Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/521445
Full metadata record
DC FieldValueLanguage
dc.coverage.spatial
dc.date.accessioned2023-10-30T05:44:01Z-
dc.date.available2023-10-30T05:44:01Z-
dc.identifier.urihttp://hdl.handle.net/10603/521445-
dc.description.abstractnewline Images have now become integral parts of digital data stored and processed in computer databases and transferred over the Internet. Confidentiality of such digital images newlineis a major concern. This thesis is focused on development of three image encryption newlinealgorithms based on permutation (confusion) and pixel value modification (diffusion) newlineprocesses with the help of pseudo random number sequences (PRNS) generated by newlinechaotic mathematical functions. High computational overhead resulting in considerable newlinedelay in encryption/decryption process is the main limitations of most of the encryption newlineschemes reported in literature during the last two decades. The proposed algorithms newlinenot only fulfill the requirement of robustness against attacks, but also execute very fast newlineeven on most resource constrained systems. This thesis describes a few Pseudo Random Number Generators (PRNG) and their use in designing new chaos based cryptosystems. As the strength and complexity of the crypto-systems are highly dependent on newlinethe quality of PRNG used, multiple chaotic maps are combined and used to design new newlineimproved PRNG with higher randomness as well as fast execution speed. Operations newlinelike XOR and DNA computations, which have very low computational overhead, are newlineused for pixel substitution (diffusion) process. Efforts were made to reduce the overall newlinecomputational complexity of the algorithms while maintaining their security strength. newlineThe experimental outcomes of our proposed algorithms are encouraging and competitive when compared with standard values and results of other algorithms published in newlinethe literature. The suggested algorithms run with minimal computational cost, making newlinethem robust and trustful encryption schemes for resource restricted systems. These algorithms can be extended for encrypting audio, video and text data as well. Further, we newlineanalyzed the present security trends in Indian e-governance system and speculated the newlinefuture trends
dc.format.extent156
dc.languageEnglish
dc.relation
dc.rightsuniversity
dc.titleNew Chaos based Secure Image Encryption and Analysis
dc.title.alternative
dc.creator.researcherSuman, Rajiv Ranjan
dc.subject.keywordMathematics
dc.subject.keywordMathematics Interdisciplinary Applications
dc.subject.keywordPhysical Sciences
dc.description.note
dc.contributor.guideMandal, Tarni
dc.publisher.placeJamshedpur
dc.publisher.universityNational Institute of Technology Jamshedpur
dc.publisher.institutionDepartment of Mathematics
dc.date.registered2016
dc.date.completed2023
dc.date.awarded2023
dc.format.dimensions
dc.format.accompanyingmaterialDVD
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:Department of Mathematics

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File196.26 kBAdobe PDFView/Open
02_prelim pages.pdf1.42 MBAdobe PDFView/Open
03_content.pdf325.19 kBAdobe PDFView/Open
04_abstract.pdf256.65 kBAdobe PDFView/Open
05_chapter 1.pdf4.39 MBAdobe PDFView/Open
06_chapter 2.pdf2.43 MBAdobe PDFView/Open
07_chapter 3.pdf6.65 MBAdobe PDFView/Open
08_chapter 4.pdf9.64 MBAdobe PDFView/Open
09_chapter 5.pdf11.16 MBAdobe PDFView/Open
11_annexures.pdf2.8 MBAdobe PDFView/Open
80_recommendation.pdf375.9 kBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: