Image encryption based on chaos technique

العناوين الأخرى

تشفير الصور باستخدام تقنيات الفوضى

مقدم أطروحة جامعية

Abu Hammad, Hudhayfah Z. A.

مشرف أطروحة جامعية

al-Ani, Muzhir Shaban

أعضاء اللجنة

al-Bahadili, Husayn
Qaqish, Malik

الجامعة

جامعة عمان العربية

الكلية

كلية العلوم الحاسوبية و المعلوماتية

القسم الأكاديمي

قسم علم الحاسوب

دولة الجامعة

الأردن

الدرجة العلمية

ماجستير

تاريخ الدرجة العلمية

2011

الملخص الإنجليزي

The significant growth of multimedia has resulted in millions of images and videos to be exchanged by means of networking and telecommunications.

These data needs to be protected safely and effectively.

Hence the need to find algorithms and means to encrypt images.

Chaos technology is one of the most important methods used to carry out encryption images.

This thesis focuses on trying to develop technical competency chaos, as many of the algorithms, the image resulting from the decryption process is different from the original image, even if that difference is invisible with the naked eye, without the means of measurement adopted.

This method focuses on creating chaos in the image by moving parts of the image and jumbling it at random, with recording the moves moves in a particular key that is encrypted as well.

In addition , the color values are also modified in pixels with each transfer to distort the image as much as possible, and at the same time ensure the return of the image to the original position without any change.

The algorithm is based on repeating the transfer process, down from level to level.

The results we have obtained are excellent, where the image generated from the decrypting process fully matches the original image.

It has been confirmed through the application of measurement tools adopted to clarify the results.

A set of future updates on algorithm could be applied to make it more efficient.

التخصصات الرئيسية

الهندسة الكهربائية

الموضوعات

عدد الصفحات

66

قائمة المحتويات

Table of contents.

Abstract.

Abstract in Arabic.

Chapter One : Introduction.

Chapter Two : Image encryption.

Chapter Three : Implemented system.

Chapter Four : Result and analysis.

Chapter Five : Result and analysis.

References.

نمط استشهاد جمعية علماء النفس الأمريكية (APA)

Abu Hammad, Hudhayfah Z. A.. (2011). Image encryption based on chaos technique. (Master's theses Theses and Dissertations Master). Amman Arab University, Jordan
https://search.emarefa.net/detail/BIM-522832

نمط استشهاد الجمعية الأمريكية للغات الحديثة (MLA)

Abu Hammad, Hudhayfah Z. A.. Image encryption based on chaos technique. (Master's theses Theses and Dissertations Master). Amman Arab University. (2011).
https://search.emarefa.net/detail/BIM-522832

نمط استشهاد الجمعية الطبية الأمريكية (AMA)

Abu Hammad, Hudhayfah Z. A.. (2011). Image encryption based on chaos technique. (Master's theses Theses and Dissertations Master). Amman Arab University, Jordan
https://search.emarefa.net/detail/BIM-522832

لغة النص

الإنجليزية

نوع البيانات

رسائل جامعية

رقم السجل

BIM-522832