An Efficient Encryption Method to Enhance Security Using Nature Inspired Algorithm
| dc.contributor.guide | Satish Saini | |
| dc.coverage.spatial | ||
| dc.creator.researcher | Naveen Kumar | |
| dc.date.accessioned | 2025-04-22T11:39:07Z | |
| dc.date.available | 2025-04-22T11:39:07Z | |
| dc.date.awarded | 2025 | |
| dc.date.completed | 2025 | |
| dc.date.registered | 2021 | |
| dc.description.abstract | Due to the advancement in the internet and technology, the communication of digital newlinedata is increased by users to share their information from one place to another. The newlinedigital data is available in the various forms such as text, audio, image, and video. newlineHowever, out of these forms, image and video format is used to communicate newlineinformation in the various applications such as military, healthcare, and satellite. In newlinethis research, image format is taken into consideration to secure it on the internet. In newlinethe literature, encryption and steganography are the two approaches to secure the newlineimages. The encryption approach scrambles the secret image using a private key and newlinegives the encrypted image in the output whereas steganography approach hides the newlinesecret image in some cover media for security purposes. In this research, encryption newlineapproach is explored and deployed to secure the secret images. In the literature, newlinevarious conventional encryption methods are available such as AES, DES, Blow-fish, newlineand chaotic map. Out of these methods, chaotic map is more preferred over others due newlineto image contains a large amount of redundant pixels and high correlation between the newlinepixels. The chaotic map is highly sensitive to the input parameters. Thus, a little newlinechange in the input parameters changes a number of bits in the output which makes it newlinea perfect method for security purposes. Due to this property, the input parameter newlinevalues are optimal chosen before key generation in the encryption method using the newlinenature-inspired algorithm. newline | |
| dc.description.note | ||
| dc.format.accompanyingmaterial | DVD | |
| dc.format.dimensions | ||
| dc.format.extent | ||
| dc.identifier.researcherid | ||
| dc.identifier.uri | http://hdl.handle.net/10603/634484 | |
| dc.language | English | |
| dc.publisher.institution | Department of Electronics and Communication Engineering | |
| dc.publisher.place | Mandi Gobindgarh | |
| dc.publisher.university | RIMT University | |
| dc.relation | ||
| dc.rights | university | |
| dc.source.university | University | |
| dc.subject.keyword | Engineering | |
| dc.subject.keyword | Engineering and Technology | |
| dc.subject.keyword | Engineering Electrical and Electronic | |
| dc.title | An Efficient Encryption Method to Enhance Security Using Nature Inspired Algorithm | |
| dc.title.alternative | ||
| dc.type.degree | Ph.D. |
Files
Original bundle
1 - 5 of 13
Loading...
- Name:
- 80_recommendation.pdf
- Size:
- 124.92 KB
- Format:
- Adobe Portable Document Format
- Description:
- Attached File
License bundle
1 - 1 of 1