المستودع الرقمى

//uquui/

تقرير الوحدة

تقرير المجموعة

 2021

 تشفير الصور بسرية عالية من خالل دمج أنظمة أرقام عشوائية مختلفة

 Al-Roithy, Budoor Obid


//uquui/handle/20.500.12248/130824
0 التحميل
671 المشاهدات

تشفير الصور بسرية عالية من خالل دمج أنظمة أرقام عشوائية مختلفة

عناوين أخرى : High Security Image Cryptography Combining Different PRNG Techniques
المؤلفون : Al-Roithy, Budoor Obid
رقم الطلب : 24644
الناشر :جامعة أم القرى
مكان النشر : مكة المكرمة
تاريخ النشر : 2021 - 1442 هـ
الوصف : 205 ورقة.
نوع الوعاء : ماجستير
اللغة : عربي
المصدر : مكتبة الملك عبدالله بن عبدالعزيز الجامعية
يظهر في المجموعات : الرسائل العلمية المحدثة

t In the last three decades, taking images and sending images has become a daily activity among people due to the massive spread of smartphones equipped with digital cameras, webcams, professional digital cameras. Unauthorized and illegal users should not have the capability of viewing or reaching such images in any means, and some cases become more critical when it comes to critical fields such as politics, military, health care providers. Therefore, exchanged images need to be transformed in a well-managed, secure and reliable manner. PRNG algorithm is the most widely used in image encryption. PRNG is useful in practice because it is repeatable and generates numbers quickly. This algorithm does not depend on a random source, but on mathematical computation, that exposes the image encryption to a violation in the encryption detection. The decisive factor in encryption strength depends mainly on choosing a strong PRNG, for the characteristics of the PRNG to be statistically strong. There is some limitation in existing works, such as a building encryption system on a statistically weak random number generator or using the default PRNG algorithm which is inadequate for encrypting images resulting in easy detection of the encryption key. This study addresses the limitations of the existing image cryptography methods by following and studying a logical method through analysis, comparison, and improvement. Initially, we analyzed PRNG usages by performing various statistical measurements on the encrypted RGB and grayscale images and investigated the performance through manual comparison. Then, we expanded the analysis focusing on one type of image encryption and applied the analysis to the encrypted image to measure the image properties, the strength of the encryption, and keys. Therefore, we implemented a system that automatically measures the performance effectiveness of each PRNG by executing cost-effectiveness calculations as the basis for further work. The details of these experiments and the results obtained led us to choose and define the deterministic effective method for encrypting images using an effective PRNG. finally, we proposed a system to solve the security issue by encrypting images based on the effective PRNG chosen. This proposed algorithm aims to increase the level of security in digital image transmission by improving defects in generators. Our proposed system focuses on effective keystream generation using a chaotic gravitational search algorithm to select random PRNGs in the starting encryption key, followed by a binary gravitational search algorithm to produce the initial value for the selected generator. The proposed image encryption assures three security standards: content integrity, authenticity, and confidentiality. These features achieved the intended aims by increasing the security level and decreasing the probability of discovering the encryption key by external adversaries. Experimentation of the proposed method is applied by using MATLAB 2019. To test the validity of the performance of the proposed image encryption, various test measures are applied, like the visual testing, the statistical testing such as the histogram, the entropy, the Mean Square Error (MSE) and the Peak Signal to Noise Ratio (PSNR). All of these tests have given results indicating that this proposed image encryption is feasible and practical, where encryption and decryption were done successfully and efficiently

العنوان: تشفير الصور بسرية عالية من خالل دمج أنظمة أرقام عشوائية مختلفة
عناوين أخرى: High Security Image Cryptography Combining Different PRNG Techniques
المؤلفون: Gutub, Adnan Abdul-Aziz
Al-Roithy, Budoor Obid
الموضوعات :: أمن الحاسبات الإلكترونية
الحاسبات الآلية هندسة
تاريخ النشر :: 2021
الناشر :: جامعة أم القرى
الملخص: t In the last three decades, taking images and sending images has become a daily activity among people due to the massive spread of smartphones equipped with digital cameras, webcams, professional digital cameras. Unauthorized and illegal users should not have the capability of viewing or reaching such images in any means, and some cases become more critical when it comes to critical fields such as politics, military, health care providers. Therefore, exchanged images need to be transformed in a well-managed, secure and reliable manner. PRNG algorithm is the most widely used in image encryption. PRNG is useful in practice because it is repeatable and generates numbers quickly. This algorithm does not depend on a random source, but on mathematical computation, that exposes the image encryption to a violation in the encryption detection. The decisive factor in encryption strength depends mainly on choosing a strong PRNG, for the characteristics of the PRNG to be statistically strong. There is some limitation in existing works, such as a building encryption system on a statistically weak random number generator or using the default PRNG algorithm which is inadequate for encrypting images resulting in easy detection of the encryption key. This study addresses the limitations of the existing image cryptography methods by following and studying a logical method through analysis, comparison, and improvement. Initially, we analyzed PRNG usages by performing various statistical measurements on the encrypted RGB and grayscale images and investigated the performance through manual comparison. Then, we expanded the analysis focusing on one type of image encryption and applied the analysis to the encrypted image to measure the image properties, the strength of the encryption, and keys. Therefore, we implemented a system that automatically measures the performance effectiveness of each PRNG by executing cost-effectiveness calculations as the basis for further work. The details of these experiments and the results obtained led us to choose and define the deterministic effective method for encrypting images using an effective PRNG. finally, we proposed a system to solve the security issue by encrypting images based on the effective PRNG chosen. This proposed algorithm aims to increase the level of security in digital image transmission by improving defects in generators. Our proposed system focuses on effective keystream generation using a chaotic gravitational search algorithm to select random PRNGs in the starting encryption key, followed by a binary gravitational search algorithm to produce the initial value for the selected generator. The proposed image encryption assures three security standards: content integrity, authenticity, and confidentiality. These features achieved the intended aims by increasing the security level and decreasing the probability of discovering the encryption key by external adversaries. Experimentation of the proposed method is applied by using MATLAB 2019. To test the validity of the performance of the proposed image encryption, various test measures are applied, like the visual testing, the statistical testing such as the histogram, the entropy, the Mean Square Error (MSE) and the Peak Signal to Noise Ratio (PSNR). All of these tests have given results indicating that this proposed image encryption is feasible and practical, where encryption and decryption were done successfully and efficiently
الوصف :: 205 ورقة.
الرابط: http://dorar.uqu.edu.sa//uquui/handle/20.500.12248/130824
يظهر في المجموعات :الرسائل العلمية المحدثة

الملفات في هذا العنصر:
ملف الوصف الحجمالتنسيق 
24641.pdf
"   الوصول المحدود"
الرسالة الكاملة31.95 MBAdobe PDFعرض/ فتح
طلب نسخة
abse24641.pdf
"   الوصول المحدود"
ملخص الرسالة بالإنجليزي352.34 kBAdobe PDFعرض/ فتح
طلب نسخة
cont24641.pdf
"   الوصول المحدود"
فهرس الموضوعات670.6 kBAdobe PDFعرض/ فتح
طلب نسخة
indu24641.pdf
"   الوصول المحدود"
المقدمة1.14 MBAdobe PDFعرض/ فتح
طلب نسخة
title24641.pdf
"   الوصول المحدود"
غلاف295.42 kBAdobe PDFعرض/ فتح
طلب نسخة
اضف إلى مراجعى الاستشهاد المرجعي طلب رقمنة مادة

تعليقات (0)



جميع الأوعية على المكتبة الرقمية محمية بموجب حقوق النشر، ما لم يذكر خلاف ذلك