Different Text to Image Encryption Techniques: A Survey
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 6
Abstract
his paper focuses mainly on the different kinds of text to image encryption and decryption techniques. With the progress in data exchange by electronic system, the need of information security has become a necessity. Due to growth of multimedia application, security becomes an important issue of communication and storage of images. There are various techniques which are discovered from time to time to encrypt the text and to make text more secure. In this paper a Survey of different Encryption Techniques that are existing is given. It additionally focuses on the functionality of new technique to encrypt the text by using various algorithms and converted to Image.
Authors and Affiliations
Varsha Tyagi, Ravindra Chauhan
Enhanced Security Modal to Detection and Prevention of Web Crime Actvities
The current generations increasingly rely on the internet and advanced technologies to further their criminal operations. These criminals can easily leverage the internet and carry out the traditional crime such as disr...
A Literature Review on Implementing Security in Cloud Environment
In modern computing, Cloud computing is an important part of any small or large organization. Today cloud computing can be considered as a service, similar to the way that electricity is considered a service in urban ar...
Parametric Effects and Optimization of Machining Parameters in Hard Turning: A Literature Review
In today’s rapidly changing state in metal cutting industries, applications of optimization techniques in hard turning processes is essential for a manufacturing unit to replace grinding/finishing operations due to the...
slugPerformance Analysis of MANET with Reactive and Proactive Routing Protocols and Mobility Models
Mobile Ad hoc Network is a collection of wireless mobile nodes dynamically forming a temporary network without the aid of any established infrastructure or centralized administration. Routing protocols in mobile ad hoc...
Implementing user-defined Integrity Constraint in MYSQL
The methods with which we can maintain correctness of any specific table in data base management system are Integrity constraints. The general idea of this paper is to investigate and observe user-defined integrity cons...