A review and analysis based on image encryption techniques

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Image Based Encryption Techniques: A Review

Now a day’s rapid increasing growth of internet and multimedia data, security is main problem in storage and communication of images. The solution of this multimedia data can be solved by using encryption. There are various techniques available to protect the image data from unauthorized access. In this paper, authors reviewed different existing techniques of image encryption and also discussed...

متن کامل

Review on Different Chaotic Based Image Encryption Techniques

In present times, Due to the rapidly growth of digital and multimedia applications, more multimedia data are developed and transmitted through the networks in ,art, entertainment, advertising, education, training and commercial areas, which may have important information that should not be accessed by the general users. Therefore issue of protecting the confidentiality, integrity, security, pri...

متن کامل

Digital Image Encryption Techniques: A Review

As the use digital techniques for transmitting and storing images are increasing, it becomes an important issue that how to protect the confidentiality, integrity and authenticity of images. There are various techniques which are discovered from time to time to encrypt the images to make images more secure. Image encryption techniques scrambled the pixels of the image and decrease the correlati...

متن کامل

A Novel Image Encryption Model Based on Hybridization of Genetic Algorithm, Chaos Theory and Lattice Map

Encryption is an important issue in information security which is usually provided using a reversible mathematical model. Digital image as a most frequently used digital product needs special encryption algorithms. This paper presents a new encryption algorithm high security for digital gray images using genetic algorithm and Lattice Map function. At the first the initial value of Logistic Map ...

متن کامل

A Survey on Existing Image Encryption Techniques

In today’s technical World people always concern with security of data before sending it over the internet. Security of data provides protection to data from unauthorized access. There is large no. of algorithms are available to secure the data. Cryptography plays a key role in data security. In modern cryptographic system encryption techniques are most widely in use. It provides security to da...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACCENTS Transactions on Information Security

سال: 2018

ISSN: 2455-7196

DOI: 10.19101/tis.2018.311001