TAILIEUCHUNG - A survey on security of permutation for only image encryption schemes

This paper discusses the survey on the encryption techniques with the permutation and also briefly discusses the encryption for image and studies carried on the only image encryption (OIE) schemes. The paper provides the future study requirement for the secure image transmission. | ISSN:2249-5789 Aparna N et al, International Journal of Computer Science & Communication Networks,Vol 6(2),49-53 A Survey on Security of Permutation for only Image Encryption Schemes Aparna N Mrs. Kavyashree M. Tech Student, Dept. of CSE, RGIT, Bangalore, India Asst Prof.: Dept. of Computer Science and Engg RGIT, Bangalore, India Abstract— The improved technology has provided a facility for multimedia transmission (like images, data, videos) over the open internet network but there are more chances of insecurity in this process, thus there is need of secure mode of transmission. Although, there are many methods has been presented for the secure image transmission like encryption, which helps in protection against unauthorized access. But some Encryption algorithms are only can be used for text data not for image data; hence, permutations are used in multimedia encryption algorithms to provide enhanced secure image transmission. This paper discusses the survey on the encryption techniques with the permutation and also briefly discusses the encryption for image and studies carried on the only image encryption (OIE) schemes. The paper provides the future study requirement for the secure image transmission. Keywords: Cryptanalysis, Image Encryption, Plain attack, Permutation. I. INTRODUCTION The growing technology in the field of mobile and their applications in multimedia is facing many issues over the internet. The multimedia data sharing in military, government, hospitals, business sectors, etc., are facing security issues for their confidential data like image, video, etc. [1]. Nowadays these data are collecting and storing in an electronic device, and then it can be transmitted to another device. During this process, the protection of confidential images like patients scanning reports, geographical records, military data may get hacked, and it may lead to loss of data; hence, the protection of these things is must [2]. Image security in .

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.