Loading…

A NEW SCALABLE AND EFFICIENT IMAGE ENCRYPTION SCHEME USING POLY SUBSTITUTION METHOD AND GENETIC ALGORITHM

In today's world of information technology, image encryption can be used for providing privacy and for protecting intellectual properties. During the transmission of images, the threat of unauthorized access may increase significantly. Image encryption can be used to minimize these problems. In...

Full description

Saved in:
Bibliographic Details
Published in:International journal of computer science and information security 2013-11, Vol.11 (11), p.63-63
Main Authors: Lokeshwari, G, Kumar, S Udaya, Aparna, G
Format: Article
Language:English
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 63
container_issue 11
container_start_page 63
container_title International journal of computer science and information security
container_volume 11
creator Lokeshwari, G
Kumar, S Udaya
Aparna, G
description In today's world of information technology, image encryption can be used for providing privacy and for protecting intellectual properties. During the transmission of images, the threat of unauthorized access may increase significantly. Image encryption can be used to minimize these problems. In the proposed scheme of image encryption using poly substitution method, the authors have proposed the possibility of taking the advantages of genetic algorithm features. In poly alphabetic substitution ciphers, the plain text letters are enciphered differently depending upon their placement in the text. As the name poly alphabetic suggests, this is achieved by using several two, three keys and random keys combinations.
format article
fullrecord <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_miscellaneous_1494355657</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1494355657</sourcerecordid><originalsourceid>FETCH-LOGICAL-p617-c8662563dab6c4ac37dedbbb6082c6a0ac2cb4788ec66574e9e1966d179e25243</originalsourceid><addsrcrecordid>eNpdjl1rgzAUhmUwWOn6HwK72Y1gNB_mMrVRAxpLjYxeFY0ZtLjaNev_X2h3tXNzLs7zPud9ChaQIRpiHEUvwcq5U-QngQhDvAiOHCjxAdqMV3xdCcDVBog8l5kUSgNZ80IAobLdfqtlozxXilqArpWqANum2oO2W7da6u5-roUum81dUggltMwAr4pmJ3VZvwbPn_3k7OpvLwOdC52VYdUU0r8PLwTS0KSExJgkYz8Qg3qT0NGOwzCQKI0N6aPexGZANE2tIQRTZJmFjJARUmZjHKNkGbw_tJfr_H2z7ufwdXTGTlN_tvPNHSBiKMHYZz369g89zbfr2ZfzFGEMQhSz5BdFu1cF</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1469911429</pqid></control><display><type>article</type><title>A NEW SCALABLE AND EFFICIENT IMAGE ENCRYPTION SCHEME USING POLY SUBSTITUTION METHOD AND GENETIC ALGORITHM</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Lokeshwari, G ; Kumar, S Udaya ; Aparna, G</creator><creatorcontrib>Lokeshwari, G ; Kumar, S Udaya ; Aparna, G</creatorcontrib><description>In today's world of information technology, image encryption can be used for providing privacy and for protecting intellectual properties. During the transmission of images, the threat of unauthorized access may increase significantly. Image encryption can be used to minimize these problems. In the proposed scheme of image encryption using poly substitution method, the authors have proposed the possibility of taking the advantages of genetic algorithm features. In poly alphabetic substitution ciphers, the plain text letters are enciphered differently depending upon their placement in the text. As the name poly alphabetic suggests, this is achieved by using several two, three keys and random keys combinations.</description><identifier>EISSN: 1947-5500</identifier><language>eng</language><publisher>Pittsburgh: L J S Publishing</publisher><subject>Access control ; Computer information security ; Confidentiality ; Cybersecurity ; Genetic algorithms ; Letters ; Optimization techniques ; Security services ; Values</subject><ispartof>International journal of computer science and information security, 2013-11, Vol.11 (11), p.63-63</ispartof><rights>Copyright L J S Publishing Nov 2013</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784</link.rule.ids></links><search><creatorcontrib>Lokeshwari, G</creatorcontrib><creatorcontrib>Kumar, S Udaya</creatorcontrib><creatorcontrib>Aparna, G</creatorcontrib><title>A NEW SCALABLE AND EFFICIENT IMAGE ENCRYPTION SCHEME USING POLY SUBSTITUTION METHOD AND GENETIC ALGORITHM</title><title>International journal of computer science and information security</title><description>In today's world of information technology, image encryption can be used for providing privacy and for protecting intellectual properties. During the transmission of images, the threat of unauthorized access may increase significantly. Image encryption can be used to minimize these problems. In the proposed scheme of image encryption using poly substitution method, the authors have proposed the possibility of taking the advantages of genetic algorithm features. In poly alphabetic substitution ciphers, the plain text letters are enciphered differently depending upon their placement in the text. As the name poly alphabetic suggests, this is achieved by using several two, three keys and random keys combinations.</description><subject>Access control</subject><subject>Computer information security</subject><subject>Confidentiality</subject><subject>Cybersecurity</subject><subject>Genetic algorithms</subject><subject>Letters</subject><subject>Optimization techniques</subject><subject>Security services</subject><subject>Values</subject><issn>1947-5500</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2013</creationdate><recordtype>article</recordtype><recordid>eNpdjl1rgzAUhmUwWOn6HwK72Y1gNB_mMrVRAxpLjYxeFY0ZtLjaNev_X2h3tXNzLs7zPud9ChaQIRpiHEUvwcq5U-QngQhDvAiOHCjxAdqMV3xdCcDVBog8l5kUSgNZ80IAobLdfqtlozxXilqArpWqANum2oO2W7da6u5-roUum81dUggltMwAr4pmJ3VZvwbPn_3k7OpvLwOdC52VYdUU0r8PLwTS0KSExJgkYz8Qg3qT0NGOwzCQKI0N6aPexGZANE2tIQRTZJmFjJARUmZjHKNkGbw_tJfr_H2z7ufwdXTGTlN_tvPNHSBiKMHYZz369g89zbfr2ZfzFGEMQhSz5BdFu1cF</recordid><startdate>20131101</startdate><enddate>20131101</enddate><creator>Lokeshwari, G</creator><creator>Kumar, S Udaya</creator><creator>Aparna, G</creator><general>L J S Publishing</general><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20131101</creationdate><title>A NEW SCALABLE AND EFFICIENT IMAGE ENCRYPTION SCHEME USING POLY SUBSTITUTION METHOD AND GENETIC ALGORITHM</title><author>Lokeshwari, G ; Kumar, S Udaya ; Aparna, G</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p617-c8662563dab6c4ac37dedbbb6082c6a0ac2cb4788ec66574e9e1966d179e25243</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2013</creationdate><topic>Access control</topic><topic>Computer information security</topic><topic>Confidentiality</topic><topic>Cybersecurity</topic><topic>Genetic algorithms</topic><topic>Letters</topic><topic>Optimization techniques</topic><topic>Security services</topic><topic>Values</topic><toplevel>online_resources</toplevel><creatorcontrib>Lokeshwari, G</creatorcontrib><creatorcontrib>Kumar, S Udaya</creatorcontrib><creatorcontrib>Aparna, G</creatorcontrib><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>International journal of computer science and information security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Lokeshwari, G</au><au>Kumar, S Udaya</au><au>Aparna, G</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A NEW SCALABLE AND EFFICIENT IMAGE ENCRYPTION SCHEME USING POLY SUBSTITUTION METHOD AND GENETIC ALGORITHM</atitle><jtitle>International journal of computer science and information security</jtitle><date>2013-11-01</date><risdate>2013</risdate><volume>11</volume><issue>11</issue><spage>63</spage><epage>63</epage><pages>63-63</pages><eissn>1947-5500</eissn><abstract>In today's world of information technology, image encryption can be used for providing privacy and for protecting intellectual properties. During the transmission of images, the threat of unauthorized access may increase significantly. Image encryption can be used to minimize these problems. In the proposed scheme of image encryption using poly substitution method, the authors have proposed the possibility of taking the advantages of genetic algorithm features. In poly alphabetic substitution ciphers, the plain text letters are enciphered differently depending upon their placement in the text. As the name poly alphabetic suggests, this is achieved by using several two, three keys and random keys combinations.</abstract><cop>Pittsburgh</cop><pub>L J S Publishing</pub><tpages>1</tpages></addata></record>
fulltext fulltext
identifier EISSN: 1947-5500
ispartof International journal of computer science and information security, 2013-11, Vol.11 (11), p.63-63
issn 1947-5500
language eng
recordid cdi_proquest_miscellaneous_1494355657
source EZB-FREE-00999 freely available EZB journals
subjects Access control
Computer information security
Confidentiality
Cybersecurity
Genetic algorithms
Letters
Optimization techniques
Security services
Values
title A NEW SCALABLE AND EFFICIENT IMAGE ENCRYPTION SCHEME USING POLY SUBSTITUTION METHOD AND GENETIC ALGORITHM
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T16%3A22%3A11IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20NEW%20SCALABLE%20AND%20EFFICIENT%20IMAGE%20ENCRYPTION%20SCHEME%20USING%20POLY%20SUBSTITUTION%20METHOD%20AND%20GENETIC%20ALGORITHM&rft.jtitle=International%20journal%20of%20computer%20science%20and%20information%20security&rft.au=Lokeshwari,%20G&rft.date=2013-11-01&rft.volume=11&rft.issue=11&rft.spage=63&rft.epage=63&rft.pages=63-63&rft.eissn=1947-5500&rft_id=info:doi/&rft_dat=%3Cproquest%3E1494355657%3C/proquest%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-p617-c8662563dab6c4ac37dedbbb6082c6a0ac2cb4788ec66574e9e1966d179e25243%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1469911429&rft_id=info:pmid/&rfr_iscdi=true