A new scan pattern method for color image encryption based on 3D-Lorenzo chaotic map method

LM Jawad - Multimedia Tools and Applications, 2021 - Springer
Securing the exchange of digital images in the form of huge multimedia data over the
internet with limited bandwidth emerges as a significant and sensitive issue. In this paper, a …

An image of encryption algorithm using graph theory and speech signal key generation

IQ Abduljaleel, SA Abdul-Ghani… - Journal of Physics …, 2021 - iopscience.iop.org
In this paper, a color image of encryption algorithm used a graph theory has been proposed.
The proposed algorithm depends on the audio files as a basis for exploiting a set of keys for …

Image encryption based on cell shuffling and scanning techniques

CP Singar, J Bharti, RK Pateriya - … International Conference on …, 2017 - ieeexplore.ieee.org
In current time, multimedia technologies are created altogether. Information containing
sound, video and images exchanges over the web is open and not secure. Security is …

[PDF][PDF] Cryptosystems in Asymmetric Cryptography for Securing Data at various Level

S Singh, A Sharma - Delving, 2020 - delving.in
With upcoming threats in digital world, we need to work continuously in the area of security
in all aspects form hardware to software as well in data modeling. Rise in social media …

An effective approach towards encryption of limited data

R Kawatra, SA Saini - IITM Journal of Management and IT, 2016 - indianjournals.com
Processed information from a network is very difficult to maintain. As the data travels from
one point to another, there are different threats/obstacles through which a programmed data …

[PDF][PDF] A Survey on Various Encoding, Encryption and compression Techniques

A Devi, K Mani - International Journal of Advanced Research in …, 2018 - academia.edu
This paper reports about the survey of various techniques available in an encryption and
also in compression technique. It is mainly analyzing the existing encoding and compressed …

A Study of Various Security Threatsin RSA

S Singh, A Sharma, S Kaur - Think India Journal, 2019 - thinkindiaquarterly.org
Data Security has been concern for all stakeholders no matters the customer types,
organisations. Securing data in rest in cloud or somewhere else and even during the …

[PDF][PDF] Comparative Analysis of RSA and DES Algorithms

MKG Kharade, MSK Kharade - academia.edu
Email is most widely used medium for communication. Email provides us facility of sharing
data between different peoples. The data which is shared between the peoples can be very …

[PDF][PDF] Survey on Different Image Encryption TechniquesWith Tabular Form

P Hardiya, R Gupta - academia.edu
Rapid growth of digital communication and multimedia application increases the need of
security and it becomes an important issue of communication and storage of multimedia …

[PDF][PDF] Image Encryption and Decryption Using Selective Block Encryption Technique

K Salam - ijcset.com
In the recent world, the need of information security has became a necessity with the
progress in data exchange and communication by electronic system. Because of the growth …