Text
Information hiding text in image: encryption
Table of content:
1. Introduction and literature survey
1.1 Intrduction
1.2 Computer imaging system
1.3 Attacks, services, and mechanisms
1.4 Security services
1.5 Attacks
1.6 Security attacks
1.7 The aim of thesis
1.8 Related literature & historical review
1.9 Scope of thesis
2. Theoretical principles and measures
2.1 Introduction
2.2 Image file formats
2.3 Key security
2.4 Synchronous stream cipher systems
2.5 Design of practical stream cipher key generator
2.6 Pseudorandom sequence
2.7 Steganography as an aid to cryptography
3. Digital image encryption systems
3.1 Image encryption using large-scale randomization stream cipher scheme
3.2 Basic form for the presented algorithm
3.3 Key structure
3.4 Initialization and operation
3.5 Linear complexity
3.6 Image encryption using stream cipher generator not based on (sub-generators)
4. The proposed system design
4.1 Introduction
4.2 Steganography as an aid to cryptography
4.3 The main algorithm for TICSS
4.4 TICSS security
5. Conclusions and suggestion for future works
No other version available