The main purpose of this work is the management of security. This will allow users authorization and integrity, accuracy and images security circulating on the Internet. Addition to that, more effort is required for an image-based data in the process of encrypting and decrypting the image. Proposed Architecture facilities for encrypting and decrypting an image using the suitable key and is designed to work for the same purpose. In this article we present a strategy for the new permutations based on a combination of different blocks of pixels and the symmetric encryption algorithm newly developed called "Image Symmetric Encryption Based on Block Displacement". The different blocks of the selected image is formed to change the layou...
Abstract-Internet has become part and parcel in today’s scenario. Internet is a public network and i...
With the fast progression of data exchange in an electronic way, information security is becoming mo...
This paper presents a simple but secure novel reversible scheme for hiding a whole encrypted image i...
This paper titled “A New Algorithm for Image Encryption Based on Slicing, Displacement Followed by S...
Along with the rapid increasing growth of computer and network technologies, images are being transm...
Abstract — This paper shows a symmetric image encryption based on bit-wise operation (XORing and Shi...
The rapid development of communication technology due to the global spread of the internet and the d...
Abstract—Primary concern of the proposed concept is not to provide security in perfect way. Rather, ...
Encryption is used to securely transmit data inopen networks. It can also be defined as the process ...
AbstractIn this paper, an encryption algorithm for images using a secret key of 128-bits is proposed...
Images occupy the most important position in multimedia data. Techniques for transmitting and storin...
In the digital era, most types of transmitted data over the Internet are images. These ima...
This paper proposes a new two-dimensional map. It can encrypt images by processing image stretch-and...
In this paper, a new image encryption scheme using a secret key of 144-bits is proposed. In the subs...
Abstract- Encryption is used to prevent data from unauthorized access and with the appalling headway...
Abstract-Internet has become part and parcel in today’s scenario. Internet is a public network and i...
With the fast progression of data exchange in an electronic way, information security is becoming mo...
This paper presents a simple but secure novel reversible scheme for hiding a whole encrypted image i...
This paper titled “A New Algorithm for Image Encryption Based on Slicing, Displacement Followed by S...
Along with the rapid increasing growth of computer and network technologies, images are being transm...
Abstract — This paper shows a symmetric image encryption based on bit-wise operation (XORing and Shi...
The rapid development of communication technology due to the global spread of the internet and the d...
Abstract—Primary concern of the proposed concept is not to provide security in perfect way. Rather, ...
Encryption is used to securely transmit data inopen networks. It can also be defined as the process ...
AbstractIn this paper, an encryption algorithm for images using a secret key of 128-bits is proposed...
Images occupy the most important position in multimedia data. Techniques for transmitting and storin...
In the digital era, most types of transmitted data over the Internet are images. These ima...
This paper proposes a new two-dimensional map. It can encrypt images by processing image stretch-and...
In this paper, a new image encryption scheme using a secret key of 144-bits is proposed. In the subs...
Abstract- Encryption is used to prevent data from unauthorized access and with the appalling headway...
Abstract-Internet has become part and parcel in today’s scenario. Internet is a public network and i...
With the fast progression of data exchange in an electronic way, information security is becoming mo...
This paper presents a simple but secure novel reversible scheme for hiding a whole encrypted image i...