D-Library Repositry

//uquui/

Reports Community

Annual Report Collection

 2021

 تشفير الصور بسرية عالية من خالل دمج أنظمة أرقام عشوائية مختلفة

 Al-Roithy, Budoor Obid


//uquui/handle/20.500.12248/130824
Full metadata record
DC FieldValueLanguage
dc.contributor.adviserGutub, Adnan Abdul-Aziz-
dc.contributor.authorAl-Roithy, Budoor Obid-
dc.date.accessioned2021-09-01T05:26:00Z-
dc.date.available2021-09-01T05:26:00Z-
dc.date.issued2021en_US
dc.identifier.urihttp://dorar.uqu.edu.sa//uquui/handle/20.500.12248/130824-
dc.description205 ورقة.en_US
dc.description.abstractt In the last three decades, taking images and sending images has become a daily activity among people due to the massive spread of smartphones equipped with digital cameras, webcams, professional digital cameras. Unauthorized and illegal users should not have the capability of viewing or reaching such images in any means, and some cases become more critical when it comes to critical fields such as politics, military, health care providers. Therefore, exchanged images need to be transformed in a well-managed, secure and reliable manner. PRNG algorithm is the most widely used in image encryption. PRNG is useful in practice because it is repeatable and generates numbers quickly. This algorithm does not depend on a random source, but on mathematical computation, that exposes the image encryption to a violation in the encryption detection. The decisive factor in encryption strength depends mainly on choosing a strong PRNG, for the characteristics of the PRNG to be statistically strong. There is some limitation in existing works, such as a building encryption system on a statistically weak random number generator or using the default PRNG algorithm which is inadequate for encrypting images resulting in easy detection of the encryption key. This study addresses the limitations of the existing image cryptography methods by following and studying a logical method through analysis, comparison, and improvement. Initially, we analyzed PRNG usages by performing various statistical measurements on the encrypted RGB and grayscale images and investigated the performance through manual comparison. Then, we expanded the analysis focusing on one type of image encryption and applied the analysis to the encrypted image to measure the image properties, the strength of the encryption, and keys. Therefore, we implemented a system that automatically measures the performance effectiveness of each PRNG by executing cost-effectiveness calculations as the basis for further work. The details of these experiments and the results obtained led us to choose and define the deterministic effective method for encrypting images using an effective PRNG. finally, we proposed a system to solve the security issue by encrypting images based on the effective PRNG chosen. This proposed algorithm aims to increase the level of security in digital image transmission by improving defects in generators. Our proposed system focuses on effective keystream generation using a chaotic gravitational search algorithm to select random PRNGs in the starting encryption key, followed by a binary gravitational search algorithm to produce the initial value for the selected generator. The proposed image encryption assures three security standards: content integrity, authenticity, and confidentiality. These features achieved the intended aims by increasing the security level and decreasing the probability of discovering the encryption key by external adversaries. Experimentation of the proposed method is applied by using MATLAB 2019. To test the validity of the performance of the proposed image encryption, various test measures are applied, like the visual testing, the statistical testing such as the histogram, the entropy, the Mean Square Error (MSE) and the Peak Signal to Noise Ratio (PSNR). All of these tests have given results indicating that this proposed image encryption is feasible and practical, where encryption and decryption were done successfully and efficientlyen_US
dc.language.isoعربيen_US
dc.publisherجامعة أم القرىen_US
dc.relation.isformatofمكتبة الملك عبدالله بن عبدالعزيز الجامعيةen_US
dc.subjectأمن الحاسبات الإلكترونيةen_US
dc.subjectالحاسبات الآلية هندسةen_US
dc.titleتشفير الصور بسرية عالية من خالل دمج أنظمة أرقام عشوائية مختلفةen_US
dc.title.alternativeHigh Security Image Cryptography Combining Different PRNG Techniquesen_US
dc.identifier.callnum24644-
dc.type.formatماجستيرen_US
dc.publisher.countryالمملكة العربية السعوديةen_US
dc.relation.collageالحاسب الآلي ونظم المعلوماتen_US
dc.type.statusمجازen_US
dc.rights.holdYesen_US
dc.rights.digitalYesen_US
dc.publisher.cityمكة المكرمةen_US
dc.date.issuedhijri1442en_US
dc.relation.depهندسة الحاسب الآليen_US
dc.rights.digitizedYesen_US
Appears in Collections :الرسائل العلمية المحدثة

Files in This Item :
File Description SizeFormat 
24641.pdf
"   Restricted Access"
الرسالة الكاملة31.95 MBAdobe PDFView/Open
Request a copy
abse24641.pdf
"   Restricted Access"
ملخص الرسالة بالإنجليزي352.34 kBAdobe PDFView/Open
Request a copy
cont24641.pdf
"   Restricted Access"
فهرس الموضوعات670.6 kBAdobe PDFView/Open
Request a copy
indu24641.pdf
"   Restricted Access"
المقدمة1.14 MBAdobe PDFView/Open
Request a copy
title24641.pdf
"   Restricted Access"
غلاف295.42 kBAdobe PDFView/Open
Request a copy

Comments (0)



Items in D-Library are protected by copyright, with all rights reserved, unless otherwise indicated.