Citation to this article as recorded by
Praveenkumar, P., G.U. Priyanga, K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2015. Chain of shuffling and chaos: A tied encryptic approach. Asian J. Scient. Res., 8: 359-366. CrossRefDirect Link |
Praveenkumar, P., P. Rajalakshmi, K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2016. Horse DNA runs on image: A novel road to image encryption. Res. J. Inform. Technol., 8: 1-9. CrossRefDirect Link |
Praveenkumar, P., R. Nisha, K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2016. Image merger encryptor: A chaotic and chebyshev key approach. Res. J. Inform. Technol., 8: 10-16. CrossRefDirect Link |
Citation to this article as recorded by
Two-Round Symmetric Cryptography for Medical Image Infosecurity Against-Hacker Attacks in a Picture Archiving and Communication System IEEE Access |
How to cite this article
Narasimhan Aarthie and Rengarajan Amirtharajan, 2014. Image Encryption: An Information Security Perceptive. Journal of Artificial Intelligence, 7: 123-135.
DOI: 10.3923/jai.2014.123.135
URL: https://scialert.net/abstract/?doi=jai.2014.123.135
DOI: 10.3923/jai.2014.123.135
URL: https://scialert.net/abstract/?doi=jai.2014.123.135