms newlinenot only fulfill the requirement of robustness against attacks, but also execute very fast newlineeven on most resource constrained systems. This thesis describes a few Pseudo Random Number Generators (PRNG) and their use in designing new chaos based cryptosystems. As the strength and complexity of the crypto-systems are highly dependent on newlinethe quality of PRNG used, multiple chaotic maps are combined and used to design new newlineimproved PRNG with higher randomness as well as fast execution speed. Operations newlinelike XOR and DNA computations, which have very low computational overhead, are newlineused for pixel substitution (diffusion) process. Efforts were made to reduce the overall newlinecomputational complexity of the algorithms while maintaining their security strength. newlineThe experimental outcomes of our proposed algorithms are encouraging and competitive when compared with standard values and results of other algorithms published in newlinethe literature. The suggested algorithms run with minimal computational cost, making newlinethem robust and trustful encryption schemes for resource restricted systems. These algorithms can be extended for encrypting audio, video and text data as well. Further, we newlineanalyzed the present security trends in Indian e-governance system and speculated the newlinefuture trends
Pagination: 156
URI: http://hdl.handle.net/10603/521445
Appears in Departments:Department of Mathematics

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File196.26 kBAdobe PDFView/Open
02_prelim pages.pdf1.42 MBAdobe PDFView/Open
03_content.pdf325.19 kBAdobe PDFView/Open
04_abstract.pdf256.65 kBAdobe PDFView/Open
05_chapter 1.pdf4.39 MBAdobe PDFView/Open
06_chapter 2.pdf2.43 MBAdobe PDFView/Open
07_chapter 3.pdf6.65 MBAdobe PDFView/Open
08_chapter 4.pdf9.64 MBAdobe PDFView/Open
09_chapter 5.pdf11.16 MBAdobe PDFView/Open
11_annexures.pdf2.8 MBAdobe PDFView/Open
80_recommendation.pdf375.9 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: