2016
DOI: 10.5121/ijcsit.2016.8509
|View full text |Cite
|
Sign up to set email alerts
|

A Comparison Between Parallel and Segmentation Methods Used for Image Encryption-Decryption

Abstract: Preserving confidentiality, integrity and authenticity of images is becoming very important. There are so many different encryption techniques to protect images from unauthorized access. Matrix multiplication can be successfully used to encrypt-decrypt digital images. In this paper we made a comparison study between two image encryption techniques based on matrix multiplication namely, segmentation and parallel methods.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
17
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(17 citation statements)
references
References 8 publications
0
17
0
Order By: Relevance
“…A method of data cryptography is considered a good method if it satisfies the following:  Simplicity: Easy to program and implement and easy to modify.  Efficiency: Maximizing the method throughput (byte processed per second), this can be achieved by minimizing the encryption time (ET) and decryption time (DT) [31][32][33][34].…”
Section: Figure-7 Data Cryptography Processmentioning
confidence: 99%
See 1 more Smart Citation
“…A method of data cryptography is considered a good method if it satisfies the following:  Simplicity: Easy to program and implement and easy to modify.  Efficiency: Maximizing the method throughput (byte processed per second), this can be achieved by minimizing the encryption time (ET) and decryption time (DT) [31][32][33][34].…”
Section: Figure-7 Data Cryptography Processmentioning
confidence: 99%
“…One of the reliable methods of secret message protection is data cryptography. Data cryptography (as shown in Figure -7) means encrypting the source data before sending while decrypting the encrypted data after receiving [29][30][31][32][33].…”
mentioning
confidence: 99%
“…✓ The suggested method must be effective by reducing encryption decryption times and increasing method throughput. (bytes manipulated in second) [29][30][31]. ✓ The suggested method should be easy to implement.…”
Section: Figure 1 Encryption-decryption Processmentioning
confidence: 99%
“…And due to these reasons and due to the importance of digital images, the number of people lurking in them has increased, which requires us to provide the necessary protection for them, especially if the communication environment is not safe. The protection must prevent the image from being hacked [43][44][45][46][47][48][49][50].…”
Section: Introductionmentioning
confidence: 99%