Dissertations / Theses on the topic 'Encryption techniques'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Encryption techniques.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Wang, Yongsheng. "Advanced video encryption techniques." Thesis, Queen's University Belfast, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.602966.
Full textDutta, Saurabh. "Approach towards development of efficient encryption techniques." Thesis, University of North Bengal, 2004. http://hdl.handle.net/123456789/26.
Full textKasarabada, Yasaswy V. "Efficient Logic Encryption Techniques for Sequential Circuits." University of Cincinnati / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1613752483402656.
Full textTalhah, Saad. "Advanced Encryption Techniques using New Mersenne Number Transforms." Thesis, University of Leeds, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.515408.
Full textChen, Hang. "Optical Encryption Techniques for Color Image and Hyperspectral Data." Thesis, Université de Lorraine, 2017. http://www.theses.fr/2017LORR0374.
Full textOptical information security is one of the most important research directions in information science and technology, especially in the field of copyright protection, confidential information transmission/storage and military remote sensing. Since double random phase encoding technology (DRPE) was proposed, optical image encryption technology has become the main topic of optical information security and it has been developed and studied deeply. Optical encryption techniques offer the possibility of high-speed parallel processing of two dimension image data and hiding information in many different dimensions. In this context, much significant research and investigation on optical image encryption have been presented based on DRPE or further optical operation, such as digital holography, Fresnel transform, gyrator transform. Simultaneously, the encrypted image has been extended from single gray image to double image, color image and multi-image. However, the hyperspectral image, as a significant element in military and commercial remote sensing, has not been deeply researched in optical encryption area until now. This work extends the optical encryption technology from color image to hyperspectral image. For better comprehension of hyperspectral image encryption, this work begins with the introduction and analysis of the characteristics of hyperspectral cube. Subsequently, several kinds of encryption schemes for color image, including symmetric and asymmetric cryptosystem, are presented individually. Furthermore, the optical encryption algorithms for hyperspectral cube are designed for securing both the spatial and spectral information simultaneously. Some numerical simulations are given to validate the performance of the proposed encryption schemes. The corresponding attack experiment results demonstrate the capability and robustness of the approaches designed in this work. The research in this dissertation provides reference for the further practicality of hyperspectral image encryption
Jha, Pawan Kumar. "AN APPROACH TOWARDS DESIGN AND IMPLEMENTATION OF SYMMETRIC ENCRYPTION TECHNIQUES." Thesis, University of North Bengal, 2006. http://hdl.handle.net/123456789/11.
Full textWong, Hon Wah. "Image watermarking and data hiding techniques /." View Abstract or Full-Text, 2003. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202003%20WONGH.
Full textIncludes bibliographical references (leaves 163-178). Also available in electronic version. Access restricted to campus users.
Brisbane, Gareth Charles Beattie. "On information hiding techniques for digital images." Access electronically, 2004. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20050221.122028/index.html.
Full textGuruswamy, Aarumugam Bhupathi Rajan. "Independent Domain of Symmetric Encryption using Least SignificantBit : Computer Vision, Steganography and Cryptography Techniques." Thesis, Högskolan Dalarna, Datateknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:du-10063.
Full textZhao, Weiliang, University of Western Sydney, of Science Technology and Environment College, and School of Computing and Information Technology. "Security techniques for electronic commerce applications." THESIS_CSTE_CIT_Zhao_W.xml, 2003. http://handle.uws.edu.au:8081/1959.7/127.
Full textMaster of Science (Hons)
Zabransky, Douglas Milton. "Incorporating Obfuscation Techniques in Privacy Preserving Database-Driven Dynamic Spectrum Access Systems." Thesis, Virginia Tech, 2018. http://hdl.handle.net/10919/85001.
Full textMaster of Science
Shin, Dong Il. "Improving trust and securing data accessibility for e-health decision making by using data encryption techniques." Thesis, Queensland University of Technology, 2012. https://eprints.qut.edu.au/50636/1/Dong_Il_Shin_Thesis.pdf.
Full textRaghuraman, Shashank. "Efficiency of Logic Minimization Techniques for Cryptographic Hardware Implementation." Thesis, Virginia Tech, 2019. http://hdl.handle.net/10919/91462.
Full textMaster of Science
The proliferation of embedded smart devices for the Internet-of-Things necessitates a constant search for smaller and power-efficient hardware. The need to ensure security of such devices has been driving extensive research on lightweight cryptography, which focuses on minimizing the logic footprint of cryptographic hardware primitives. Different designs are optimized, evaluated, and compared based on the number of gates required to express them at a logical level of abstraction. The expectation is that circuits requiring fewer gates to represent their logic will be smaller and more efficient on hardware. However, converting a logical representation into a hardware circuit, known as “synthesis”, is not trivial. The logic is mapped to a “library” of hardware cells, and one of many possible solutions for a function is selected - a process driven by trade-offs between area, speed, and power consumption on hardware. Our work studies the impact of synthesis on logical circuits with minimized gate count. We evaluate the hardware quality of such circuits by comparing them with that of benchmark designs over a range of speeds. We wish to answer questions such as “At what speeds do logical metrics rightly predict area- and power-efficiency?”, and “What impact does this have after integrating cryptographic primitives onto a complete system?”. As part of this effort, we build a System-on-Chip in order to observe the efficiency of these circuits on actual hardware. This chip also includes recently developed ciphers for authenticated encryption. The second part of this thesis explores different ways of integrating these ciphers onto a system, to understand their effect on the ciphers’ compactness and performance. Our overarching aim is to provide a suitable reference on how synthesis and system integration affect the hardware quality of cryptographic blocks, for future research in this area.
Bian, Song. "Realizing Homomorphic Secure Protocols through Cross-Layer Design Techniques." Kyoto University, 2019. http://hdl.handle.net/2433/242926.
Full textZhang, Bo. "XOR based optical encryption with noise performance modeling and application to image transmission over wireless IP lan." Thesis, Peninsula Technikon, 2004. http://hdl.handle.net/20.500.11838/1376.
Full textEncryption was used whenever someone wanted to send a secret message to someone. The quality of the algorithm and key combination were the factors that ensured the strength of the system. However, until there were some automation one could not use complex methods for encryption because it simply took too long to encrypt and decrypt messages (even worse for images), manually. Optical technologies have recently been employed in encryption. Compared with traditional computer and electrical systems, optical technologies offer primarily two types of benefits, namely optical systems have an inherent capability for parallel processing, that is, rapid transmission of information, and information can be hidden in any of several dimensions, such as phase or spatial frequency. Optical systems therefore have an excellent capability for encoding information. In this project an image encryption technique was developed using exclusive-OR (XOR) operations in the optical domain before the captured image entered a digital computer network for further processing. A gray-level image of the object to be encrypted was converted a binary format and a pixel by pixel exclusive OR operation was performed on it with a random key-bit by making use of polarization encoding in LCD technology, before the encrypted binary image was detected by a CCD. The image may also be used as an input to a computer for comparison with a database. However, noise alters the encrypted bit and the value of the noisy encrypted bit is no longer binary. In this research the encryption techniques was evaluated and tested for applicability to encrypt and decrypt successfully. The noise performance was tested and compared. The technique was applied for image transmission over a wireless IP broadband link. Images (optical and thermal) captured from telemedicine application was transmitted and decrypted with reasonable success in this application.
Kandi, Jayavardhan R. "Embedded Cryptography: An Analysis and Evaluation of Performance and Code Optimization Techniques for Encryption and Decryption in Embedded Systems." [Tampa, Fla.] : University of South Florida, 2003. http://purl.fcla.edu/fcla/etd/SFE0000151.
Full textZhao, Weiliang. "Security techniques for electronic commerce applications." Thesis, View thesis View thesis, 2003. http://handle.uws.edu.au:8081/1959.7/127.
Full textRangasamy, Jothi Ramalingam. "Cryptographic techniques for managing computational effort." Thesis, Queensland University of Technology, 2012. https://eprints.qut.edu.au/61007/1/Jothi_Rangasamy_Thesis.pdf.
Full textCherrueau, Ronan-Alexandre. "Un langage de composition des techniques de sécurité pour préserver la vie privée dans le nuage." Thesis, Nantes, Ecole des Mines, 2016. http://www.theses.fr/2016EMNA0233/document.
Full textA cloud service can use security techniques to ensure information privacy. These techniques protect privacy by converting the client’s personal data into unintelligible text. But they can also cause the loss of some functionalities of the service. For instance, a symmetric-key cipher protects privacy by converting readable personal data into unreadable one. However, this causes the loss of computational functionalities on this data.This thesis claims that a cloud service has to compose security techniques to ensure information privacy without the loss of functionalities. This claim is based on the study of the composition of three techniques: symmetric cipher, vertical data fragmentation and client-side computation. This study shows that the composition makes the service privacy preserving, but makes its formulation overwhelming. In response, the thesis offers a new language for the writing of cloud services that enforces information privacy using the composition of security techniques. This language comes with a set of algebraic laws to systematically transform a local service without protection into its cloud equivalent protected by composition. An Idris implementation harnesses the Idris expressive type system to ensure the correct composition of security techniques. Furthermore, an encoding translates the language intoProVerif, a model checker for automated reasoning about the security properties found in cryptographic protocols. This translation checks that the service preserves the privacy of its client
Fernandez, Irma Becerra. "Encryption-based security for public networks : technique and application." FIU Digital Commons, 1994. http://digitalcommons.fiu.edu/etd/3296.
Full textLowenrud, Richard, and Jacob Kimblad. "Implementation and Evaluation of Espresso Stream Cipher in 65nm CMOS." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-204620.
Full textMed de kommande 5G nätverken och den förväntade tillväxten av Internet of Things (IoT) kommer efterfrågan på snabba och pålitliga krypteringsalgoritmer att öka. Eftersom många system kan vara tidskritiska och drivas av interna kraftkällor måste algoritmerna vara små, snabba, energieffektiva och ha låg latens. Ett nytt strömchiffer vid namn Espresso har föreslagits som ett svar på dessa krav och har optimiserats för flera parametrar till skillnad från andra strömchiffer såsom Trivium och Grain. Espresso har tidigare jämförts med branschstandarden, Advanced Encryption Standard (AES), i en FPGA implementation och visat lovande resultat för strömförbrukning men ytterligare tester måste utföras för att få kunskap om algoritmens egenskaper. Syftet med detta examensarbete är att implementera och utvärdera Espresso i 65nm CMOS teknologi och jämföra den med AES. Espresso implementeras i flera konfigurationer i VHDL som optimiserar för storlek och latens. Implementationerna jämförs sedan med AES i area, genomströmning, energieffektivitet och latens genom simulering. Detta görs med hjälp av UMC 65nm CMOS biblioteket och Synopsys Design Vision. Resultaten visar att Espresso implementerad med sekventiell laddning av nyckel och IV är 18.2x mindre, 3.2x snabbare, använder 9.4x mindre ström och har 1.5x mindre latens än AES. När Espresso implementeras med full parallel laddning är den fortfarande 13.6x mindre, 3.2x snabbare, drar 7.1x mindre ström men har samtidigt 3.2x lägre latens än AES. Espresso’s energieffektivitet kan förbättras ytterligare genom att applicera strömsparande tekniker, även om vissa tekniker såsom clock gating och power gating har begränsad användbarhet på grund av strömchiffers natur.
Madhavarapu, Venkata Praveen Kumar. "A Novel Three Phase Symmetric Cipher Technique." OpenSIUC, 2016. https://opensiuc.lib.siu.edu/theses/2031.
Full textКучма, Олександр Русланович, and Oleksandr Kuchma. "Розроблення модуля забезпечення приховування даних на основі стеганографічного методу найменш значущого біту." Master's thesis, ТНТУ, 2021. http://elartu.tntu.edu.ua/handle/lib/36794.
Full textПояснювальна записка містить результати розроблення модуля «Вбудовування інформації в зображенні методом найменш значущого біту». Проведено аналіз предметної області, розроблені моделі бізнес-процесів об’єкта проектування, розроблені специфікації бізнес-вимог, функціональних та не функціональних вимог, спроектовані логічна та фізична моделі бази даних. Виконаний математичний опис задачі для вирішення на ПК та розроблений додаток за допомогою середовища програмування Microsoft Visual Studio 2010. Наведені результати тестування програмного продукту та вимоги щодо його розгортання. Результати роботи можуть бути використані для підтвердження авторського права, для приховування інформації в цифрових зображеннях.
Explanatory note contains the results of the development module "Embedding information in an image using the least significant bit. The analysis domain, the model business processes of the project, developed the specification of business requirements, functional and non functional requirements, designed logical and physical database models. The mathematical description of the problem for solution on the PC application developed using the programming environment Microsoft Visual Studio 2010. The results of software testing and requirements for its deployment. The results may be used to confirm the copyright for hiding information in digital images.
ПЕРЕЛІК УМОВНИХ СКОРОЧЕНЬ ... 7 ВСТУП ... 8 РОЗДІЛ 1... 10 1.1 Коротка характеристика підприємства... 10 Базою підприємства виступає Інтернет-магазин «TradeBox»... 10 1.2 Аналіз предметної області ... 11 Заголовки ... 13 Потоковий контейнер ... 13 Фіксований контейнер ... 13 1.3. Аналіз існуючого програмного продукту, що реалізують функцію предметної області ... 16 РОЗДІЛ 2... 21 2.1. Глосарій проекту ... 21 2.2. Розроблення варіанту використання ... 23 2.2.1. Розроблення діаграми варіантів використання. ... 24 2.2.2. Специфікація варіантів використання ... 25 2.2.3. Розкадровка варіантів використання ... 34 2.3. Специфікація функціональних і не функціональних вимог ... 42 РОЗДІЛ 3... 46 3.1 Математична постановка задачі ... 46 3.2. Проектування структури бази даних ... 50 3.3. Опис архітектури додатку. ... 52 3.3.1 Розроблення діаграми класів, що реалізують бізнес-логіку програмної системи. ... 52 3.3.2. Розроблення діаграми використання елементів графічного інтерфейсу користувача. ... 53 3.4. Тестування додатку. ... 53 3.5. Розгортання програмного продукту. ... 55 3.5.1. Системні мінімальні характеристики ... 55 3.5.2. Вимоги до програмного забезпечення клієнтської частини. ... 55 3.5.3. Спосіб виклику програми, запуск програми. ... 56 РОЗДІЛ 4 ОХОРОНА ПРАЦІ ТА БЕЗПЕКА В НАДЗВИЧАЙНИХ СИТУАЦІЯХ ... 57 4.1 Охорона праці ... 57 4.2 Підвищення стійкості роботи об'єктів господарської діяльності в воєнний час... 59 СПИСОК ВИКОРИСТАНИХ ДЖЕРЕЛ ... 65 ДОДАТКИ ... 66 ДОДАТОК А ... 67 ДОДАТОК Б ... 69 ДОДАТОК В ... 91 ДОДАТОК Д ... 92 ДОДАТОК Е ... 93
Lampe, Rodolphe. "Preuves de sécurité en cryptographie symétrique à l'aide de la technique du coupling." Thesis, Versailles-St Quentin en Yvelines, 2014. http://www.theses.fr/2014VERS0026/document.
Full textIn this thesis, we study blockciphers, meaning that the encryption (and decryption) sends a block of n bits on a block of n bits. There is essentially two main structures used for a blockcipher: the Feistel structure (used for DES) and the SPN structure (used for AES). The study of the security of these structures and schemes has led to many practical and theoretical advances. We present in this thesis proofs of security for the iterated Even-Mansour scheme, the tweakable blockcipher CLRW and the key-alternating Feistel cipher. These proofs use a probabilistic technique, called coupling, introduced in cryptography in 2002 by Mironov. We present this technique in the context of probabilities, then we present how to use the coupling to prove the security for the schemes mentioned above. We also present an analysis of the security of the Even-Mansour cipher with two rounds and some properties (same round keys or same internal permutations for example) and, finally, we compare the different techniques to prove indistinguishability
Rawat, Sachin. "Implementation of a Forward Error Correction Technique using Convolutional Encoding with Viterbi Decoding." Ohio University / OhioLINK, 2004. http://www.ohiolink.edu/etd/view.cgi?ohiou1088439298.
Full textArasteh, Davoud. "Computational Intelligence and Complexity Measures for Chaotic Information Processing." ScholarWorks@UNO, 2008. http://scholarworks.uno.edu/td/834.
Full textLewko, Allison Bishop. "Functional encryption : new proof techniques and advancing capabilities." Thesis, 2012. http://hdl.handle.net/2152/ETD-UT-2012-05-5374.
Full texttext
YE, WEN-XIN, and 葉文心. "The application of encryption techniques on disk software protection." Thesis, 1988. http://ndltd.ncl.edu.tw/handle/09830498195289733161.
Full textTsai, Chao-Jen, and 蔡釗仁. "Some Techniques for Enhancing Joint Compression and Encryption Schemes." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/bzb2tq.
Full text國立臺灣大學
資訊工程學研究所
105
Three techniques for enhancing joint compression and encryption (JCAE) schemes are proposed. They respectively improve the execution time, compression performance and estimation accuracy of three different JCAE schemes. The first uses auxiliary data structures to significantly accelerate currently existing chaos-based join compression and encryption scheme. The second one solves the problem of huge multidimensional lookup table overheads by selecting a small number of important sub tables. The third increases the accuracy of frequency distribution estimations used for compressing streaming data by weighting symbols in the plaintext stream according to their position in the stream. Two joint compression and encryption schemes leveraging the above three techniques, one for static files and the other for streaming data, are proposed. Experiments results show that the proposed schemes run faster and generate smaller files than existing schemes, verifying that the three techniques are useful and practical.
Yang, Zi-Wei, and 楊孜薇. "Blockchain Security Enhancement Based On Biometric Encryption and Computer Vision Techniques." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/48frya.
Full text國立交通大學
資訊管理研究所
105
With the rise of financial technology, also known as FinTech, the researches and applications based on blockchain have become increasingly popular in recent years. Blockchain is a distributed storage and verification technology, which originates from the well-known digital currency, Bitcoin. It records all transaction information with a distributed ledger framework and uses cryptography to ensure the security by authentication and non-repudiation. In addition, transparency and decentralization are also the major characteristics of blockchain system. In traditional blockchain design, the private keys of each user are randomly generated and stored in personal devices. Once the user accidentally loses or reveals the private key to others, the protected information or his own digital currency may be stolen, which may cause great losses to the users. The goal of this paper is to propose a novel private key generation method in blockchain system which combines biometric encryption and computer vision algorithms. The proposed system can encode the faces into partial private keys through various feature extraction and pattern matching algorithms. These experimental results show that the facial features extracted by sparse coding dictionary learning and weighted by affinity propagation clustering algorithm can achieve most representative descriptors. The entropy measurement also proves that our system can work effectively and robustly in the testing datasets and the final results are superior to other experimental settings. Conclusively, the proposed method can improve the security of digital currency trading and solve the storage and loss problem of private keys of blockchain system by combining the biometric encryption and computer vision techniques.
Hsu, Chih-Chung, and 許志仲. "Studies of Improving Coding Performance and Encryption in Various Image Compression Techniques." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/65461867732062157625.
Full text國立雲林科技大學
電機工程系碩士班
95
This thesis consists of four topics: (1) Fractal image coding; (2) JPEG image compression standard; (3) Vector quantization; (4) Motion object detection technique. On the topic of fractal image coding (FIC), we propose two schemes to improve the coding performance of FIC. First, the proposed method combines iteration-free FIC technique with fractal mating coding technique to improve the coding performance. Second, the multi-resolution sampling scheme is used in domain pool performance construction such that the coding performance can be improved. Finally, the double self-similarity FIC is proposed, and we combine it with efficient entropy coding to signally decrease bit rate. Then, we propose two schemes based on the discrete cosine transform (DCT) compression techniques such as JPEG and MPEG-1 for protecting the image content and improving the coding performance using the similarity among DCT coefficients, respectively. In the third part, the run-length coding (RLC) is used to reduce the redundancy of the pixel values in image blocks. Based on this feature, we propose a fast algorithm that can calculate a distance between two encoded block (MRLCD). Therefore, the VQ coding and codebook training can be accelerated by using modified RLC and MRLCD. Finally, the moving object extraction technique is considered. There are two methods for improving moving object extraction performance and its applications. In the first method, the moving object extraction technique is used for reducing bandwidth requirement in video communication by webcam. Another method focuses on more completely extracting the moving object using background subtraction technique in the RGB color space, and then it is combine with an efficient block-based background extraction technique to achieve excellent detection performance in low-bit rate video.
Nishchal, Naveen Kumar. "Investigation on optical image encryption using fourier and fractional fourier domain techniques." Thesis, 2004. http://localhost:8080/iit/handle/2074/4226.
Full textVerma, Gaurav. "Development of optoelectronic techniques for recognition and encryption in biometric based security systems." Thesis, 2017. http://localhost:8080/iit/handle/2074/7285.
Full text(5930405), Jongho Won. "Security techniques for drones." Thesis, 2019.
Find full textTawalbeh, Lo'ai. "Radix-4 ASIC design of a scalable Montgomery modular multiplier using encoding techniques." Thesis, 2002. http://hdl.handle.net/1957/32149.
Full textGraduation date: 2003
(6565679), Fang-Yu Rao. "Privacy-Enhancing Techniques for Data Analytics." Thesis, 2019.
Find full textOrganizations today collect and aggregate huge amounts of data from individuals under various scenarios and for different purposes. Such aggregation of individuals’ data when combined with techniques of data analytics allows organizations to make informed decisions and predictions. But in many situations, different portions of the data associated with individuals are collected and curated by different organizations. To derive more accurate conclusions and predictions, those organization may want to conduct the analysis based on their joint data, which cannot be simply accomplished by each organization exchanging its own data with other organizations due to the sensitive nature of data. Developing approaches for collaborative privacy-preserving data analytics, however, is a nontrivial task. At least two major challenges have to be addressed. The first challenge is that the security of the data possessed by each organization should always be properly protected during and after the collaborative analysis process, whereas the second challenge is the high computational complexity usually accompanied by cryptographic primitives used to build such privacy-preserving protocols.
In this dissertation, based on widely adopted primitives in cryptography, we address the aforementioned challenges by developing techniques for data analytics that
not only allow multiple mutually distrustful parties to perform data analysis on their
joint data in a privacy-preserving manner, but also reduce the time required to complete the analysis. More specifically, using three common data analytics tasks as
concrete examples, we show how to construct the respective privacy-preserving protocols under two different scenarios: (1) the protocols are executed by a collaborative process only involving the participating parties; (2) the protocols are outsourced to
some service providers in the cloud. Two types of optimization for improving the
efficiency of those protocols are also investigated. The first type allows each participating party access to a statistically controlled leakage so as to reduce the amount
of required computation, while the second type utilizes the parallelism that could
be incorporated into the task and pushes some computation to the offline phase to
reduce the time needed for each participating party without any additional leakage.
Extensive experiments are also conducted on real-world datasets to demonstrate the
effectiveness of our proposed techniques.
"Investigations on encryption techniques for colored and gray scale images in fourier- and fractional fourier domains." Thesis, 2009. http://localhost:8080/xmlui/handle/12345678/4551.
Full textSharma, Vikram. "Informatic techniques for continuous varible quantum key distribution." Phd thesis, 2007. http://hdl.handle.net/1885/150269.
Full textOwuor, Dennis Luke. "Chaos-based secure communication and systems design." 2012. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1000513.
Full textThis dissertation presents encryption and decryption of digital message signal and image data based on Qi hyper chaos system. The field of telecommunication has grown rapidly especially with the introduction of mobile phone and internet networks. Associated with this growth, there is a vital need to have a secure communication of information.
Sachan, Apurva. "Implementation of homomorphic encryption technique." Thesis, 2014. http://ethesis.nitrkl.ac.in/6436/1/E-71.pdf.
Full textTseng, Der-Chang, and 曾德樟. "Speech Encryption Systems Based on OFDM Technique." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/87022474937383275401.
Full text國立臺灣科技大學
電子工程系
96
Speech encryption techniques have been widely used in the corporate and military sectors for some time now. In general, a speech encryption system retains any considerable residual intelligibility such as talk spurts and the original intonation in the encrypted speech. This makes it easy for eavesdroppers to deduce the information contents from the encrypted speech. In this thesis, we proposed two types of speech encryption systems: the analog and digital encryption systems. Both speech encryption systems, based on an orthogonal frequency division multiplexing (OFDM) technique, can effectively encrypt a speech signal by permuting several frequency domain components within a speech frame. In analog speech encryption system, two types of encryption schemes are proposed. One is called the sample mode because it treats speech signal at a sample level; the other is called the QAM mode because it treats speech signal at a bit level followed by a QAM mapping method. The proposed encryption system using the sample mode is based on an OFDM technique. It can effectively reduce the residual intelligibility from the encrypted speech by permuting several frequency domain components. From the simulation results, the proposed OFDM-based encryption system using the sample mode can provide the same level of security as does the FFT-based encryption system, but it needs only two FFT operations instead of the four required by the FFT-based one. The encryption system using the QAM mode is based on the combination of an OFDM technique and an appropriate QAM mapping method. It can completely remove the residual intelligibility from the encrypted speech by permuting several frequency domain components. Simulation results indicate that the proposed system using the QAM mode can attain a high level of security while retaining the good quality in the recovered speech. In digital speech encryption system, the bitstream produced by the ITU-T G.729 standard at 8 kb/s is partitioned into two classes; one, the most perceptually relevant is to be encrypted, the other, to be left unencrypted. In this way, two kinds of selective encryption modes are developed, a low-selective encryption mode (24 bits out of 80), aimed at preventing most kinds of eavesdropping and a high-selective encryption mode (36 bits out of 80), based on the encryption of the most perceptually important bits and meant to perform as well as full encryption of the bitstream. Simulation results indicate that the proposed speech encryption modes (both full encryption and high-selective encryption) can provide a high level of security as does the AES-based speech encryption scheme. Furthermore, the high-selective encryption mode covers about 45% of the bitstream and achieves content protection equivalent to that obtained by full encryption of the bitstream. In contrast, the security of the low-selective encryption mode is inferior to that of the AES-based encryption scheme due to its little about 30% of the bitstream to be encrypted. In addition, as the channel SNR is below the value of 14 dB, the noise immunity of the proposed OFDM-based digital encryption system, including the full encryption, the high- and low-selective encryption modes, is better than that of the AES-based encryption scheme. Finally, we also take two objective measures to assess the quality of the recovered speech and the residual intelligibility of the encrypted speech. Experimental results show the effectiveness of the proposed OFDM-based speech encryption systems, including the analog and digital types.
Chen, Ji-Tian, and 陳吉田. "Fast Image Encryption Technique for H.261 Video System." Thesis, 1996. http://ndltd.ncl.edu.tw/handle/57512107312564452704.
Full textChen, Jyi-Tyan, and 陳吉田. "Fast Image Encryption Technique for H.261 Video System." Thesis, 1996. http://ndltd.ncl.edu.tw/handle/97623494837361984539.
Full text高雄工學院
電機電力研究所
85
H.261乃國際電話電報諮詢委員會(CCITT)於1990年所制定的國際標準, 主要目的在因應雙向視訊傳輸服務之需求趨勢,提供頻寬P64k bit/s ( P=1,2..., 30)之影像編/解碼技術規範,而在目前的影像電話(Video Phone)、視訊會議(Video Conferencing)等系統之開發上,廣獲產業 界的支持與採用。然而,值得注意的是:於H.261規範中,並無任何通訊 保密的措施!此一疏漏,將導致用戶間的通訊過程,在遭受有心人士非法 入侵、竊取時,無所防範。該問題,在大眾通信網路日益發達、資訊安全 日益受重視的今日,將更形重要。 在本論文中,我們將發展H.261的影像快速加密技術,以解決上述問題。 在加密過程中,將採用兩支密匙(key),以移位暫存器(Shift Regis) 或混沌時序(Chaotic Time Sequence)方式產生兩組人造雜訊(Pseudo Noise), 分兩層在H.261系統之外,對原始影像進行加密。在第一層中,我們將提 出「行列搬移」、「區塊搬移」兩種新式影像加密法則,由其快速將像素 (Pixel)座標予以亂數化重排,所得之出步加密影像,再經第二層,與 虛擬影像等比率混合, 進一步提昇其保密性。此種加密方式的特色有三:第一,若與展頻通訊之 Direct Sequcnce、改變影像頻譜之相角成? 最後,本論文中亦將以SUN工作站為平台,發展一個H.261的模擬系統。其 中,除了探討位元分配(Bit Allocation)與 量化表(Quantization Table)選擇等問題外,也以實際影像序列進行加 密模擬,其結果顯示,若非經由正確密匙解密,影像畫面將因無法直接判 讀,而不具意義!此不僅驗證我們所提出的H.261影像保密器理論無誤外 ,亦指出其可行性非常大。 H.261 video codec for Audiovisual Service at p*64 kbit/s ( p=1,2,....,30 ) was completed and approved in December 1990 by CCITT ( International Consulative Committee for Telephone and Telegraph ). The intended applications are for videophone and videoconferencing. However, the corresponding protocol can be found to be insecure. There provide no any techniques to prevent sensitive visual information from unauthorized access during the transmission process. In this thesis, a fast image encryption technique will be developed to solve the security problem mentioned above. The proposed cryptographer is composed of two layers. In the first layer,the row-column moving and block moving image encryption algorithms are introduced. Based on these two algorithms, the image can be encrypted via simple look-up table. The resultant is fed into the second layer and further encrypted by mixing with a reference image. This image cryptographer exhibits the following features: This may confirm our theory and indicates that the proposed ciphergrapher is a good remedy for the security problem of H.261 systems.
Lee, Ping-Yi, and 李秉奕. "Vectors Using Sparse Approximation Algorithm for Data Transmission Encryption Technique." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/63277976834531500274.
Full text國立宜蘭大學
資訊工程學系碩士班
103
In the process of information transmission, probably because of a power failure or collision or the like, resulting in incomplete data in transmission, and then in such a situation occurs like information transmission loss. On the other hand, the modern software of community and dating develop quickly. In the web and mobile application, the case in image for example, image usually be compressed in the process of transmission, it can be regarded as one kind of information transmission loss. Another situation is that disturbed during transmission, it lead to the received information to generate noise. With the rise of consciousness copyrights and face a variety of above situations, how to protect the information and verification has become a very important issue. Therefore, we proposed a data encryption and decryption method based on sparse approximation to solve the problem. This paper include two stage, the first stage is that combine with the previous research result. We extract the information of image to generate the watermark, and embed it into the image itself for the tamper detection and recovery, we call it as self-recovery image. The previous research result shows that the similarity between self-recovery image and original image has more than PSNR 40 dB. Because of the property of self-recovery image, we use this image as the carrier image in second stage for improving the ability of tamper detection and recovery on the carrier image. The second stage is the main part of this paper, we use the self-recovery image as carrier image to approximate with codebook, and find out the maximum related part to weight with information. Then, we could get the private key, and we give it to the trusted third part for safekeeping. In the decryption, we use the wait-verifying image to approximate with codebook, and find out the maximum related part to verify with private key for extracting the embedded information. In this paper, we also proposed a correcting method to improve the situation of verifying failure. We proposed an effective method for data protection and verification. The correction rate has an outstanding result, either in data transmission loss, compression or the impact of noise.
Ma, Yun-Chi, and 馬雲麒. "The Research on Digital Holographic 3-D Object Encryption and Decryption Technique." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/95239705927600267631.
Full text世新大學
平面傳播科技學系
92
Due to the Internet rapid development and digital information dissemination efficiency increased in recent years, many illegal cases happened, such as stealing copyrights of digital information and significant digital information (such as national secret or commercial secret and so on). To solve this problem effectively, the Government and information related department of various countries in the world all spend considerable resources and devote to the research of digital information security technology. Therefore, in the future Internet world, digital information encryption technology also will continue to be significantly emphasized. In this thesis we propose a novel idea of the utilizing deterministic phase-encoded reference beam of holographic optics technology to implement two- and three-dimensional (2D and 3D) digital images encryption/ decryption. We also propose that we should make the reference beam become a key to encrypt and decrypt 2D/3D object. This key may be possible to be generated immediately at the beginning according to the existing environmental condition; the condition of reconstruction process is extremely rigorous (nearly have to equal to the original environmental condition). Therefore this research not only improves to protect the 2D image information but also is expected to utilize holographic optics ideals encrypting/ decrypting digital holographic 3D objects to ensure the security of transmission in the network. Furthermore, this research can reduce the possibility of copying the key then avoids decrypting the encrypted data.
ZHUANG, YONG-CHOU, and 莊永圳. "Applying signature and encryption technique to electronic mails and its VLSI implementation." Thesis, 1989. http://ndltd.ncl.edu.tw/handle/07644680198754296396.
Full text陳宜妙. "A video encryption and decryption technique using variable length coding and randomized bit-insertion." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/02682408071006153021.
Full text國立交通大學
電子工程系
91
In this paper, we propose a new video encryption algorithm, which is based on the encryption scheme proposed by Huang and Wang in 2001. In Huang’s approach, the encryption operation is fulfilled via the modification of VLC tables. Based on this encryption scheme, we made a few modifications to greatly enhance its security level. The modifications include the use of randomized bit-insertion and bit-flipping to complicate the statistics of ciphertexts and the use of RLC (run-length coding) disarrangement to increase the difficulty in cryptanalysis. This algorithm can be easily employed over an MPEG-4 codec to achieve real-time encryption. The security levels of this proposed algorithm against various types of attacks are also discussed. Moreover, the encrypted data have about the same level of noise sensitivity as the original MPEG-4 bit-stream.
Wu, Wen-Ho, and 吳文和. "The Study of Microoptic Elements and Moiré Technique Applying in Optical Encryption and Stereoscopic Image." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/6n52cz.
Full text國防大學理工學院
國防科學研究所
100
The purpose of this thesis has three folds, which are 1) printing Micro-lens Array (MLA) with optical imaging characteristics using screen printing technology; 2) using the Moiré technology for optics encryption and decryption. MLA and LLA are used in this research as the decoding tools, and the anti-counterfeiting scrambled image method is achieved; 3) applying Moiré techniques to 3D imaging and using MATLAB to calculate the best relation between the Moiré 3D imaging and the LLA. The double-sided 3D imaging technique is achieved. Screen printing is simple and inexpensive, and can be used in a wide range of applications. Applying Resolution Test Chart for quick quality measuring and using digital holographic microscopy for MLA measuring help to optimize the product specifications and obtain the best conditions as well as the best parameters for MLA and Lenticular Lens Array (LLA) production. Usually, LLA can be used in Digital Holographic Encryption. Moiré technique can be used to encrypt information into the military map for anti-counterfeiting. Information can be decrypted from a military map via a correct LLA key. To enhance anti-counterfeiting, scrambled image method combining moiré technology with unequally scrambled images coding tool is also presented. The encrypted message can be decrypted through the correct MLA or LLA. The Moiré formula is compiled with MATLAB to describe the relation between Moiré 3D image and the LLA, and then experiments with LLAs of different specifications are carried to get the best 3D Moiré result while applying Moiré magnification principle on 3D printing overprint precision and solving the Moiré problems by waterless offset printing. Thus, the double-sided 3D imaging technique with Moiré technology is then achieved via MLA of two different specifications using screen printing. With further study, this technology can be widely used in the future. With experimental result, it is proved that all methods presented in this thesis are workable. No matter doing academic study or applying in industry, it is worthy of follow-on researchers' reference.
Lin, Chiun-Chau, and 林群超. "A New VoIP Technique Combining Speech Data Encryption/G.729 Error Recovery and Its Integration with a Networked-Based Video/Speech Surveillance System." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/00609153343994637179.
Full textLin, Chun-Fang, and 林椿芳. "Research and Implementation of E-Voting System with IC Cards and ID-based Encryption Scheme Based on Symmetric-Key Technique with a Trusted Device." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/37609861755636278972.
Full text國立高雄師範大學
資訊教育研究所
96
Electors can express the public opinion by electoral voting in the democratic society, and paper-based voting is the most common way in Taiwan. However, if the seal is not clear enough, it may bring some debate on the result; the low efficiency in recording and counting of ballots is another problem. E-voting is widespread in some countries and has excellent effects, so it is worth to learn their experiences. We compare various foreign E-voting systems and analyze the criteria for design and implement an E-voting system with IC card. On the other hand, people transmit their message frequently as information technology has been developed rapidly nowadays, and there are many security issue appeared. The concept of IST, which was proposed by Fukaya and Sakurai, can not only avoid accessing or eavesdropping from unauthorized users, but also reduce the cost of transmission, computation, and storage. IST is abbreviated from ID-based encryption scheme based on symmetric-key technique with a trusted device. This encryption scheme combines tamper-free device with user's identity to achieve ID-based cryptosystem that can provide a high efficient authenticated encryption scheme, and there is no more trouble with memorizing several combinations of users' accounts and passwords. In this research, we implement the IST concept for a GUI tool on Windows platform for its accessibility, and we improve its security and usability by incorporating Java Card into our system.