[PDF][PDF] A review on DES, AES and blowfish for image encryption & decryption

A Devi, A Sharma, A Rangra - International Journal of Computer Science …, 2015 - Citeseer
Network Security is the most vital component in information security because it is
responsible for securing all information passed through networked computers.[1] In this …

[PDF][PDF] Image encryption using different techniques for high security transmission over a network

MSQ Khizrai, S Bodkhe - … Journal of Engineering Research and General …, 2014 - Citeseer
Digital image is a collection of the pixel with different intensity values, and each image is in
the form of n* m, no of pixel (where n, m is no of Rows and Column) when we transfer a …

[PDF][PDF] A review: image encryption techniques and its terminologies

A Oad, H Yadav, A Jain - International Journal of Engineering and …, 2014 - Citeseer
In today's environment, security becomes an important issue in communication. For secure
transmission of data in open network, encryption is very important methodology. Though …

Image encryption techniques: a selected review

S Kaur, S Kaur - ZENITH International Journal of …, 2012 - indianjournals.com
In present times, the image encryption is becoming most popular area in research. Because
the protection or we can say security of images is done with the help of image encryption in …

[PDF][PDF] Review of image encryption techniques

M Kumar, RAM Lahcen, RN Mohapatra… - Journal of Computing …, 2020 - academia.edu
Security is one of the core areas of study in recent days. Encryption of the image is widely
known as an effective method for its secure transmission. The objective of any image …

[PDF][PDF] A survey report on Different Techniques of Image Encryption

A Srivastava - International Journal of Emerging Technology and …, 2012 - academia.edu
In the present world when whole web is now coming on from text data to multimedia data,
one of the major security concerns is the protection of this multimedia data. Image, which …

[PDF][PDF] Image encryption using different techniques: A review

KD Patel, S Belani - International Journal of Emerging Technology …, 2011 - researchgate.net
In present times, the protection of multimedia data is becoming very important. The
protection of this multimedia data can be done with encryption. There are so many different …

An image encryption method: SD-advanced image encryption standard: SD-AIES

S Dey - International Journal of Cyber-Security and Digital …, 2012 - ray.yorksj.ac.uk
The security of digital information in modern times is one of the most important factors to
keep in mind. For this reason, in this paper, the author has proposed a new standard method …

A SURVEY OF THE MOST CURRENT IMAGE ENCRYPTION AND DECRYPTION TECHNIQUES.

MAB Younes - … Journal of Advanced Research in Computer …, 2019 - search.ebscohost.com
Nowadays, the internet plays a key role in almost every aspect of life. This article presents a
new set of data storage and protection challenges. It shows a general introduction to …

[PDF][PDF] A survey on different image encryption and decryption techniques

R Pakshwar, VK Trivedi, V Richhariya - International journal of computer …, 2013 - Citeseer
This paper focuses mainly on the different kinds of image encryption and decryption
techniques. In addition focuses on image encryption techniques, As the use digital …