Please use this identifier to cite or link to this item:
http://10.1.7.192:80/jspui/handle/123456789/1727
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Mecwan, Akash I. | - |
dc.contributor.author | Savani, Vijay G. | - |
dc.date.accessioned | 2010-11-10T06:52:13Z | - |
dc.date.available | 2010-11-10T06:52:13Z | - |
dc.date.issued | 2009-02-06 | - |
dc.identifier.citation | International Conference On Computer, Communication, Control and Information Technology (C3IT-2009), hoogly, February 6-7, 2009 | en |
dc.identifier.uri | http://hdl.handle.net/123456789/1727 | - |
dc.description.abstract | Widespread popularity of wireless data communication devices, coupled with the availability of higher bandwidths, has lead to an increased user demand for content-rich media such as images and videos. Since such content often tends to be private, sensitive, or paid for, and hence there exists a requirement for securing such communication. However, solutions that rely on traditional compute-intensive security mechanisms are unsuitable for resource-constrained wireless devices. A new color image encryption algorithm based on Image Scrambling and Steganography. Interchanging the information bits with the LSB’s of the cover image fundamentally protects the image that is to be protected. The experiments show that the algorithm has the characteristic of sensitivity to initial condition and pixel distributing uniformity. The main aim of the proposed algorithm is the encryption of an image in a robust manner to counteract the brute force method of hacking and also the incorporation of advantages of Image Scrambling. | en |
dc.relation.ispartofseries | ITFEC025-3 | en |
dc.subject | EC Faculty Paper | en |
dc.subject | Faculty Paper | en |
dc.subject | ITFEC025 | en |
dc.subject | ITFEC024 | en |
dc.title | Image Encryption using Secondary Image Randomization | en |
dc.type | Faculty Papers | en |
Appears in Collections: | Faculty Papers, EC |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
ITFEC025-3.pdf | ITFEC025-3 | 1.18 MB | Adobe PDF | ![]() View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.