• Login
    View Item 
    •   DSpace Home
    • PH.D.THESIS
    • SCHOOL OF COMPUTING SCIENCE & ENGINEERING
    • View Item
    •   DSpace Home
    • PH.D.THESIS
    • SCHOOL OF COMPUTING SCIENCE & ENGINEERING
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    SECURED CHAOTIC MAP TECHNIQUE FOR DIGITAL IMAGES

    Thumbnail
    View/Open
    SCSE_202307_Supriay Khaitan_SECURED CHAOTIC MAP TECHNIQUE FOR DIGITAL IMAGES (5.005Mb)
    Date
    2022-12
    Author
    KHAITAN, SUPRIYA
    SAGAR (Supervisor), Dr. SHRDDHA
    Metadata
    Show full item record
    Abstract
    The onset of the pandemic made companies go digital; this led to massive data transfer hence the need for highly secure and fast data encryption techniques. Most real-time applications in mobile communication, military, and private organizations often require safe and reliable data monitoring and transfer. As one of the most crucial areas of information security, chaos based image encryption has attracted academics and scientists over the past few years. Several studies with different approaches and new algorithms to make image encryption systems safer were proposed in recent studies. Traditional encryption techniques are challenging to understand, complex to implement, slow for encryption, and unsuitable for real-time and multimedia applications. Hence many researchers used chaos-based cryptography. Chaotic-based cryptosystems take full advantage of chaotic dynamics, diffusion, and confusion performances to achieve adequate security. In diffusion, ciphertext and plaintext form a complex relationship, while confusion emphasizes how sensitive the ciphertext is to the plaintext. A small change in the plaintext will significantly impact the ciphertext. However, the main problem with most chaos-based algorithms is the inadequacy of the chaotic maps they implement. Hence, most researchers used more than one chaotic map or a higher dimensional chaotic map in the system. We seek to develop new, secure, reliable, Symmetric, and asymmetric cryptosystems based on chaos theory. We aim to incorporate chaotic dynamics into cryptography to create new asymmetric and symmetric algorithms using the lower dimensional chaotic map. The main work can be summarized as follows: i. We design and test a robust, efficient symmetric key stream cipher based on chaos theory. The key was generated using based on a 3-dimensional Logistic Map. The proposed techniques use a secure logistic map with XOR operators and shift operations to perform encryption. The tests we iv conducted determined that the proposed scheme is cryptographically sound and meets the needs of different analyses. ii. The chaotic maps used in chaos-based cryptosystems in digital devices show dynamical degradation with finite precision. Considering that chaotic maps are based on real numbers, this has the disadvantage of high computation costs and inefficient resource use. Hence, we used both the real and imaginary parts of one superior logistic map for key generation. An image is scrambled and diffused by combining a chaotic sequence with a secret key entered by the user. The image is then evaluated using various measures such as NPCR, UACI, MSE, PSNR, and entropy. iii. Based on the chaotic Tent map, we propose a secure and robust system for the implementation of asymmetric key cryptosystems using chaos based techniques. For the construction of public and private keys, a salp swarm optimization algorithm was used, along with a chaotic one dimensional tent map, . In order to ensure good cryptography, the key space must be large, so that brute-force attacks cannot be performed against it, the secret key must be highly sensitive, and pseudo randomness should be employed in order to hide the correlation between the key, the plaintext, and the ciphertext. It has been demonstrated through security analyses and experiment results that the proposed chaos-based cryptosystem is complex and provide confusion and diffusion.
    URI
    http://10.10.11.6/handle/1/15032
    Collections
    • SCHOOL OF COMPUTING SCIENCE & ENGINEERING [41]

    DSpace software copyright © 2002-2016  DuraSpace
    Contact Us | Send Feedback
    Theme by 
    Atmire NV
     

     

    Browse

    All of DSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

    My Account

    LoginRegister

    DSpace software copyright © 2002-2016  DuraSpace
    Contact Us | Send Feedback
    Theme by 
    Atmire NV