A 3D Chaotic and Separable Reversible Data Hiding Hybrid Encryption Technique for Enhancing Security in Image Data Transmission
DOI:
https://doi.org/10.53555/cse.v3i11.153Keywords:
Cryptography, Encryption, Image Encryption,, Key Space.Abstract
Due to the quick development of advanced correspondence and interactive media application, security turns into an critical issue of correspondence and capacity of pictures. Encryption is one of the approaches to guarantee high security pictures are utilized as a part of many fields, for example, therapeutic science, and military. Modern cryptography gives fundamental methods for securing data and ensuring mixed media information. As of late, encryption innovation has been created rapidly and many picture encryption techniques have been utilized to ensure secret picture information from unapproved access .In this paper overview of various picture encryption systems have been talked about from which analysts can get a thought for proficient strategies to be utilized.
Downloads
References
C.S Lamba, “Design and Analysis of Stream Cipher for Network Security”, Second International Conference onCommunication Software and Networks, 2010.
Rafael C. Gonzalez, “Digital Image Processing”,2009.
Yonglin Ren, Azzedine Boukerche ,Lynda Mokdad, “Performance Analysis of a Selective Encryption Algorithm for Wireless Ad hoc Networks”, IEEE WCNC 2011-Network.
S.Kala, “Enhanced Selective Encryption Algorithm for Wireless Ad Hoc Networks”, International Journal of Computing Technology and Information Security Vol.1, No.2, pp.48-51, December, 2011.
Patil Ganesh G & Madhumita A Chatterjee, “Selective Encryption Algorithm for Wireless Ad-hoc Networks”.
Pramod Kumar, Pushpendra Kumar Pateriya, “RC4 Enrichment Algorithm Approach for Selective Image Encryption”, International Journal of Computer Science & Communication Networks,Vol 2(2), Pages: 181-189 .
Hameed A. Younis*, Dr. Turki Y. Abdalla**, Dr. Abdulkareem Y. Abdalla*, “A Modified Technique for Image Encryption”.
C T Bhunia, Gourchari Mondal and S Samaddar, “Theory and application of time variant key in RSA and that with selective encryption in AES,” 2006.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2017 gnpublication@
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
In consideration of the journal, Green Publication taking action in reviewing and editing our manuscript, the authors undersigned hereby transfer, assign, or otherwise convey all copyright ownership to the Editorial Office of the Green Publication in the event that such work is published in the journal. Such conveyance covers any product that may derive from the published journal, whether print or electronic. Green Publication shall have the right to register copyright to the Article in its name as claimant, whether separately
or as part of the journal issue or other medium in which the Article is included.
By signing this Agreement, the author(s), and in the case of a Work Made For Hire, the employer, jointly and severally represent and warrant that the Article is original with the author(s) and does not infringe any copyright or violate any other right of any third parties, and that the Article has not been published elsewhere, and is not being considered for publication elsewhere in any form, except as provided herein. Each author’s signature should appear below. The signing author(s) (and, in