Please use this identifier to cite or link to this item:
https://dspace.univ-ouargla.dz/jspui/handle/123456789/28732
Title: | Cryptography algorithm based on rotating view and genetic algorithm |
Authors: | Kaouthar, Souigat Saliha, Hadji Adel, Zga |
Keywords: | Rivest Cipher 4, Least Significant Bit Algorithm, Direct Image Projection, Genetic Algorithm, Fitness Function Rivest Cipher 4, Algorithme de Bit le Moins Significatif, Projection d'Image Directe, Algorithme Génétique, Fonction de Fitness خوارزمية البت الأقل أهمية، إسقاط مباشر للصورة، الخوارزمية الجينية، وظيفة اللياقة،)RC4( ريفست شيفر 4 |
Issue Date: | 2020 |
Publisher: | UNIVERSITY OF KASDI MERBAH OUARGLA |
Abstract: | Encryption has been a form of secure communication for decades, and with the development of human civilization, the demand for developing new forms of encryption is necessary to ensure the security of communications. The encryption algorithm is a technology for converting data transferred from a readable form to an unreadable form to prevent unauthorized access while ensuring the preservation of what the data is. We specialized in this research in ways to encrypt images, so we presented several algorithms to carry out the operation, among which are the ones that are already in place: RC4 that is used in any secured wired equivalent privacy network (WEP), Under a common key[80], And LSB Which is used in the technique of hiding information in an image, and to improve and make it usable for image encryption, we proposed a new algorithm based on the projection, the idea of this method is to consider the position where each pixel is projected in a new image. This position is defined by the intersection of the light beam of the pixel and the image to be considered according to the virtual position of the observer, by a certain angle and distance. In order to improve the algorithm more and make it less susceptible to fracture, we decided to develop this algorithm through hybridization between the projection algorithm and Genetic Algorithm, That is based on merging and transferring, we implemented the latter in two forms, the first by calculating fitness and the second without calculating it. This algorithm provides safer image encryption, minimum data loss, maximum speed and maximum distortion in encryption. |
URI: | http://dspace.univ-ouargla.dz/jspui/handle/123456789/28732 |
Appears in Collections: | Département d'Electronique et des Télécommunications - Master |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Souigat-Hadji_.pdf | 1,83 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.