dc.contributor.advisor |
Alam, Prof. Dr. Kazi Md. Rokibul |
|
dc.contributor.author |
Mondal, Arindom |
|
dc.date.accessioned |
2018-12-24T10:21:29Z |
|
dc.date.available |
2018-12-24T10:21:29Z |
|
dc.date.copyright |
2018 |
|
dc.date.issued |
2018-07 |
|
dc.identifier.other |
ID 1507503 |
|
dc.identifier.uri |
http://hdl.handle.net/20.500.12228/475 |
|
dc.description |
This thesis is submitted to the Department of Computer Science and Engineering, Khulna University of Engineering & Technology in partial fulfillment of the requirements for the degree of Master of Science in Engineering in Computer Science and Engineering, July 2018. |
en_US |
dc.description |
Cataloged from PDF Version of Thesis. |
|
dc.description |
Includes bibliographical references (pages 49-52). |
|
dc.description.abstract |
This thesis proposes a multi-stage encryption technique to enhance the level of secrecy of
image to facilitate its secure transmission through the public network. A vast number of
researches have been done on image secrecy. The existing image encryption techniques
like visual cryptography (VC), steganography, and watermarking etc. while are applied
individually; usually they cannot provide unbreakable secrecy. Through combining several
separate techniques, a hybrid multi-stage encryption technique is proposed in this thesis,
which provides nearly unbreakable image secrecy, while the encryption/decryption time
remains almost the same of the exiting techniques. The technique consecutively exploits
VC, steganography and one time pad (OTP). At first it encrypts the input image using VC,
i.e., splits the pixels of the input image into multiple shares to make it unpredictable. Then
after the pixel to binary conversion within each share, the exploitation of steganography
detects the least significant bits (LSBs) from each chunk within each share. At last, OTP
encryption technique is applied on LSBs along with randomly generated OTP secret key to
generate the ultimate cipher image. Besides, prior to sending the OTP key to the receiver,
first it is converted from binary to integer and then an asymmetric cryptosystem is applied
to encrypt it and thereby the key is delivered securely. Finally, the outcome, the time
requirement of encryption and decryption, the security and statistical analyses of the
proposed technique are evaluated and compared with existing techniques. |
en_US |
dc.description.statementofresponsibility |
Arindom Mondal |
|
dc.format.extent |
53 pages |
|
dc.language.iso |
en_US |
en_US |
dc.publisher |
Khulna University of Engineering & Technology (KUET), Khulna, Bangladesh |
en_US |
dc.rights |
Khulna University of Engineering & Technology (KUET) thesis/dissertation/internship reports are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. |
|
dc.subject |
Multi-Stage Encryption Technique |
en_US |
dc.subject |
Image Encryption Techniques |
en_US |
dc.subject |
Cryptosystem |
en_US |
dc.title |
An Approach to Ensure the Secrecy of Scene Images |
en_US |
dc.type |
Thesis |
en_US |
dc.description.degree |
Master of Science in Engineering in Computer Science and Engineering |
|
dc.contributor.department |
Department of Computer Science and Engineering |
|