2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS) 2015
DOI: 10.1109/iciiecs.2015.7193117
|View full text |Cite
|
Sign up to set email alerts
|

Secure image transferring using KBRP and TEA algorithms

Abstract: A secure image transferring using key based random permutation(KBRP) and tiny encryption algorithm(TEA), which provide more security to images while transferring by using image scrambling as well as image encryption with the use of randomly generated passwords for each pixel is proposed in this paper. The image scrambling mechanism is developed using the key based random generation of passwords for pixels and this generation of passwords are by permutation method. So the hackers cannot easily find out this ima… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 14 publications
(5 reference statements)
0
2
0
Order By: Relevance
“…The various thoughts used in the current image encryption techniques. A safe transfer of images is proposed [9] using key-based random flipping (KBRP) and TEA, which provides additional security for images during transfering using image scrambling as well as encrypt images with randomly generated passwords per pixel. Kanagalakshum and Mekala [10] designed a method based on the Blowfish algorithm with improved features.…”
Section: Related Workmentioning
confidence: 99%
“…The various thoughts used in the current image encryption techniques. A safe transfer of images is proposed [9] using key-based random flipping (KBRP) and TEA, which provides additional security for images during transfering using image scrambling as well as encrypt images with randomly generated passwords per pixel. Kanagalakshum and Mekala [10] designed a method based on the Blowfish algorithm with improved features.…”
Section: Related Workmentioning
confidence: 99%
“…Because of these reasons many protocols used with normal computer networks do not give good performance in IoT networks and are not preferred. Considering these features, tiny encryption algorithm (TEA) [17][18][19] is the most widely used symmetric algorithm with a Feistel cipher for secure transmission of data through the IoT network. The popularity of TEA is mainly due to the ease of implementation and less memory utilization compared to all other encryption algorithms.…”
Section: Introductionmentioning
confidence: 99%