Loading…
A NEW SCALABLE AND EFFICIENT IMAGE ENCRYPTION SCHEME USING POLY SUBSTITUTION METHOD AND GENETIC ALGORITHM
In today's world of information technology, image encryption can be used for providing privacy and for protecting intellectual properties. During the transmission of images, the threat of unauthorized access may increase significantly. Image encryption can be used to minimize these problems. In...
Saved in:
Published in: | International journal of computer science and information security 2013-11, Vol.11 (11), p.63-63 |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 63 |
container_issue | 11 |
container_start_page | 63 |
container_title | International journal of computer science and information security |
container_volume | 11 |
creator | Lokeshwari, G Kumar, S Udaya Aparna, G |
description | In today's world of information technology, image encryption can be used for providing privacy and for protecting intellectual properties. During the transmission of images, the threat of unauthorized access may increase significantly. Image encryption can be used to minimize these problems. In the proposed scheme of image encryption using poly substitution method, the authors have proposed the possibility of taking the advantages of genetic algorithm features. In poly alphabetic substitution ciphers, the plain text letters are enciphered differently depending upon their placement in the text. As the name poly alphabetic suggests, this is achieved by using several two, three keys and random keys combinations. |
format | article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_miscellaneous_1494355657</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1494355657</sourcerecordid><originalsourceid>FETCH-LOGICAL-p617-c8662563dab6c4ac37dedbbb6082c6a0ac2cb4788ec66574e9e1966d179e25243</originalsourceid><addsrcrecordid>eNpdjl1rgzAUhmUwWOn6HwK72Y1gNB_mMrVRAxpLjYxeFY0ZtLjaNev_X2h3tXNzLs7zPud9ChaQIRpiHEUvwcq5U-QngQhDvAiOHCjxAdqMV3xdCcDVBog8l5kUSgNZ80IAobLdfqtlozxXilqArpWqANum2oO2W7da6u5-roUum81dUggltMwAr4pmJ3VZvwbPn_3k7OpvLwOdC52VYdUU0r8PLwTS0KSExJgkYz8Qg3qT0NGOwzCQKI0N6aPexGZANE2tIQRTZJmFjJARUmZjHKNkGbw_tJfr_H2z7ufwdXTGTlN_tvPNHSBiKMHYZz369g89zbfr2ZfzFGEMQhSz5BdFu1cF</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1469911429</pqid></control><display><type>article</type><title>A NEW SCALABLE AND EFFICIENT IMAGE ENCRYPTION SCHEME USING POLY SUBSTITUTION METHOD AND GENETIC ALGORITHM</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Lokeshwari, G ; Kumar, S Udaya ; Aparna, G</creator><creatorcontrib>Lokeshwari, G ; Kumar, S Udaya ; Aparna, G</creatorcontrib><description>In today's world of information technology, image encryption can be used for providing privacy and for protecting intellectual properties. During the transmission of images, the threat of unauthorized access may increase significantly. Image encryption can be used to minimize these problems. In the proposed scheme of image encryption using poly substitution method, the authors have proposed the possibility of taking the advantages of genetic algorithm features. In poly alphabetic substitution ciphers, the plain text letters are enciphered differently depending upon their placement in the text. As the name poly alphabetic suggests, this is achieved by using several two, three keys and random keys combinations.</description><identifier>EISSN: 1947-5500</identifier><language>eng</language><publisher>Pittsburgh: L J S Publishing</publisher><subject>Access control ; Computer information security ; Confidentiality ; Cybersecurity ; Genetic algorithms ; Letters ; Optimization techniques ; Security services ; Values</subject><ispartof>International journal of computer science and information security, 2013-11, Vol.11 (11), p.63-63</ispartof><rights>Copyright L J S Publishing Nov 2013</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784</link.rule.ids></links><search><creatorcontrib>Lokeshwari, G</creatorcontrib><creatorcontrib>Kumar, S Udaya</creatorcontrib><creatorcontrib>Aparna, G</creatorcontrib><title>A NEW SCALABLE AND EFFICIENT IMAGE ENCRYPTION SCHEME USING POLY SUBSTITUTION METHOD AND GENETIC ALGORITHM</title><title>International journal of computer science and information security</title><description>In today's world of information technology, image encryption can be used for providing privacy and for protecting intellectual properties. During the transmission of images, the threat of unauthorized access may increase significantly. Image encryption can be used to minimize these problems. In the proposed scheme of image encryption using poly substitution method, the authors have proposed the possibility of taking the advantages of genetic algorithm features. In poly alphabetic substitution ciphers, the plain text letters are enciphered differently depending upon their placement in the text. As the name poly alphabetic suggests, this is achieved by using several two, three keys and random keys combinations.</description><subject>Access control</subject><subject>Computer information security</subject><subject>Confidentiality</subject><subject>Cybersecurity</subject><subject>Genetic algorithms</subject><subject>Letters</subject><subject>Optimization techniques</subject><subject>Security services</subject><subject>Values</subject><issn>1947-5500</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2013</creationdate><recordtype>article</recordtype><recordid>eNpdjl1rgzAUhmUwWOn6HwK72Y1gNB_mMrVRAxpLjYxeFY0ZtLjaNev_X2h3tXNzLs7zPud9ChaQIRpiHEUvwcq5U-QngQhDvAiOHCjxAdqMV3xdCcDVBog8l5kUSgNZ80IAobLdfqtlozxXilqArpWqANum2oO2W7da6u5-roUum81dUggltMwAr4pmJ3VZvwbPn_3k7OpvLwOdC52VYdUU0r8PLwTS0KSExJgkYz8Qg3qT0NGOwzCQKI0N6aPexGZANE2tIQRTZJmFjJARUmZjHKNkGbw_tJfr_H2z7ufwdXTGTlN_tvPNHSBiKMHYZz369g89zbfr2ZfzFGEMQhSz5BdFu1cF</recordid><startdate>20131101</startdate><enddate>20131101</enddate><creator>Lokeshwari, G</creator><creator>Kumar, S Udaya</creator><creator>Aparna, G</creator><general>L J S Publishing</general><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20131101</creationdate><title>A NEW SCALABLE AND EFFICIENT IMAGE ENCRYPTION SCHEME USING POLY SUBSTITUTION METHOD AND GENETIC ALGORITHM</title><author>Lokeshwari, G ; Kumar, S Udaya ; Aparna, G</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p617-c8662563dab6c4ac37dedbbb6082c6a0ac2cb4788ec66574e9e1966d179e25243</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2013</creationdate><topic>Access control</topic><topic>Computer information security</topic><topic>Confidentiality</topic><topic>Cybersecurity</topic><topic>Genetic algorithms</topic><topic>Letters</topic><topic>Optimization techniques</topic><topic>Security services</topic><topic>Values</topic><toplevel>online_resources</toplevel><creatorcontrib>Lokeshwari, G</creatorcontrib><creatorcontrib>Kumar, S Udaya</creatorcontrib><creatorcontrib>Aparna, G</creatorcontrib><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>International journal of computer science and information security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Lokeshwari, G</au><au>Kumar, S Udaya</au><au>Aparna, G</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A NEW SCALABLE AND EFFICIENT IMAGE ENCRYPTION SCHEME USING POLY SUBSTITUTION METHOD AND GENETIC ALGORITHM</atitle><jtitle>International journal of computer science and information security</jtitle><date>2013-11-01</date><risdate>2013</risdate><volume>11</volume><issue>11</issue><spage>63</spage><epage>63</epage><pages>63-63</pages><eissn>1947-5500</eissn><abstract>In today's world of information technology, image encryption can be used for providing privacy and for protecting intellectual properties. During the transmission of images, the threat of unauthorized access may increase significantly. Image encryption can be used to minimize these problems. In the proposed scheme of image encryption using poly substitution method, the authors have proposed the possibility of taking the advantages of genetic algorithm features. In poly alphabetic substitution ciphers, the plain text letters are enciphered differently depending upon their placement in the text. As the name poly alphabetic suggests, this is achieved by using several two, three keys and random keys combinations.</abstract><cop>Pittsburgh</cop><pub>L J S Publishing</pub><tpages>1</tpages></addata></record> |
fulltext | fulltext |
identifier | EISSN: 1947-5500 |
ispartof | International journal of computer science and information security, 2013-11, Vol.11 (11), p.63-63 |
issn | 1947-5500 |
language | eng |
recordid | cdi_proquest_miscellaneous_1494355657 |
source | EZB-FREE-00999 freely available EZB journals |
subjects | Access control Computer information security Confidentiality Cybersecurity Genetic algorithms Letters Optimization techniques Security services Values |
title | A NEW SCALABLE AND EFFICIENT IMAGE ENCRYPTION SCHEME USING POLY SUBSTITUTION METHOD AND GENETIC ALGORITHM |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T16%3A22%3A11IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20NEW%20SCALABLE%20AND%20EFFICIENT%20IMAGE%20ENCRYPTION%20SCHEME%20USING%20POLY%20SUBSTITUTION%20METHOD%20AND%20GENETIC%20ALGORITHM&rft.jtitle=International%20journal%20of%20computer%20science%20and%20information%20security&rft.au=Lokeshwari,%20G&rft.date=2013-11-01&rft.volume=11&rft.issue=11&rft.spage=63&rft.epage=63&rft.pages=63-63&rft.eissn=1947-5500&rft_id=info:doi/&rft_dat=%3Cproquest%3E1494355657%3C/proquest%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-p617-c8662563dab6c4ac37dedbbb6082c6a0ac2cb4788ec66574e9e1966d179e25243%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1469911429&rft_id=info:pmid/&rfr_iscdi=true |