New image encryption approaches using combinational permutation and image transformation techniques

العناوين الأخرى

طرق تشفير جديدة باستخدام تقنيات دمج التبديل و تقنيات تشفير الصور

مقدم أطروحة جامعية

al-Kurji, Muhammad Katia Jawdah

مشرف أطروحة جامعية

Ulwan, Majid Abd al-Nabi

أعضاء اللجنة

Ali, Ramzi Salim
Marhun, Ali Fadil
Abd al-Qadir, Sabah S.

الجامعة

جامعة البصرة

الكلية

كلية الهندسة

القسم الأكاديمي

قسم الهندسة الكهربائية

دولة الجامعة

العراق

الدرجة العلمية

ماجستير

تاريخ الدرجة العلمية

2012

الملخص الإنجليزي

-The development of information technology and the rapid growth of computer networks allowed multimedia data, such as digital images, to be easily transmitted in open networks like the internet.

The security of multimedia data is becoming more and more important.

In this thesis, permutation techniques based image encryption approaches are presented.

Each approach is combined with other permutation techniques to obtain the encrypted image.

The first proposed approach is cascaded Iterated permutation (CIP) that iterated the pixels permutation of a grayscale image (256x256 pixels) for several times.

In the second proposed approach which is Cascaded Combined Permutation (CCP) decomposed the secrete grayscale image (256x256 pixels) into four quarters.

Each part is encrypted by using different permutation technique.

The encrypted quarters are combined and further encrypted with another permutation technique to produce the encrypted image.

The resulting encryption has several key points of strength such as the sequence order.

Another key points are the coefficients a, b for each permutation algorithm.

The permutation based image encryption technique gives a good encryption in terms of MSE and correlation For more security, it is needed to change the pixels position and value instead of changing position only.

FFT increase the degree of security by altering the pixels value.

The merging of the two approaches leds to strong encryption taking the benefits of each of the merged approach.

Another transform that changing the pixels position are Hadamard Transform (HT) and Walsh-Hadamard Transform (WHT).

So, the merging of the two approaches (CIP and CCP) with (HT & WHT) leds to an efficient and good encryption while conserve the size of encrypted image unchanged.

MATLAB 2008 is used in this thesis to simulate these algorithms.

التخصصات الرئيسية

تكنولوجيا المعلومات وعلم الحاسوب

الموضوعات

عدد الصفحات

104

قائمة المحتويات

Table of contents.

Abstract.

Chapter One : introduction to the encryption.

Chapter Two : permutation.

Chapter Three : the proposed method.

Chapter Four : fast Fourier transform based image encryption.

Chapter Five : Hadamard and Walsh-Hadamard transform.

Chapter Six : conclusions and the future work.

References.

نمط استشهاد جمعية علماء النفس الأمريكية (APA)

al-Kurji, Muhammad Katia Jawdah. (2012). New image encryption approaches using combinational permutation and image transformation techniques. (Master's theses Theses and Dissertations Master). University of Basrah, Iraq
https://search.emarefa.net/detail/BIM-317171

نمط استشهاد الجمعية الأمريكية للغات الحديثة (MLA)

al-Kurji, Muhammad Katia Jawdah. New image encryption approaches using combinational permutation and image transformation techniques. (Master's theses Theses and Dissertations Master). University of Basrah. (2012).
https://search.emarefa.net/detail/BIM-317171

نمط استشهاد الجمعية الطبية الأمريكية (AMA)

al-Kurji, Muhammad Katia Jawdah. (2012). New image encryption approaches using combinational permutation and image transformation techniques. (Master's theses Theses and Dissertations Master). University of Basrah, Iraq
https://search.emarefa.net/detail/BIM-317171

لغة النص

الإنجليزية

نوع البيانات

رسائل جامعية

رقم السجل

BIM-317171