[PDF][PDF] A review: image encryption techniques and its terminologies

A Oad, H Yadav, A Jain - International Journal of Engineering and …, 2014 - Citeseer
In today's environment, security becomes an important issue in communication. For secure
transmission of data in open network, encryption is very important methodology. Though …

[PDF][PDF] A survey report on Different Techniques of Image Encryption

A Srivastava - International Journal of Emerging Technology and …, 2012 - academia.edu
In the present world when whole web is now coming on from text data to multimedia data,
one of the major security concerns is the protection of this multimedia data. Image, which …

ElGamal algorithm for encryption of data transmission

Z Wu, D Su, G Ding - 2014 International Conference on …, 2014 - ieeexplore.ieee.org
With continuous development of network technology, more and more attacks on system from
Internet have become more automated and caused greater damage and loss. It is important …

A survey on symmetric and asymmetric key based image encryption

S Kumar, BK Singh, S Pundir, S Batra… - … conference on data …, 2020 - ieeexplore.ieee.org
Image Encryption is a technique where an algorithm along with a set of characters called
key encrypts the data into cipher text. The cipher text can be converted back into plaintext by …

[PDF][PDF] A review on DES, AES and blowfish for image encryption & decryption

A Devi, A Sharma, A Rangra - International Journal of Computer Science …, 2015 - Citeseer
Network Security is the most vital component in information security because it is
responsible for securing all information passed through networked computers.[1] In this …

[PDF][PDF] Cipher text containing data and key to be transmitted in network security

HM Lee, TY Lee, L Lin, JS Su - Proceeding of the 11Th WSEAS …, 2007 - academia.edu
In this paper, we propose an encryption algorithm to encrypt plaintext to cipher text. We
apply the basic computing operations, eg, inserting dummy symbols, rotating, transposition …

An ultra robust session key based image cryptography

HN Khan, A Chaudhuri, A Das, A Chaudhuri - Microsystem Technologies, 2020 - Springer
Increased use of internet demands substantial protection for secret image file from any
adversary, specifically during transmission. In the field of cryptography there are two role …

A Novel Approach to Digital Image Steganography of Key-Based Encrypted Text.

S Chakrabarti, S Debabrata - 2015 - lrc.acharyainstitutes.in
Encryption is the method by which we can encode the intended piece of information in such
a way that only the people whom we want to pass that information can understand its actual …

[引用][C] An image encryption & decryption and comparison with text-AES algorithm

DNS Rani, D Juliet, KR Devi - International Journal of Scientific & Technology …, 2019

[PDF][PDF] Secure communication across the internet by encrypting the data using cryptography and image steganography

P Rajesh, M Alam, M Tahernezhadi… - International …, 2020 - pdfs.semanticscholar.org
Sharing the information has become a facile task nowadays just like one-tap which can take
the information to any component of the world. This whole thing transpired over the evolution …