Image encryption by redirection and cyclical shift
dc.contributor.advisor | Grigoryan, Artyom | |
dc.contributor.author | Wiatrek, Bryan Anthony | |
dc.contributor.committeeMember | Akopian, David | |
dc.contributor.committeeMember | Krishnan, Ram | |
dc.date.accessioned | 2024-03-08T17:36:27Z | |
dc.date.available | 2024-03-08T17:36:27Z | |
dc.date.issued | 2015 | |
dc.description | This item is available only to currently enrolled UTSA students, faculty or staff. To download, navigate to Log In in the top right-hand corner of this screen, then select Log in with my UTSA ID. | |
dc.description.abstract | In this thesis, we present a novel method for encrypting and decrypting large amounts of data such as 2-D images, both gray-scale and color, without the loss of information, and using private keys of varying lengths. The proposed method is based on the concept of the tensor representation of an image and splitting the two-dimensional (2-D) discrete Fourier transform (DFT) by one-dimensional (1-D) DFTs of signals from the tensor representation, or transform. The pixels in the original image can be re-organized, or redirected, in such a way that these 1-D splitting-signals can be easily calculated by each row (or column) of the image. This redirection, followed by a cyclical shift of the image, causes the image to become distorted. Repeating several iterations of redirecting, followed by a cyclical shift, makes for an encrypted image that is uncorrelated. The decryption algorithm uses the encrypted data, and processes them in inverse order, with an identical number of iterations. The encryption method is very efficient, as it has a cpu-working time of approximately 0.0156s for encrypting a gray-scale image of size 256×256, and 0.6250s for an image of size 512×512. Simulation results of the purposed method are presented to show the performance for the image encryption method. | |
dc.description.department | Electrical and Computer Engineering | |
dc.format.extent | 67 pages | |
dc.format.mimetype | application/pdf | |
dc.identifier.isbn | 9781321737042 | |
dc.identifier.uri | https://hdl.handle.net/20.500.12588/6178 | |
dc.language | en | |
dc.subject | Image Decryption | |
dc.subject | Image Encryption | |
dc.subject | Redirected Image | |
dc.subject | Tensor Representation | |
dc.subject | Tensor Transform | |
dc.subject.classification | Electrical engineering | |
dc.subject.lcsh | Data encryption (Computer science) | |
dc.subject.lcsh | Image reconstruction | |
dc.subject.lcsh | Image processing -- Digital techniques | |
dc.title | Image encryption by redirection and cyclical shift | |
dc.type | Thesis | |
dc.type.dcmi | Text | |
dcterms.accessRights | pq_closed | |
thesis.degree.department | Electrical and Computer Engineering | |
thesis.degree.grantor | University of Texas at San Antonio | |
thesis.degree.level | Masters | |
thesis.degree.name | Master of Science |
Files
Original bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- Wiatrek_utsa_1283M_11580.pdf
- Size:
- 4.11 MB
- Format:
- Adobe Portable Document Format