Study on Different Image Encryption Technique
نویسندگان
چکیده
منابع مشابه
A Study on Different Approaches of Selective Encryption Technique
Omnipresence of security in every application in Internet application is a clear motivation to contribute in the field of Information Security. Security is one of the most challenging aspects in the internet and network applications. Encryption is a process which is used to secure the data and the Encryption algorithms play a crucial role in efficient information security systems. Full encrypti...
متن کاملA Study of Binary Image Encryption Using Partial Image Encryption Technique
Chung and Chang proposed an encryption scheme for binary images based on two-dimensional run-encoding (2DRE) and scan patterns. In this paper, we indicate that their scheme is still not secure and efficient enough. Hence, an improvement scheme is proposed. There are two contributions in the proposed improvement scheme using partial image encryption techniques. O n e i s t o scrambling the pixel...
متن کاملPermutation based Image Encryption Technique
Information security is the key in the era of electronic data exchange. Images constitute a large portion of the electronic data. Confidentiality of color images is a difficult process. Most of the image encryption algorithms are complex and compromise on the quality of the image. This paper proposes a new image encryption based on random pixel permutation with the motivation to maintain the qu...
متن کاملImage Encryption Using Block Scrambling Technique
Due to the rapid growth of digital communication and multimedia application, security becomes an important issue in data exchange process over the wide network. In this paper, an efficient technique is presented with the help of cipher block chaining (CBC) operation ,which is used for image encryption. We test our proposed technique using MATLAB R2010a, it can achieve various image quality para...
متن کاملImage Encryption Technique Based on Permutation and Combination
“Combination of Encryption and Decryption for secure communication is an application”. Here I am using Permutation and substitution technique to make our data more secure. It is concerned in hiding the information in secure and robust manner so that the confidentiality of the data remains. This paper also attempts to identify the requirement of good key generation algorithm and its decryption. ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IJARCCE
سال: 2017
ISSN: 2278-1021
DOI: 10.17148/ijarcce.2017.6615