Please wait...

Image Encryption Using Genetic Algorithm - Final Year Project Report (CSC-404) 

Resource tools

File information File size Options

Original PDF File

193 KB Request

Screen

545 × 800 pixels (0.44 MP)

4.6 cm × 6.8 cm @ 300 PPI

82 KB Request
Resource details

Resource ID

90

Access

Open

Contributed by

Admin User

Author/Contributor

Bidur Kunwar, Binaya Rijal, Jeetendra Manandhar (Supervisor)

Publisher/Credit

Kathmandu: St. Xavier's College

Date

October 2014

Document type

Thesis or project

Department

Computer science

Course

BscCSIT, CSC-404: Project work

Level

Bachelor

Batch

2010

Abstract

With the ever-increasing growth of multimedia applications, security has become an
important issue on communication and storage of images. Usually, encryption is one better way
to ensure the high security. It is well-known that image encryption has extensively applications
in Internet communication, multimedia systems, medical imaging, telemedicine, and so on
Cryptography is the science of making communication/storage unintelligible to anyone except
the intended receiver(s). Genetic algorithm are a class of optimization algorithms. GAs attempt
to solve problems through modeling a simplified version of genetic processes
Generally, Genetic Algorithms contain three basic operators: reproduction, crossover, and
mutation, where all three are analogous to their namesakes in genetics. Reproduction and
crossover together give genetic algorithms most of their searching power. In this paper, we
propose a genetic algorithm based secret key image encryption method. After the development of
this proposed method, it will tend satisfy the goals that are required in any encryption method for
encrypt images.
This report initiates with the introduction part where we has explained about the Genetic
Algorithm and its various techniques. It is followed by the ideas about challenges of electronic
transmissions and how GA for image encryption can reduce those challenges. We have
developed a working system for our project using simple cryptographic technique.
The report further presents its development process and Genetic implementation related to the
system and concludes with summary of the system and discussion related to project
achievements, limitations, recommendation and critical appraisal of the system. References and
appendix are attached at last portion of the report.

Search for similar resources

Remove