Please use this identifier to cite or link to this item:
http://dspace.dtu.ac.in:8080/jspui/handle/repository/14681
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | KATIYAR, SAURABH | - |
dc.date.accessioned | 2016-05-04T10:05:32Z | - |
dc.date.available | 2016-05-04T10:05:32Z | - |
dc.date.issued | 2016-04 | - |
dc.identifier.uri | http://dspace.dtu.ac.in:8080/jspui/handle/repository/14681 | - |
dc.description.abstract | ABSTRACT Communication is a meaningful exchange of information between two or more entities. Images and documents travel widely and rapidly, in multiple manifestations, through email and across the Internet. In this era of e-communication i.e. electronic transmission of information that has been encoded digitally (as for storage and processing by computers), the first concern is about the security of the content which is shared during communication. While the information is over net, it is next to impossible to keep a track of where the information or the copy of information is going through. Security is a continuous process via which data can be secured from several active and passive attacks. Several security techniques can be used to ensure the integrity, authentication and confidentiality of the information. Cryptography is one of the primitive way to secure the information from hackers or intruders. Encryption technique protects the confidentiality of a message or information which can be in the form of multimedia (text, image, and video).Since there are limited encryption algorithm but humongous key space, therefore, the secrecy of encryption depends on the secret key. In this work, a new symmetric image encryption algorithm is proposed based on ECC on image data. Intensity value of each pixel is mapped to a random DNA sequence which provided extra level of security in our scheme. In ECC, input data is mapped to points on elliptic curve. Different encoding techniques are used for this purpose. One of the best suited techniques is Koblitz’s method. Our scheme has also used Koblitz’s method for converting intensity of each pixel of the original image into points of elliptic curve. This is the pre-processing step of ECC. On the other hand, during decryption every point on elliptic curve is converted or deciphered into intensity value of original image. This is post processing step of ECC. Pre and post processing steps are performed using Koblitz’s method. | en_US |
dc.language.iso | en_US | en_US |
dc.relation.ispartofseries | TD 2045; | - |
dc.subject | ELLIPTIC CURVE | en_US |
dc.subject | CRYPTOGRAPHY TECHNIQUE | en_US |
dc.subject | DATA SEQUENCE | en_US |
dc.title | ELLIPTIC CURVE CRYPTOGRAPHY TECHNIQUE ON DATA SEQUENCE | en_US |
dc.type | Thesis | en_US |
Appears in Collections: | M.E./M.Tech. Computer Technology & Applications |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
saurabh_thesis.pdf | 2.02 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.