International Journal of Advance Computational Engineering and Networking (IJACEN)
.
Follow Us On :
current issues
Volume-12,Issue-1  ( Jan, 2024 )
Past issues
  1. Volume-11,Issue-12  ( Dec, 2023 )
  2. Volume-11,Issue-11  ( Nov, 2023 )
  3. Volume-11,Issue-10  ( Oct, 2023 )
  4. Volume-11,Issue-9  ( Sep, 2023 )
  5. Volume-11,Issue-8  ( Aug, 2023 )
  6. Volume-11,Issue-7  ( Jul, 2023 )
  7. Volume-11,Issue-6  ( Jun, 2023 )
  8. Volume-11,Issue-5  ( May, 2023 )
  9. Volume-11,Issue-4  ( Apr, 2023 )
  10. Volume-11,Issue-3  ( Mar, 2023 )

Statistics report
Apr. 2024
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 133
Paper Published : 1552
No. of Authors : 4025
  Journal Paper


Paper Title :
Advanced Encryption Techniques For Images

Author :Aditti Manegaonkar, Pallavi Pawar, Rohini Wagh, Riya Pagare

Article Citation :Aditti Manegaonkar ,Pallavi Pawar ,Rohini Wagh ,Riya Pagare , (2014 ) " Advanced Encryption Techniques For Images " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 07-09, Volume-2,Issue-3

Abstract : Abstract: Cryptography is one of the most widely used methods all over the world. Data is needed to be kept secret and that should not be disclosed anywhere. Hence to prevent our data, it is necessary to use some or the methods for doing so. There are many places and institutions where in the data is needed to be confidential. If the data is lost then there might be a tremendous loss. There are various ways in which the cryptography method can be implemented. Previous Encryption for Images included symmetric key combination. Advanced encryption for images is a cryptography technique which is based on bits rotation and reversal, extended hill cipher, modified Randomization. This can be used to encrypt any type of image. In addition to the technique, Visual Cryptography is added so as to make it highly secured. In this, mainly four things are going to be done.1) Image is accepted. 2) Generate the shares of the input image. 3) Combine the shares which we have generated and 4) Image verification. Encrypted image and original image is then compared with hash MD5 algorithm to check whether correct image is obtained or not.

Type : Research paper

Published : Volume-2,Issue-3


DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-514   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 44
| Published on 2014-03-21
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY