Different Text to Image Encryption Techniques: A Survey

Abstract

his paper focuses mainly on the different kinds of text to image encryption and decryption techniques. With the progress in data exchange by electronic system, the need of information security has become a necessity. Due to growth of multimedia application, security becomes an important issue of communication and storage of images. There are various techniques which are discovered from time to time to encrypt the text and to make text more secure. In this paper a Survey of different Encryption Techniques that are existing is given. It additionally focuses on the functionality of new technique to encrypt the text by using various algorithms and converted to Image.

Authors and Affiliations

Varsha Tyagi, Ravindra Chauhan

Keywords

Related Articles

Intrusion Detection System by using K-Means Clustering, C 4.5, FNN, SVM Classifier

Security of Information is one of the keystones of Information Society. Past few year, many attacks are increased, intrusion detection system(IDS) is important component and to protect the network. In present-days, many...

Fuzzy Based Motion Planning of Mobile Robot

In this paper, We have developed fuzzy rules for Dynamic Motion Planning of Mobile Robots. Motion planning becomes more complex when the configuration and position of obstacle are not known priori for such system Soft C...

Unpropitious Effect of Bisphenol-A and Its Impact on Human Health

Bisphenol A (BPA) is a chemical used in the lining of some food and beverage packaging to protect food from contamination and extend shelf life. It’s also used in non-food products. It has been found that BPA has the po...

slugSURVEY ON VARIOUS IMAGE CONTRAST ENHANCEMENT TECHNIQUES

In this paper a survey on various image contrast enhancement techniques has been done. Colour image enhancement plays an important role in digital image processing. Contrast enhancement is an optimization problem and is...

Experimental Investigation of Windmill to Generate AC Power using Magnetic Levitation

Electrical power has become a prime necessity for any country for economic development. Due to exhaustion of conventional power generation methods and its adverse effects on the environment, the focus on renewable energ...

Download PDF file
  • EP ID EP22254
  • DOI -
  • Views 209
  • Downloads 4

How To Cite

Varsha Tyagi, Ravindra Chauhan (2016). Different Text to Image Encryption Techniques: A Survey. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 4(6), -. https://europub.co.uk/articles/-A-22254