[PDF][PDF] Image encryption using different techniques for high security transmission over a network

MSQ Khizrai, S Bodkhe - … Journal of Engineering Research and General …, 2014 - Citeseer
Digital image is a collection of the pixel with different intensity values, and each image is in
the form of n* m, no of pixel (where n, m is no of Rows and Column) when we transfer a …

[PDF][PDF] A review: image encryption techniques and its terminologies

A Oad, H Yadav, A Jain - International Journal of Engineering and …, 2014 - Citeseer
In today's environment, security becomes an important issue in communication. For secure
transmission of data in open network, encryption is very important methodology. Though …

[PDF][PDF] Image encryption using different techniques: A review

KD Patel, S Belani - International Journal of Emerging Technology …, 2011 - researchgate.net
In present times, the protection of multimedia data is becoming very important. The
protection of this multimedia data can be done with encryption. There are so many different …

Image encryption techniques: a selected review

S Kaur, S Kaur - ZENITH International Journal of …, 2012 - indianjournals.com
In present times, the image encryption is becoming most popular area in research. Because
the protection or we can say security of images is done with the help of image encryption in …

[PDF][PDF] Review of image encryption techniques

M Kumar, R Lahcen, RN Mohapatra… - Journal of Computing …, 2020 - academia.edu
Security is one of the core areas of study in recent days. Encryption of the image is widely
known as an effective method for its secure transmission. The objective of any image …

[PDF][PDF] Security definitive parameters for image encryption techniques

T Kaur, R Sharma - International Journal of Emerging Technology …, 2013 - researchgate.net
Security Definitive Parameters for Image Encryption Techniques Page 1 International Journal
of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN …

[PDF][PDF] A review on DES, AES and blowfish for image encryption & decryption

A Devi, A Sharma, A Rangra - International Journal of Computer Science …, 2015 - Citeseer
Network Security is the most vital component in information security because it is
responsible for securing all information passed through networked computers.[1] In this …

[PDF][PDF] A survey report on Different Techniques of Image Encryption

A Srivastava - International Journal of Emerging Technology and …, 2012 - academia.edu
In the present world when whole web is now coming on from text data to multimedia data,
one of the major security concerns is the protection of this multimedia data. Image, which …

[PDF][PDF] An efficient technique for image encryption and decryption for secured multimedia application

AS Dongare, AS Alvi, NM Tarbani - International Research Journal …, 2017 - academia.edu
In the recent years, Internet multimedia applications have become very popular. The rapid
growth in the use of multimedia information has made the security of data storage and …

[PDF][PDF] Highly Secure Method for Image Transmission Using Partition and Multi Encryption Technique

P Mishra, B Thankachan - International Journal of Science and Research, 2013 - Citeseer
In present times, the protection of multimedia data is becoming very important. The
protection of this multimedia data can be done with encryption. There are so many different …