Image Encryption and Decryption Using Selective Block Encryption Technique
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 9
Abstract
In the recent world, the need of information security has became a necessity with the progress in data exchange and communication by electronic system. Because of the growth of multimedia application, security becomes an important issue of communication, storage and transmission of data. Cryptography is an art which is defined as the science of writing in secret code. The cryptography algorithms are categorized into Symmetric Key Cryptography and Asymmetric Key Cryptography algorithms. Encryption is one of the best alternative way to ensure security. Moreover, there are various image encryption techniques have proposed, each algorithm has its own strength and weakness. The prime goal leading the design of an encryption algorithm must provide security against unauthorized attack. In this paper, a selective block encryption technique is proposed to achieve the different goals of security i.e., Availability, Confidentiality and Integrity. This new technique is based on the symmetric key encryption approach.
Authors and Affiliations
Megha Seth , Kaminee Salam
Reduce Energy Consumption in WSN Using Nature Stimulated Technique
Wireless sensor networks, sometimes called wireless sensor and actuator networks. Wireless Sensor Network comprise of the nodes operated by the batteries. These nodes are generally deployed in human inaccessible areas to...
Performance Analysis of DCT Based Digital Image Watermarking Using Color Spaces Effects
Digital watermarking is the field of digital image processing which deals with hiding information in a digital content. In this paper, performance analysis of DCT (Discrete Cosine Transform) based digital image watermark...
Robust Face Recognition Using Artificial Neural Network
Face recognition is done naturally by humans. However, developing a computer algorithm to do the same thing is difficult. Assume for the moment we start with images, and we want to distinguish between images of different...
Review on Coverage and Connectivity in Underwater Wireless Sensor Networks
One of the current trends of the wireless communication is the underwater communication .The two most fundamental problems in underwater sensor network are sensing coverage and network connectivity. The coverage problem...
Remote Based Security System
Background Subtraction is one of the vital image handling steps for video surveillance and many computer vision difficulties such as recognition, classification, activity investigation &tracking. Detection of moving...