| dc.contributor.advisor | Alam, Prof. Dr. Kazi Md. Rokibul | |
| dc.contributor.author | Mondal, Arindom | |
| dc.date.accessioned | 2018-12-24T10:21:29Z | |
| dc.date.available | 2018-12-24T10:21:29Z | |
| dc.date.copyright | 2018 | |
| dc.date.issued | 2018-07 | |
| dc.identifier.other | ID 1507503 | |
| dc.identifier.uri | http://hdl.handle.net/20.500.12228/475 | |
| dc.description | This thesis is submitted to the Department of Computer Science and Engineering, Khulna University of Engineering & Technology in partial fulfillment of the requirements for the degree of Master of Science in Engineering in Computer Science and Engineering, July 2018. | en_US |
| dc.description | Cataloged from PDF Version of Thesis. | |
| dc.description | Includes bibliographical references (pages 49-52). | |
| dc.description.abstract | This thesis proposes a multi-stage encryption technique to enhance the level of secrecy of image to facilitate its secure transmission through the public network. A vast number of researches have been done on image secrecy. The existing image encryption techniques like visual cryptography (VC), steganography, and watermarking etc. while are applied individually; usually they cannot provide unbreakable secrecy. Through combining several separate techniques, a hybrid multi-stage encryption technique is proposed in this thesis, which provides nearly unbreakable image secrecy, while the encryption/decryption time remains almost the same of the exiting techniques. The technique consecutively exploits VC, steganography and one time pad (OTP). At first it encrypts the input image using VC, i.e., splits the pixels of the input image into multiple shares to make it unpredictable. Then after the pixel to binary conversion within each share, the exploitation of steganography detects the least significant bits (LSBs) from each chunk within each share. At last, OTP encryption technique is applied on LSBs along with randomly generated OTP secret key to generate the ultimate cipher image. Besides, prior to sending the OTP key to the receiver, first it is converted from binary to integer and then an asymmetric cryptosystem is applied to encrypt it and thereby the key is delivered securely. Finally, the outcome, the time requirement of encryption and decryption, the security and statistical analyses of the proposed technique are evaluated and compared with existing techniques. | en_US |
| dc.description.statementofresponsibility | Arindom Mondal | |
| dc.format.extent | 53 pages | |
| dc.language.iso | en_US | en_US |
| dc.publisher | Khulna University of Engineering & Technology (KUET), Khulna, Bangladesh | en_US |
| dc.rights | Khulna University of Engineering & Technology (KUET) thesis/dissertation/internship reports are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. | |
| dc.subject | Multi-Stage Encryption Technique | en_US |
| dc.subject | Image Encryption Techniques | en_US |
| dc.subject | Cryptosystem | en_US |
| dc.title | An Approach to Ensure the Secrecy of Scene Images | en_US |
| dc.type | Thesis | en_US |
| dc.description.degree | Master of Science in Engineering in Computer Science and Engineering | |
| dc.contributor.department | Department of Computer Science and Engineering |