A New Approach For Image Cryptography Techniques
Journal Title: International Journal of Computer & organization Trends(IJCOT) - Year 2013, Vol 3, Issue 9
Abstract
With the progress in data exchange by electronic system, the need of information security has become a necessity. Due to growth of multimedia applications, security becomes an important issue of communication and storage of images Encryption and Decryption is used to securely transmit data in open networks. Each type of data has its own features; therefore different techniques should be used to protect confidential image data from unauthorized access. The principle goal of designing any encryption and decryption algorithm is to hide the original message and send the non readable text message to the receiver so that secret message communication can take place over the web. The strength of an algorithm depends on the difficulty of cracking the original message. In kind of algorithm. a combination of four S–boxes lookups, multiplications as well as fixed and data dependant rotations will be used. In this paper we would be obtaining our results by simulating the image processing by Encryption and Decryption part in MATLAB.
Authors and Affiliations
Harpreet Singh , Dr. Naveen Dhillon , Sukhpreet Singh Bains
Touchless Written English Characters Recognition using Neural Network
Touchless written English character recognizer (TER), a new touchless approach to write and an intelligent approach to recognize English characters has been proposed in this paper. In TER, the inputs of English cha...
A Survey of Emerging ITU-TH.264 Video Encoding Standard
H.264/AVC is a recently completed video compression standard jointly developed by ITU-T and ISO MPEG standards committees. The standard is becoming more popular as it promises much higher compression than that possible w...
Pattern Recognition for Finding Similarity of Webpages
We proposed a functional technique for identifying similar Web pages that is based on measuring tree similarity. In this paper we introduce an experiment with two methods for evaluating the similarity of web pages. The r...
Power Efficient Weighted Modulo 2n+1 Adder
The comparison of three different architectures for modulo 2n+1 adders are introduced in this paper. The first two architecture can be implemented different power consumptions, while maintain the same delay. The partitio...
Energy Efficiency QoS Assurance Routing in Wireless Multimedia Content Deliver Network
The problem of low penetration of multicast and QoS enabling mechanisms in IP networks, overlay network techniques are used that avoid undue duplication of Multimedia streaming flows while transcoding or scalable encodin...