Subscribe Now Subscribe Today
Science Alert
 
FOLLOW US:     Facebook     Twitter
Blue
   
Curve Top
Journal of Artificial Intelligence
  Year: 2014 | Volume: 7 | Issue: 3 | Page No.: 123-135
DOI: 10.3923/jai.2014.123.135
Image Encryption: An Information Security Perceptive
Narasimhan Aarthie and Rengarajan Amirtharajan

Abstract:
Information security purported, yet another retrospected technique for secret sharing, highlighted by image encryption. Encryption of images is proven a successful method to communicate confidential information for which countless procedures are unearthed. Still, it continues attracting researchers as usage of images in every means of digital communication has phenomenally increased. Cryptography embraces various encryption methods and offers four chief modes where each one has found its place in many journals. This study takes cryptographic Cipher Block Chaining (CBC) mode as the fundamental footing which is manipulated in a unique fashion to achieve the goal. This script is coalescing of both Steganography and Cryptography thus ensuring enhanced security. Tentative results testify the routine and thus making it more upright of previously existing image encryption techniques.
PDF Fulltext XML References Citation Report Citation
 RELATED ARTICLES:
  •    Horse DNA Runs on Image: A Novel Road to Image Encryption
  •    Image Merger Encryptor: A Chaotic and Chebyshev Key Approach
  •    Chain of Shuffling and Chaos: A Tied Encryptic Approach
  •    Brownian Motion of Binary and Gray-Binary and Gray Bits in Image for Stego
  •    Pixel Authorized by Pixel to Trace with SFC on Image to Sabotage Data Mugger: A Comparative Study on PI Stego
  •    Steganography-Time to Time: A Review
  •    High Capacity Triple Plane Embedding: A Colour Stego
How to cite this article:

Narasimhan Aarthie and Rengarajan Amirtharajan, 2014. Image Encryption: An Information Security Perceptive. Journal of Artificial Intelligence, 7: 123-135.

DOI: 10.3923/jai.2014.123.135

URL: https://scialert.net/abstract/?doi=jai.2014.123.135

 
COMMENT ON THIS PAPER
 
 
 

 

 
 
 
 
 
 
 
 
 

 
 
 
 
 
 

       

       

Curve Bottom