2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies 2011
DOI: 10.1109/icsccn.2011.6024565
|View full text |Cite
|
Sign up to set email alerts
|

Image encryption using affine transform and XOR operation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 72 publications
(31 citation statements)
references
References 7 publications
0
31
0
Order By: Relevance
“…Amitava Nag, Jyoti Prakash Singh, Srabani Khan, Sushanta Biswas, D. Sarkar and Partha Pratim Sarkar [3] have suggested a technique that uses 64 bits key in the encryption process. This approach uses the affine transformation to shuffle the pixels by applying four sub keys of 8 bits.…”
Section: Existing Algorithmsmentioning
confidence: 99%
See 1 more Smart Citation
“…Amitava Nag, Jyoti Prakash Singh, Srabani Khan, Sushanta Biswas, D. Sarkar and Partha Pratim Sarkar [3] have suggested a technique that uses 64 bits key in the encryption process. This approach uses the affine transformation to shuffle the pixels by applying four sub keys of 8 bits.…”
Section: Existing Algorithmsmentioning
confidence: 99%
“…Four different techniques affine transformation and XOR operation [3] one-dimensional random scrambling [4] XOR operation and rotation [5] Three distinct onedimensional chaotic map [7] …”
Section: Size Of Image ( Kb)mentioning
confidence: 99%
“…In 2011 Amitava Nag, Jyoti Prakash Singh, Srabani Khan, Sushanta Biswas, D. Sarkar, Partha Pratim Sarkar [7] proposed a new location transformation based encryption technique. They redistributed the pixel values to different location using affine transform technique with four 8-bit keys.…”
Section: Image Encryption Using Affine Transform and Xor Operationmentioning
confidence: 99%
“…However, these techniques are capable to encrypt text data nevertheless deficient in image encryption [2]. Images are different from text data due to bulky data, high redundancy and strong correlation between pixels [3,4,5,6]. So there is a need of encryption technique that is suitable for images [3,4,5].…”
Section: Introductionmentioning
confidence: 99%