Dissertations / Theses on the topic 'Data encryption'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Data encryption.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Meissner, Robert. "Data Encryption Standard." Universitätsbibliothek Chemnitz, 2002. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200200590.
Full textFahmy, A. "Data encryption of communication data links." Thesis, University of Kent, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.385199.
Full textTopsholm, Max. "Transactional Data Encryption View." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-147885.
Full textLuque, González Jorge, and Fernandez Ignacio Arenchaga. "Data Encryption on a Network." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-9352.
Full textEn este proyecto encontraras un estudio sobre diferentes algoritmos de encriptación, que son usados para salvaguardar la información en mensajes por la red. Además hemos desarrollado una aplicación cliente-servidor que enviara información a través de la red de forma segura. Hay dos tipos de algoritmos de encriptación, los simétricos y los asimétricos. Ambos tipos de algoritmos son utilizados para establecer la comunicación, el asimétrico (RSA) es utilizado para establecer la clave del simétrico y a partir de entonces se utilizara exclusivamente el algoritmo simétrico (Blowfish).
Yu, Lingfeng. "Multidimensional data encryption with virtual optics /." View Abstract or Full-Text, 2003. http://library.ust.hk/cgi/db/thesis.pl?MECH%202003%20YU.
Full textIslam, Naveed. "Cryptography based Visual Data Protection." Thesis, Montpellier 2, 2011. http://www.theses.fr/2011MON20178/document.
Full textDue to the advancements in the information and communication technologies, the transmission of multimedia data over secure or insecure communication channels has increased exponentially. The security of data in applications like safe storage, authentications, copyright protection,remote military image communication or confidential video-conferencing require new strategies for secure transmission. Two techniques are commonly used for the secure transmission of visual data, i.e. cryptography and steganography. Cryptography achieves security by using secret keysto make the data illegible while steganography aims to hide the data in some innocent carrier signal. For shared trust and distributed environment, secret sharing schemes provide sufficient security in various communication applications. The principal objective of this thesis is to achieveprotection of visual data especially images through modern cryptographic techniques. In this context, the focus of the work in perspective, is twofolded. The first part of our work focuses on the security of image data in shared environment while the second part focuses on the integrity ofimage data in the encrypted domain during transmission.We proposed a new sharing scheme for images which exploits the additive and multiplicative homomorphic properties of two well known public key cryptosystems, namely, the RSA and the Paillier. In traditional secret sharing schemes, the dealer partitions the secret into shares and distributethe shares to each of the player. Thus, none of the involved players participate in the creation of the shared secret and there is always a possibilitythat the dealer can cheat some player. On the contrary, the proposed approach employs the secret sharing scheme in a way that limits the influence of the dealer over the protocol by allowing each player to participate. The second part of our thesis emphasizes on the integrity of visual data during transmission. Data integrity means that the data have its complete structure during any operation like storage, transfer or retrieval. A single bit change in encrypted data can have catastrophic impact over the decrypted data. We address the problem of error correction in images encrypted using symmetric key cryptosystem of the Advanced Encryption Standard (AES) algorithm. Three methods are proposed to exploit the local statistics of the visual data and the encryption algorithm to successfully correct the errors
Jones, John W. "Data encryption based on the logarithm problem." Thesis, University of Ottawa (Canada), 1986. http://hdl.handle.net/10393/4825.
Full textClevenger, Mark Allen. "Data encryption using RSA public-key cryptosystem." Virtual Press, 1996. http://liblink.bsu.edu/uhtbin/catkey/1014844.
Full textDepartment of Computer Science
Moulianitakis, Feidias, and Konstantinos Asimakopoulos. "Benchmarking Framework for Transparent Data Encryption Systems." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-75814.
Full textUehara, Takeyuki. "Contributions to image encryption and authentication." Access electronically, 2003. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20040920.124409/index.html.
Full textKalibjian, Jeff. "Data Security Architecture Considerations for Telemetry Post Processing Environments." International Foundation for Telemetering, 2017. http://hdl.handle.net/10150/626950.
Full textNordwall, Jennifer. "Software Encryption in Mobile Devices." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-18656.
Full textManiccam, Suchindran S. "Image-video compression, encryption and information hiding /." Online version via UMI:, 2001.
Find full textLazebna, Anastasia Dmitrivna, and Анастасія Дмитрівна Лазєбна. "The problem of data encryption in international relations." Thesis, National Aviation University, 2021. https://er.nau.edu.ua/handle/NAU/51653.
Full textThe problem of leaking confidential information and hacking the database is very relevant to contemporary international relations. It is often the case that political differences lead to information struggles for truth and power. The Government could not contain the situation at an adequate level, and the media made matters worse, at such times it was no longer possible to control the citizens of one country or another, and then the hackers began to attack. A prime example is the White House, which is attacked every year, and it’s getting harder to contain attacks. This occurred in 2010. The Wikileaks site specializes in publishing secret documents and information which became available as a result of «leaks». More than 90,000 reports and intelligence reports published there on the conflict in Afghanistan were produced during the last six years of the military operation, during which more than 300 British and more than 1,000 American soldiers were killed. This leak of classified information was perhaps the largest in US history.
Проблема витоку конфіденційної інформації та злому бази даних дуже актуальна для сучасних міжнародних відносин. Часто буває, що політичні розбіжності ведуть до інформаційної боротьби за правду та владу. Уряд не міг стримати ситуацію на належному рівні, а ЗМІ погіршили ситуацію, і в такі часи було неможливо контролювати громадян тієї чи іншої країни, і тоді хакери почали атакувати. Яскравий приклад - Білий дім, на якого щороку нападають, і стримувати напади стає все важче. Це сталося в 2010 році. Сайт Wikileaks спеціалізується на публікації секретних документів та інформації, які стали доступними в результаті «витоків». За останні шість років воєнної операції, під час якої загинуло понад 300 британських та понад 1000 американських солдатів, було опубліковано понад 90 000 звітів та звітів розвідки, опублікованих там. Цей витік секретної інформації був чи не найбільшим в історії США.
Meißner, Robert. "Data Encryption Standard (DES) [Einführung, Funktionsweise, Risiken, Alternativen] /." [S.l. : s.n.], 2002. http://www.bsz-bw.de/cgi-bin/xvms.cgi?SWB10324753.
Full textLim, Jen A. "The security of arithmetic coding encryption schemes." Thesis, Queensland University of Technology, 1997. https://eprints.qut.edu.au/36834/1/36834_Lim_1997.pdf.
Full textYu, Shucheng. "Data Sharing on Untrusted Storage with Attribute-Based Encryption." Digital WPI, 2010. https://digitalcommons.wpi.edu/etd-dissertations/321.
Full textWatkins, Stan M. "FLEXIBLE SECURE DATA COMMUNICATIONS WITH THE RANGE ENCRYPTION MODULE." International Foundation for Telemetering, 1999. http://hdl.handle.net/10150/608536.
Full textThis paper discusses the design, application and flexibility of the Range Encryption Module (REM) developed by L3 Communications Conic Division for the Range Application Joint Program Office (RAJPO) located at Eglin Air Force Base in Florida. The REM is a burst encrypter that utilizes the National Security Agency Thornton CTIC/DS- 101 Hybrid (CDH) encryption algorithm. The CDH device operates under the control of a Conic-designed digital ASIC. The CDH, ASIC, Power Management and parallel bus interface circuits reside on a single card within the REM called the Common Encryption Core (CEC). The REM and CEC card within the REM offer flexibility in many operational features, as described below.
Ramotsoela, Tsotsope Daniel. "Data aggregation using homomorphic encryption in wireless sensor networks." Diss., University of Pretoria, 2015. http://hdl.handle.net/2263/61330.
Full textDraadlose sensornetwerke raak toenemend meer gewild vir heelwat verskillende toepassings, soos byvoorbeeld opgewingsmonitering en wetstoepassing. Data-aggregasie is n metode wat gebruik word om netwerkverkeer te verminder, maar kan nie gebruik word saam met konvensionele enkripsie-skemas nie, omdat dit nie veilig is nie en oorhoofse koste verhoog. Homomorfiese enkripsie is n enkripsie-skema wat dataverwerking toelaat op geënkripteerde in teenstelling met gewone-teks. Dit het die voordeel dat elke intermediêre nie nodig het om elke pakkie te dekripteer nie, maar die resulterende kodeteks is gewoonlik heelwat groter as die gewone-teks. Dit kan die stelselgedrag negatief beÏnvloed omdat die energieverbruik van elke node eweredig is aan die hoeveelheid data wat dit versend. Hierdie studie ondersoek die voor- en nadele van homomorfiese enkripsie in die aggregasieproses, veral in die konteks van skaleerbare netwerke. Daar is gevind dat konvensionele enkripsie beter vaar as homomorfies enkripsie in kleiner netwerke. Die omgekeerde is waar vir groter netwerke. Dit is ook gevind dat homomorfiese enkripsie gewone-teks-aggregasie negatief beÏnvloed, maar dit word as aanvaarbaar beskou vir toepassings waar sekuriteit belangrik is.
Dissertation (MEng)--University of Pretoria, 2015.
Electrical, Electronic and Computer Engineering
Meng
Unrestricted
Brockmann, Andrew. "A Plausibly Deniable Encryption Scheme for Personal Data Storage." Scholarship @ Claremont, 2015. http://scholarship.claremont.edu/hmc_theses/88.
Full textChen, Hang. "Optical Encryption Techniques for Color Image and Hyperspectral Data." Thesis, Université de Lorraine, 2017. http://www.theses.fr/2017LORR0374.
Full textOptical information security is one of the most important research directions in information science and technology, especially in the field of copyright protection, confidential information transmission/storage and military remote sensing. Since double random phase encoding technology (DRPE) was proposed, optical image encryption technology has become the main topic of optical information security and it has been developed and studied deeply. Optical encryption techniques offer the possibility of high-speed parallel processing of two dimension image data and hiding information in many different dimensions. In this context, much significant research and investigation on optical image encryption have been presented based on DRPE or further optical operation, such as digital holography, Fresnel transform, gyrator transform. Simultaneously, the encrypted image has been extended from single gray image to double image, color image and multi-image. However, the hyperspectral image, as a significant element in military and commercial remote sensing, has not been deeply researched in optical encryption area until now. This work extends the optical encryption technology from color image to hyperspectral image. For better comprehension of hyperspectral image encryption, this work begins with the introduction and analysis of the characteristics of hyperspectral cube. Subsequently, several kinds of encryption schemes for color image, including symmetric and asymmetric cryptosystem, are presented individually. Furthermore, the optical encryption algorithms for hyperspectral cube are designed for securing both the spatial and spectral information simultaneously. Some numerical simulations are given to validate the performance of the proposed encryption schemes. The corresponding attack experiment results demonstrate the capability and robustness of the approaches designed in this work. The research in this dissertation provides reference for the further practicality of hyperspectral image encryption
Chen, Hang. "Optical Encryption Techniques for Color Image and Hyperspectral Data." Electronic Thesis or Diss., Université de Lorraine, 2017. http://www.theses.fr/2017LORR0374.
Full textOptical information security is one of the most important research directions in information science and technology, especially in the field of copyright protection, confidential information transmission/storage and military remote sensing. Since double random phase encoding technology (DRPE) was proposed, optical image encryption technology has become the main topic of optical information security and it has been developed and studied deeply. Optical encryption techniques offer the possibility of high-speed parallel processing of two dimension image data and hiding information in many different dimensions. In this context, much significant research and investigation on optical image encryption have been presented based on DRPE or further optical operation, such as digital holography, Fresnel transform, gyrator transform. Simultaneously, the encrypted image has been extended from single gray image to double image, color image and multi-image. However, the hyperspectral image, as a significant element in military and commercial remote sensing, has not been deeply researched in optical encryption area until now. This work extends the optical encryption technology from color image to hyperspectral image. For better comprehension of hyperspectral image encryption, this work begins with the introduction and analysis of the characteristics of hyperspectral cube. Subsequently, several kinds of encryption schemes for color image, including symmetric and asymmetric cryptosystem, are presented individually. Furthermore, the optical encryption algorithms for hyperspectral cube are designed for securing both the spatial and spectral information simultaneously. Some numerical simulations are given to validate the performance of the proposed encryption schemes. The corresponding attack experiment results demonstrate the capability and robustness of the approaches designed in this work. The research in this dissertation provides reference for the further practicality of hyperspectral image encryption
Chenette, Nathan Lee. "Symmetric schemes for efficient range and error-tolerant search on encrypted data." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/48976.
Full textJolfaei, Alireza. "Robust Encryption Schemes for 3D Content Protection." Thesis, Griffith University, 2016. http://hdl.handle.net/10072/367353.
Full textThesis (PhD Doctorate)
Doctor of Philosophy (PhD)
School of Information and Communication Technology
Science, Environment, Engineering and Technology
Full Text
Kapusta, Katarzyna. "Protecting data confidentiality combining data fragmentation, encryption, and dispersal over a distributed environment." Electronic Thesis or Diss., Paris, ENST, 2018. http://www.theses.fr/2018ENST0061.
Full textThis thesis dissertation revisits state-of-the-art fragmentation techniques making them faster and cost-efficient. The main focus is put on increasing data confidentiality without deteriorating the processing performance. The ultimate goal is to provide a user with a set of fast fragmentation methods that could be directly applied inside an industrial context to reinforce the confidentiality of the stored data and/or accelerate the fragmentation processing. First, a rich survey on fragmentation as a way of preserving data confidentiality is presented. Second, the family of all-or-nothing transforms is extended with three new proposals. They all aim at protecting encrypted and fragmented data against the exposure of the encryption key but are designed to be employed in three different contexts: for data fragmentation in a multi-cloud environment, a distributed storage system, and an environment composed of one storage provider and one private device. Third, a way of accelerating fragmentation is presented that achieves better performance than data encryption using the most common symmetric-key encryption algorithm. Fourth, a lightweight fragmentation scheme based on data encoding, permuting, and dispersing is introduced. It totally gets rid of data encryption allowing the fragmentation to be performed even faster; up to twice as fast as data encryption. Finally, fragmentation inside sensor networks is revisited, particularly in the Unattended Wireless Sensor Networks. The main focus in this case is put not solely on the fragmentation performance, but also on the reduction of storage and transmission costs by using data aggregation
Cathebras, Joël. "Hardware Acceleration for Homomorphic Encryption." Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLS576/document.
Full textIn this thesis, we propose to contribute to the definition of encrypted-computing systems for the secure handling of private data. The particular objective of this work is to improve the performance of homomorphic encryption. The main problem lies in the definition of an acceleration approach that remains adaptable to the different application cases of these encryptions, and which is therefore consistent with the wide variety of parameters. It is for that objective that this thesis presents the exploration of a hybrid computing architecture for accelerating Fan and Vercauteren’s encryption scheme (FV).This proposal is the result of an analysis of the memory and computational complexity of crypto-calculation with FV. Some of the contributions make the adequacy of a non-positional number representation system (RNS) with polynomial multiplication Fourier transform over finite-fields (NTT) more effective. RNS-specific operations, inherently embedding parallelism, are accelerated on a SIMD computing unit such as GPU. NTT-based polynomial multiplications are implemented on dedicated hardware such as FPGA. Specific contributions support this proposal by reducing the storage and the communication costs for handling the NTTs’ twiddle factors.This thesis opens up perspectives for the definition of micro-servers for the manipulation of private data based on homomorphic encryption
Budd, Chris. "Data Protection and Data Elimination." International Foundation for Telemetering, 2015. http://hdl.handle.net/10150/596395.
Full textData security is becoming increasingly important in all areas of storage. The news services frequently have stories about lost or stolen storage devices and the panic it causes. Data security in an SSD usually involves two components: data protection and data elimination. Data protection includes passwords to protect against unauthorized access and encryption to protect against recovering data from the flash chips. Data elimination includes erasing the encryption key and erasing the flash. Telemetry applications frequently add requirements such as write protection, external erase triggers, and overwriting the flash after the erase. This presentation will review these data security features.
Yi, Shuang. "Reversible data hiding technologies for encrypted images." Thesis, University of Macau, 2018. http://umaclib3.umac.mo/record=b3951604.
Full textUllagaddi, Vishwanath. "Development of Data Encryption Algorithms for Secure Communication Using Public Images." University of Toledo / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1341524458.
Full textCash, Charles David. "On the security and efficiency of encryption." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/31733.
Full textCommittee Chair: Boldreva, Alexandra; Committee Member: Ahamad, Mustaque; Committee Member: Randall, Dana; Committee Member: Tetali, Prasad; Committee Member: Traynor, Patrick. Part of the SMARTech Electronic Thesis and Dissertation Collection.
Tandon, Prateek. "High-performance advanced encryption standard (AES) security co-processor design." Thesis, Available online, Georgia Institute of Technology, 2004:, 2003. http://etd.gatech.edu/theses/available/etd-04082004-180433/unrestricted/tandon%5fprateek%5f200312%5fms.pdf.
Full textYamazato, Takaya, Iwao Sasase, and Shinsaku Mori. "Interlace Coding System Involving Data Compression Code, Data Encryption Code and Error Correcting Code." IEICE, 1992. http://hdl.handle.net/2237/7844.
Full textFernandez, Garcia Javier David, Sabrina Kirrane, Axel Polleres, and Simon Steyskal. "HDT crypt: Compression and Encryption of RDF Datasets." IOS Press, 2018. http://epub.wu.ac.at/6489/1/HDTCrypt%2DSWJ.pdf.
Full textXia, Ying Han. "Establishing trust in encrypted programs." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24761.
Full textCommittee Chair: Owen, Henry; Committee Co-Chair: Abler, Randal; Committee Member: Copeland, John; Committee Member: Giffin, Jon; Committee Member: Hamblen, Jim.
Mantzouris, Panteleimon. "Computational algebraic attacks on the Advanced Encryption Standard (AES)." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FMantzouris.pdf.
Full textThesis Advisor(s): Canright, David ; Butler, Jon. "September 2009." Description based on title screen as viewed on 5 November 2009. Author(s) subject terms: Advanced Encryption Standard (AES), Rijndael's algorithm, block cipher, decipher, round of the algorithm, sparse multivariate polynomial. Includes bibliographical references (p. 101). Also available in print.
Zhou, Jiantao. "Multimedia lightweight encryption via randomized entropy coding /." View abstract or full-text, 2009. http://library.ust.hk/cgi/db/thesis.pl?ECED%202009%20ZHOU.
Full textNorman, Kelly Robert. "Encryption of Computer Peripheral Devices." Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1232.pdf.
Full textGriffy, Scott Sherlock. "Crumpled and Abraded Encryption: Implementation and Provably Secure Construction." PDXScholar, 2019. https://pdxscholar.library.pdx.edu/open_access_etds/5067.
Full textYip, Shu Kei. "Digital watermarking and data hiding /." View abstract or full-text, 2006. http://library.ust.hk/cgi/db/thesis.pl?ECED%202006%20YIP.
Full textLi, Richard Yuk Ming. "Digital watermarking and data hiding /." View abstract or full-text, 2007. http://library.ust.hk/cgi/db/thesis.pl?ECED%202007%20LIR.
Full textAsenjo, Juan C. "Data Masking, Encryption, and their Effect on Classification Performance: Trade-offs Between Data Security and Utility." NSUWorks, 2017. http://nsuworks.nova.edu/gscis_etd/1010.
Full textShin, Dong Il. "Improving trust and securing data accessibility for e-health decision making by using data encryption techniques." Thesis, Queensland University of Technology, 2012. https://eprints.qut.edu.au/50636/1/Dong_Il_Shin_Thesis.pdf.
Full textPeng, Tie. "VLSI implementation of high-speed cellular automata encryption algorithm for data communications." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape8/PQDD_0002/MQ43345.pdf.
Full textHoff, Christopher David. "Cryptic Backup a framework for automated compression, encryption, and backup of data /." [Ames, Iowa : Iowa State University], 2008.
Find full textPeng, Tie Carleton University Dissertation Engineering Electronics. "VLSI implementation of high-speed cellular automata encryption algorithm for data communications." Ottawa, 1999.
Find full textZuber, Martin. "Contributions to data confidentiality in machine learning by means of homomorphic encryption." Electronic Thesis or Diss., université Paris-Saclay, 2020. http://www.theses.fr/2020UPASG048.
Full textWe aim to provide a set tools allowing for machine learning algorithms to yield their intended results while ensuring confidentiality properties are achieved for the underlying data. This can be achieved through regulatory measures such as prohibiting the use of a sensitive database in certain cases and restricting its access to certain law enforcement agencies. The fundamental reason for the existence of our work - and every other work like it - is the following: why trust that an outside entity will not misuse personal data when you can have assurances of that fact ? This applies both in the case of a private company that may use/sell your data for profit, legally or illegally. It also applies to use by a government which may or may not have the proper safeguards against abuse, as well as the proper security for data storage and access. In our case, we provide such confidentiality properties though the use of Fully Homomorphic Encryption (FHE). Precisely, most of our work focuses on finding new algorithms for secure outsourced machine learning evaluation using FHE. While other privacy and confidentiality preserving methods are touched upon briefly, we focused our research on homomorphic encryption and strive to explain our choice and its general context. We present three main novel secure machine learning applications: a confidentiality-preserving recursive discrete neural network; a model-confidential embedding-based neural network; a confidentiality-preserving k-NN classifier. Notably, our secure k-NN classifier is the only such algorithm in the literature obtaining a result noninteractively. We evaluate the accuracy and efficiency of these three applications on real-world machine learning problems. We show that our secure schemes compare very favorably to their non-secure counterparts in terms of accuracy, while still running in realistic time. Beyond these schemes themselves, this thesis promotes a specific research direction for secure machine learning. We argue for less (though still some) focus on deep convolutional neural networks and show that looking at somewhat lesser known machine learning algorithms can yield promising results
Wong, Hon Wah. "Image watermarking and data hiding techniques /." View Abstract or Full-Text, 2003. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202003%20WONGH.
Full textIncludes bibliographical references (leaves 163-178). Also available in electronic version. Access restricted to campus users.
Ferek, Matúš. "Bezpečená komunikace mezi data loggerem a databazovým serverem." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2011. http://www.nusl.cz/ntk/nusl-219262.
Full textShen, Chien-Jen, and 沈建仁. "Data Encryption and Compression Integrated System." Thesis, 1995. http://ndltd.ncl.edu.tw/handle/84630591242749970795.
Full text國立成功大學
資訊及電子工程研究所
83
In 1988, Cleary and Witten first introduced the concept for combining data compression and encryption using adaptive arithmetic coding compression algorithm. But Bergen and Hogan described that a chosen plaintext attack will allow attackers to determine the fixed model or adaptive model ( the source symbol table and associated frequencies ) in 1992 and 1993. In this thesis, We first discuss the security for data compression algorithm, and combine the dictionary coding and arithmetic coding compression algorithm to achieve better compression ratio. We also propose the encryption model for these compression algorithm and show that we can prevent the chosen plaintext attack or known plaintext attack.
Huang, Su-Chiung, and 黃素瓊. "Magic matrix encryption for secure data hiding." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/50974690504477366448.
Full text國立中央大學
資訊工程學系碩士在職專班
96
In this thesis, a novel method is presented to hide secure data for secrete communications by incorporating cryptography and data hiding technologies. In our approach, original data is encrypted by using the order of a magic matrix with secrete keys. There are two fundamental operations, including substitution and permutation, in traditional encryption process. According to the selected host image and magic matrix, mapping table for substation and permutation sequence are generated instead of the fixed permutation rule and substitution table used in traditional encryption algorithms. There are three secrete keys, host image selection key and magic matrix selection key pair, for use in encryption and decryption processes for data transmission. Finally, secure data obtained from previous processes are hided into LSB bit plane of the host image to construct a stego-image. The proposed system consists of two main modules, which are secure data hiding and data extraction modules. In data hiding module, eight steps are performed for data encryption and hiding. They are host image obtaining, magic matrix key obtaining, host mask generation, magic mask generation, mapping table generation, secure mask generation, secure data stream generation, and hiding process. As to the data extraction module, the first five steps are the same as those in the data hiding module excepting steps 6~8 which are secure data stream extraction, secure data stream decoding, and hiding data extraction. Experiments were conducted on various binary images and gray images. The average Hamming distance, i.e., error bit rate, is about 50% between original data and error binary data extracted by any of the secrete keys which is error or the corresponding secure data is lost. The phenomenon reveals that any attacker can not extract correct data when any of the secrete keys is lost. In addition, the information extracted by the attacker using error key will be the same as that obtained by random guess. Experimental results demonstrate the validity and efficiency of our proposed method. Moreover, the advantages of image complexity and variability property are both considered in designing the robust secure data hiding algorithm.