A New Approach For Image Cryptography Techniques
Journal Title: International Journal of Computer & organization Trends(IJCOT) - Year 2013, Vol 3, Issue 9
Abstract
With the progress in data exchange by electronic system, the need of information security has become a necessity. Due to growth of multimedia applications, security becomes an important issue of communication and storage of images Encryption and Decryption is used to securely transmit data in open networks. Each type of data has its own features; therefore different techniques should be used to protect confidential image data from unauthorized access. The principle goal of designing any encryption and decryption algorithm is to hide the original message and send the non readable text message to the receiver so that secret message communication can take place over the web. The strength of an algorithm depends on the difficulty of cracking the original message. In kind of algorithm. a combination of four S–boxes lookups, multiplications as well as fixed and data dependant rotations will be used. In this paper we would be obtaining our results by simulating the image processing by Encryption and Decryption part in MATLAB.
Authors and Affiliations
Harpreet Singh , Dr. Naveen Dhillon , Sukhpreet Singh Bains
HASBE: A Hierarchical Attribute Set Based Encryption For Flexible, Scalable And Fine Grained Access Control In Cloud Computing
At present cloud computing is going to be very famous technology in IT enterprises. For a company, the data stored is huge and it is very precious. All functions are performed through networks. Thus, it becomes very impo...
Touchless Written English Characters Recognition using Neural Network
Touchless written English character recognizer (TER), a new touchless approach to write and an intelligent approach to recognize English characters has been proposed in this paper. In TER, the inputs of English cha...
Security Issues and Data Management In Cloud Computing
Cloud computing placed IT to higher and new limits by providing the market environment data storage and capacity with flexible and scalable and processing power to reach the demand and supply while reducing the capital e...
SE code optimization using Data Mining Approach
Data mining also holds promises for other software engineering processes, which have to deal with uncertainty and intangible data such as cost estimation, effort estimation and quality. It can also aid in interesti...
Cataloguing and Avoiding the Buffer Overflow Attacks in Network Operating Systems
The application software has a different dimension, size and intricacies is rising rapidly in current technology era and simultaneously increase a programming bugs also. The programming bugs cause vulnerabilities to the...