Design and realization of high secure algorithms

dc.contributor.guideK B Shiva Kumar
dc.coverage.spatial
dc.creator.researcherSavita D Torvi
dc.date.accessioned2022-02-22T10:27:16Z
dc.date.available2022-02-22T10:27:16Z
dc.date.awarded2019
dc.date.completed2019
dc.date.registered2014
dc.description.abstractWith the high speed evolution and reputation on the Internet, shielding the concealment of information while being communicated through the internet has become a significant task as it provides exposure to the attackers to attack the confidential data and hence there is a need of providing privacy and secrecy of the data, one such technique is steganography. newline newlineThe main purpose of steganography is to embed the information of any format like image, audio or text covertly. Transparency is stated to the capability to escape doubt about the presence of a stealthy message. Steganography technique is used in various applications such as multimedia communication, finger printing, automotive, industrial automations, military applications and medical imaging where real-time multi-channel behaviour is needed. Custom hardware integrated circuits supply the possibility of complete exploitation of the inherent parallelism of algorithms and accordingly nowadays steganography techniques are developed with an embedded FPGA system for real time applications. newline newlineThe researcher applies Text steganography approach for Unique Data Security to build a system that is able to transmit and receive encrypted messages embedded in rich text Format: *.DOC, *.RTF, EMAIL /Message Body/, etc. Both font size and color based methods are employed. newlineField programmable gate array (FPGA) is reconfigurable hardware which comprises logic modules that can be programmed to execute complex mathematical functions creating them highly applicable for the implementation of matrix procedures. Steganography implementation on FPGA results in achieving high throughput, better stego image quality, low complexity and less utilization of components. FPGA helps to solve both security and processing speed. newline
dc.description.note
dc.format.accompanyingmaterialDVD
dc.format.dimensions35
dc.format.extent15003
dc.identifier.urihttp://hdl.handle.net/10603/364524
dc.languageEnglish
dc.publisher.institutionElectronics and Communication Engineering
dc.publisher.placeTumkur
dc.publisher.universitySri Siddhartha Academy of Higher Education
dc.relation
dc.rightsuniversity
dc.source.universityUniversity
dc.subject.keywordEngineering
dc.subject.keywordEngineering and Technology
dc.subject.keywordEngineering Electrical and Electronic
dc.titleDesign and realization of high secure algorithms
dc.title.alternative
dc.type.degreePh.D.

Files

Original bundle

Now showing 1 - 5 of 12
Loading...
Thumbnail Image
Name:
01_title.pdf
Size:
40.98 KB
Format:
Adobe Portable Document Format
Description:
Attached File
Loading...
Thumbnail Image
Name:
02_certificate.pdf
Size:
24.15 KB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
03_preliminary pages.pdf
Size:
53.42 KB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
04_chapter 1.pdf
Size:
447.66 KB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
05_chapter 2.pdf
Size:
123.51 KB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.79 KB
Format:
Plain Text
Description: