A Survey on Key(s) and Keyless Image Encryption Techniques

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Survey on Existing Image Encryption Techniques

In today’s technical World people always concern with security of data before sending it over the internet. Security of data provides protection to data from unauthorized access. There is large no. of algorithms are available to secure the data. Cryptography plays a key role in data security. In modern cryptographic system encryption techniques are most widely in use. It provides security to da...

متن کامل

A survey report on Different Techniques of Image Encryption

In the present world when whole web is now coming on from text data to multimedia data, one of the major security concerns is the protection of this multimedia data. Image, which covers the highest percentage of the multimedia data, its protection is very important. This can be achieved by Image encryption. There are so many different techniques should be used to protect confidential image data...

متن کامل

A Survey on Certificateless Encryption Techniques

Certificateless public key encryption is an advanced version of identity-based and public key encryption techniques. It eliminates the inherent key escrow and other key management issues in both techniques, e.g., it does not need any public key infrastructure or digital certificates. This paper presents a survey of the certificateless public key encryption schemes that have been proposed to imp...

متن کامل

Survey on Image Encryption, Data Hiding and Secret Fragment Visible Mosaic Image Creation Techniques

So many skillful techniques are present for protection of confidential images from unauthorized access. Visual cryptography and data hiding are mainly used methods for secure transmission. But main problem of this method is that, during recovering stage exact image that send will not be retrieved. Small amount of distortion may occur. Some areas like medicine, military fields; small distortion ...

متن کامل

Chaotic Image Encryption Techniques

The development of the Space Science and Technology has recently attracted a growing interest from researchers and industrial communities, mainly because of large number of possible applications capable to exploit remotely sensed data and satellite images. Advances in space science, data analysis, and communication technologies present new opportunities for users to increase productivity, reduc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Cybernetics and Information Technologies

سال: 2017

ISSN: 1314-4081

DOI: 10.1515/cait-2017-0046