Image Encryption Using Modified Particle Swarm Optimization
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 2
Abstract
In this age of universal electronic connectivity, there is indeed no time at which security does not matter. Two trends have enough to make this work as vital need. First, the explosive growth in computer systems and their interconnections via networks has increased the dependence of either a country or an organization or an individual on the information stored and communicated using these systems. Second, the disciplines of cryptography and network security has matured, leading to the development of more and more methods of encryption to enforce network security. Encryption is used to securely transmit data in open networks. Each type of data has its own features; therefore different techniques should be used to protect confidential image data from unauthorized access. Most of the available encryption algorithms are mainly used for textual data and may not be suitable for data and may not be suitable for multimedia data such as images. Image encryption has seen many forms of upgrade by the introduction of new techniques. Many complicated algorithms have designed in the view to bring down the correlation, between the image pixels, which is the measure of encryption quality in case of image. Our work focuses in creating the new encryption system, which is a combination of simple encryption techniques, gray scale transformation technique followed by shuffling of pixel positions based on a key generated from modified PSO algorithm. The results showed that the correlation between image elements was significantly decreased by using the proposed technique, resulted in a lower correlation.
Authors and Affiliations
Sabarinath R, Jegadeesan S, Venkatalakshmi K
Capabilities and Limitations of Path Gain Adjustment in Harmonic Rejection Mixers
Harmonic rejection ratios (HRR) of harmonic rejection mixers (HRM) are limited because of gain and phase inaccuracies. Gain and phase calibration can be employed to enhance HRRs. This paper deals in a systematic way...
Decentralized Probabilistic Text Clustering by using Distributed Hierarchical peer to peer Clustering
Document clustering (or text clustering) is the application of cluster analysis to textual documents. It has applications in automatic document organization, topic extraction and fast information retrieval or filteri...
ACHIEVING ZERO FALSE POSITIVE AND FALSE NEGATIVE RATES IN AN ATTACK-PATH RECONSTRUCTION
The security and privacy are two essential components for the system security of the Computer Networks. Data security means the data is securely stored , transferred and traced IP.Data privacy means the data can only...
Make Safe Data Promulgate In Multi Cloud Storage
The cloud computing technique provide a high range of service the society over the INTERNET. The unique features of clouding computing is that users data are processes remotely users does not own the machine or opera...
Energy Efficient Full-adder using GDI Technique
A full-adder is one of the essential component in digital circuit design, many improvements have been made to reduce the architecture of a fulladder. The proposed method aims on GDI(Gate Diffusion Input).GDI is a nov...