2016 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC) 2016
DOI: 10.1109/iccic.2016.7919607
|View full text |Cite
|
Sign up to set email alerts
|

Encryption of images using XOR Cipher

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 4 publications
0
4
0
Order By: Relevance
“…In addition to being one of the fastest ciphers, the XOR Cipher is also used in many encryption standards like AES. Wireless communications are encrypted using XOR Cipher, which is more efficient than many chaotic encryptions because the system for creating entropy isn't very efficient [10].…”
Section: Xormentioning
confidence: 99%
“…In addition to being one of the fastest ciphers, the XOR Cipher is also used in many encryption standards like AES. Wireless communications are encrypted using XOR Cipher, which is more efficient than many chaotic encryptions because the system for creating entropy isn't very efficient [10].…”
Section: Xormentioning
confidence: 99%
“…After step 1, we get the plaintext sequence PS = [1,2,3,4,5,6,7,8,9]. The process of generating scrambling index vector I is shown in Fig.…”
Section: B Pixel Scramblingmentioning
confidence: 99%
“…Digital image encryption plays an important role in user information security and network image transmission [1]. In recent years, many new encryption schemes for images have been proposed, including the techniques of Deoxyribonucleic Acid (DNA) sequence encoding [2], [3], XOR Cipher [4], partitioned cellular automata [5], 2D compressed sensing [6], lifting wavelet transforms [7], cosine number transform [8], Multi-resolution Singular Value Decomposition (MSVD) in Discrete Cosine Stockwell Transform (DCST) domain [9] and chaotic-based encryption algorithms [10]- [13], etc. Chaotic systems have many excellent characteristics such as unpredictability, initial value sensitivity, and mean ergodicity.…”
Section: Introductionmentioning
confidence: 99%
“…Rapid developments in the digital world necessitate the need to concentrate on information hiding technology. Encryption of data is implemented long back since the days of Julius Caesar . Ciphering of data is a primary objective in cryptography.…”
Section: Introductionmentioning
confidence: 99%
“…Encryption of data is implemented long back since the days of Julius Caesar. 12 Ciphering of data is a primary objective in cryptography. Many ciphering algorithms have been developed and are growing continuously.…”
mentioning
confidence: 99%