Loading…

A NEW SCALABLE AND EFFICIENT IMAGE ENCRYPTION SCHEME USING POLY SUBSTITUTION METHOD AND GENETIC ALGORITHM

In today's world of information technology, image encryption can be used for providing privacy and for protecting intellectual properties. During the transmission of images, the threat of unauthorized access may increase significantly. Image encryption can be used to minimize these problems. In...

Full description

Saved in:
Bibliographic Details
Published in:International journal of computer science and information security 2013-11, Vol.11 (11), p.63-63
Main Authors: Lokeshwari, G, Kumar, S Udaya, Aparna, G
Format: Article
Language:English
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:In today's world of information technology, image encryption can be used for providing privacy and for protecting intellectual properties. During the transmission of images, the threat of unauthorized access may increase significantly. Image encryption can be used to minimize these problems. In the proposed scheme of image encryption using poly substitution method, the authors have proposed the possibility of taking the advantages of genetic algorithm features. In poly alphabetic substitution ciphers, the plain text letters are enciphered differently depending upon their placement in the text. As the name poly alphabetic suggests, this is achieved by using several two, three keys and random keys combinations.
ISSN:1947-5500