Analysis and Implementation of Selective Image Encryption Technique Using Matlab
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract: Encryption plays a very significant role in secure transmission of digital images from one place to another. There are a number of encryption algorithms available which perform the task of encryption. However some algorithms are fully layered which perform the encryption of the whole content of the images. But sometimes there is a requirement of partial image encryption so that there is reduced execution time and hence increases in performance. This type of partial image encryption can be achieved through Selective image encryption technique. This paper aims to propose an analysis and implementation of Selective image encryption technique using Matlab.
Authors and Affiliations
Upendra Bisht, , Shubhashish Goswami
Securing Medical Text Data using Cuckoo Search based Advanced Encryption Standard (AES)
The internet plays vital role in the current digital era. The growth of the internet makes more advancement in all the fields including virtual medical treatment, online medical prescription and even online medical suppl...
Conjunctive Use of Surface and Groundwater as Agri-tourismResource Facilitator: Discourse Analysis for Planning inDeveloping Nations
Abstract: Ecotourism is increasingly exhibited as a component of the conventional tourism that needsaugmentation with enhanced availability of water resources in sustainable modes. This sustainability isattainable...
The Prospects & Problems Of Information Technology In The Banking Industry In Nigeria
Abstract: This study looks into prospects and issues of data technology within the Nigeria banking industry. Data technology has been acknowledged as a life wire of banks within the monetary sector because it promo...
Improving Data Storage Security in Cloud Computing UsingElliptic Curve Cryptography
Abstract: Companies tends towards more availability, less cost, managed risk, agility- all of which areproviding by cloud computing. The cloud computing is a way to deliver IT services on demand and pay perusage, and it...
Threats and Security using Trust Techniques in Wireless Sensor Networks
Abstract: Wireless Sensor Networks are implementing on large scale in real time environments due to its incredible uses in real life. Wireless Sensor Networks don’t need human interference for its working so theycan plac...