2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI) 2013
DOI: 10.1109/icacci.2013.6637214
|View full text |Cite
|
Sign up to set email alerts
|

Towards the growth of image encryption and authentication schemes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
5
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(6 citation statements)
references
References 17 publications
0
5
0
Order By: Relevance
“…Even though, a lot of research has been done for compressing [2], or encryption the input image [7,8], a scant amount of work considers simultaneous compression and encryption of media files that are to be transmitted [9], through wireless media sensor network. Various cryptographic algorithms can be used to encrypt an image [10] but, for WMSN we require an algorithm with less computational complexity and high reliability. For this purpose, we have chosen Secured Force encryption technique [11].…”
Section: Introductionmentioning
confidence: 99%
“…Even though, a lot of research has been done for compressing [2], or encryption the input image [7,8], a scant amount of work considers simultaneous compression and encryption of media files that are to be transmitted [9], through wireless media sensor network. Various cryptographic algorithms can be used to encrypt an image [10] but, for WMSN we require an algorithm with less computational complexity and high reliability. For this purpose, we have chosen Secured Force encryption technique [11].…”
Section: Introductionmentioning
confidence: 99%
“…However, the communication channels used for sharing data are unfortunately insecure; and as such the question of information security arises. To address the issue of information security, various cryptographic methods (Rajput et al 2013;Solak 2013;Azarderakhsh et al 2014) are being used. Unfortunately, cryptographic algorithms do not always provide secure means of communication, given that the disguised form of encrypted data can cause suspicion and increases the chances of malicious attack.…”
Section: Introductionmentioning
confidence: 99%
“…Image encryption technique scrambles the pixels of the image and decreases the correlation among the pixels, so that the encrypted image is hard to understand [1]. However, the encrypted image may arouse an attacker's attention to guess the secret behind encryption and seek various ways to crack or break the encrypted content, which heavily threatens the security of the original information.…”
Section: Introductionmentioning
confidence: 99%