National Conference on Challenges in Research &Amp; Technology in the Coming Decades (CRT 2013) 2013
DOI: 10.1049/cp.2013.2500
|View full text |Cite
|
Sign up to set email alerts
|

A Fast and Secure Image Hiding Scheme Based on Partial Encryption Technique

Abstract: Encryption is the primary solution to provide security to the data, which is travelling on a communication link between any pair of nodes, but Partial encryption is a technique to save computational power, overhead, speed, time and to provide quick security by only encrypting a selected portion of a bit stream. Securing the visual and multimedia data like images requires specific design consideration for use in different applications. The focus of this paper is on selecting the important part of the image that… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…So this technique is not an appropriate method for real-time image encryption (Patel and Patel, 2015). This cryptosystem used as many applications like mobile phone services, wireless networking as well as homeland security issues which require more power for the encryption of a large set of data/information (Parameshachari et al, 2013). Furthermore, it is clearly visible to the user that means others can view the encoded message/data, but the data owner (transmitter) not like to share the data in a readable format by unauthorised viewers.…”
Section: Need For the Studymentioning
confidence: 99%
“…So this technique is not an appropriate method for real-time image encryption (Patel and Patel, 2015). This cryptosystem used as many applications like mobile phone services, wireless networking as well as homeland security issues which require more power for the encryption of a large set of data/information (Parameshachari et al, 2013). Furthermore, it is clearly visible to the user that means others can view the encoded message/data, but the data owner (transmitter) not like to share the data in a readable format by unauthorised viewers.…”
Section: Need For the Studymentioning
confidence: 99%
“…So this technique is not an appropriate method for real-time image encryption (Patel and Patel, 2015). This cryptosystem used as many applications like mobile phone services, wireless networking as well as homeland security issues which require more power for the encryption of a large set of data/information (Parameshachari et al, 2013). Furthermore, it is clearly visible to the user that means others can view the encoded message/data, but the data owner (transmitter) not like to share the data in a readable format by unauthorised viewers.…”
Section: Need For the Studymentioning
confidence: 99%