Loading…
A NEW SCALABLE AND EFFICIENT IMAGE ENCRYPTION SCHEME USING POLY SUBSTITUTION METHOD AND GENETIC ALGORITHM
In today's world of information technology, image encryption can be used for providing privacy and for protecting intellectual properties. During the transmission of images, the threat of unauthorized access may increase significantly. Image encryption can be used to minimize these problems. In...
Saved in:
Published in: | International journal of computer science and information security 2013-11, Vol.11 (11), p.63-63 |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | In today's world of information technology, image encryption can be used for providing privacy and for protecting intellectual properties. During the transmission of images, the threat of unauthorized access may increase significantly. Image encryption can be used to minimize these problems. In the proposed scheme of image encryption using poly substitution method, the authors have proposed the possibility of taking the advantages of genetic algorithm features. In poly alphabetic substitution ciphers, the plain text letters are enciphered differently depending upon their placement in the text. As the name poly alphabetic suggests, this is achieved by using several two, three keys and random keys combinations. |
---|---|
ISSN: | 1947-5500 |