Recent Trends in Image Encryption: A Review
Abstract
Full Text:
PDFReferences
Abraham L. & Daniel N. (2013). An Improved Color Image Encryption Algorithm with Pixel Permutation and Bit Substitution. International Journal of Research in Engineering Technology (IJRET) Vol. 2, Issue 11. eISSN 2319-1163.pp.333-338.
Brindha K., Sharma R. & Saini S. (2014). Use of Symmetric Algorithm for Image Encryption. International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE) Vol. 2, Issue 5. pp.4401-4407.
Debbarma M., Kumari L. & Rajiha J. L. (2013). 2D chaos Based Color Image Encryption Using Pseudorandom Key Generation. International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Vol. 2, Issue 4. pp.387-392.
El-Khamy S. E., Lofty M. & Ali A. H. (2012). A New Fuzzy PN Codes Based Image Encryption Technique. Electrical & Electronics Department, Faculty of Engineering, Alexandria University. Alexandria 21544, Egypt.
Harram I. M., Bakura M. U. M. & Gwoma Z. M. (2014). Simulation of AES Based Data Encryption in Vb.net. International Journal of Recent Developments in Engineering & Technology (IJRDET) Vol. 2, Issue 4. pp.5-9.
Kester Q. A Cryptographic Image Encryption Technique for Facial Blurring of Images. International Journal of Advanced Technology and Engineering Research (IJATER) Vol. 3, Issue 3. pp. 1-7.
Naskar P. K. & Chaudhuri A. (2014). A Secure Symmetric Image Encryption Based on Bit-Wise Operation. International Journal of Images, Graphics and signal Processing (IJIGSP) No. 2, pp. 30-38.
Nichat S. P. & Sikchi S. S. (2013). Image Encryption Using Hybrid Genetic Algorithm. International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) Vol. 3, Issue 1. pp.428-431.
Pakshwar R., Tridevi V. K. & Richhariya V. (2013). A Survey on Different Image Encryption and Decryption Techniques. International Journal of Computer Science and Information Technologies (IJCSIT) Vol. 4, Issue 1. pp.113-116.
Panduranga H. T., Kumar S. K. N. & Kumar H. S. S. (2013). Hardware Software Co-Simulation of the Multiple Image Encryption Technique Using the Xilinx System Generator. International Journal of Information Process System (IJIPS) Vol. 9, No. 3. pp.499-510.
Sethi N. & Vijay S. (2013). Comparative Image Encryption Methods Analysis Using New Transformed-Mapped technique. Conference on Advances in Communication and Control system (CACCS). Dehrandum Institute of Technology, Dehrandum-248001
Sharma V., Agnihotri H. C. & Patil C. H. (2014). An Image Encryption and Decryption technique Using Two Chaotic Schemes. International Journal of Research in Advent Technology (IJRAT) Vol. 2, No. . pp.313-316.
Singh P. & Singh K. (2013). Image Encryption and Decryption Using Blowfish Algorithm in MATLAB. International Journal of Scientific and Engineering Research (IJSER) Vol. 1, Issue 7. pp.150-154.
Sridevi S. S. P., KarthigaiKumar, P. Siva Mangai, N.M. and Vanathi, P.T. (2012). Survey on Efficient, Low-power, AES Image Encryption and Bio-cryptography Schemes. Smart Computing Review, vol. 2, no. 6. pp. 379-390.
Refbacks
- There are currently no refbacks.
Copyright (c) 2016 Journal of Information Sciences and Computing Technologies
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Copyright © 2014 Journal of Information Sciences and Computing Technologies. All rights reserved.
ISSN: 2394-9066
For any help/support contact us at jiscteditor@scitecresearch.com.