2015 International Conference on Computing and Communications Technologies (ICCCT) 2015
DOI: 10.1109/iccct2.2015.7292733
|View full text |Cite
|
Sign up to set email alerts
|

Image encryption and decryption in public key cryptography based on MR

Abstract: In the past decade, image encryption is given much attention in research of information security and a lot of image encryption algorithms have been introduced. Due to some intrinsic features of images like bulk data capacity and high data redundancy, the encryption of image is different from that of text; therefore it is difficult to handle them by traditional encryption methods. In the proposed work, a new image encryption algorithm based on Magic Rectangle (MR) is being applied. To begin with, the plain-imag… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
12
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(12 citation statements)
references
References 3 publications
0
12
0
Order By: Relevance
“…Several researchers have proposed numerous graphical based authentication schemes to defend quite a few of previously mentioned attacks 1‐24 . Our and others analysis of these authentication schemes exhibited several severe flaws.…”
Section: Related Workmentioning
confidence: 82%
See 1 more Smart Citation
“…Several researchers have proposed numerous graphical based authentication schemes to defend quite a few of previously mentioned attacks 1‐24 . Our and others analysis of these authentication schemes exhibited several severe flaws.…”
Section: Related Workmentioning
confidence: 82%
“…Amalarethinam and Sai Geetha 18 proposed public key cryptographic technique, which uses the concept of magic rectangle. During encryption, the selected image is converted into many blocks, and each block is replaced with the value of the magic rectangle.…”
Section: Related Workmentioning
confidence: 99%
“…Amalarethinam and Geetha [1] introduced an image encryption algorithm in view of applied Magic Rectangle (MR) as the plain picture is changed over into pieces of single bytes, and after that the square is substitute as the estimation of MR. Further, the control parameters of MR are chosen haphazardly by the client.…”
Section: Related Workmentioning
confidence: 99%
“…Also, many of the research organizations as well as research communities are working on improving the image security against such manipulation techniques [10]. These encryption mechanisms are mainly categorized into symmetric and asymmetric mechanisms [11,12]. Researchers [13] introduced the Rivest Shamir and Adleman [14] RSA algorithm.…”
Section: Image Encryptionmentioning
confidence: 99%