Survey on Wavelet Based Image Encryption and Decryption
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 120 , Downloads: 107 | CTR: 89 %

Survey Paper | Computer Science & Engineering | India | Volume 5 Issue 11, November 2016

Survey on Wavelet Based Image Encryption and Decryption

Manju Lakshmi, Smita C Thomas, Sreelakshmi K

The process of transmitting image encryption using the image securely over the network so that an unauthorized user cannot able to decrypt the image.Different techniques for using image encryption. The most common method of image encryption is wavelet transform. Wavelet transform of the image generates the different components basically classified in the approximation and detail components. The approximation component has major information. A partial encryption technique is using only approximation component. The decryption techniques used a key for decryption. In this paper say that survey of different wavelet based image encryption and decryption techniques.

Keywords: image encryption, decryption, MSE, DWT, CWT, PSNR,

Edition: Volume 5 Issue 11, November 2016

Pages: 1037 - 1039

Share this Article

How to Cite this Article?

Manju Lakshmi, Smita C Thomas, Sreelakshmi K, "Survey on Wavelet Based Image Encryption and Decryption", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20162923, Volume 5 Issue 11, November 2016, 1037 - 1039

120 PDF Views | 107 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'image encryption'

Views: 132 , Downloads: 103 | CTR: 78 % | Weekly Popularity: ⮙4

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1062 - 1064

Enriching Process of Image Encryption and Compression Using Hierarchical Decomposition

Devashri Anil Vyawahare, Prof. Anil Gujar

Share this Article

Views: 116 , Downloads: 104 | CTR: 90 % | Weekly Popularity: ⮙3

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2033 - 2036

A Survey Work on ETC System for an Efficient Image Encryption and Compression

Gauri Chavan, Prashant Kumbharkar

Share this Article

Views: 172 , Downloads: 105 | CTR: 61 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1330 - 1335

Efficient Image Encryption EIE - Compression System Using Haar Wavelets Using Matlab

Kavita, Anil Vadhwa

Share this Article

Views: 142 , Downloads: 106 | CTR: 75 % | Weekly Popularity: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2814 - 2815

Partial Image Encryption Using Block Shuffling and Pseudo Random Number Generator

Rakhi Lande, Rekha Pandit

Share this Article

Views: 126 , Downloads: 106 | CTR: 84 % | Weekly Popularity: ⮙4

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1830 - 1833

A Survey on Efficient ETC (Encryption-Then-Compression) Techniques for Image Data Security

Ganesh Lamkhade, Ajay Kumar Gupta

Share this Article

Similar Articles with Keyword 'decryption'

Views: 130 , Downloads: 98 | CTR: 75 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1833 - 1836

A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing

Roshan M. Kawale, Bharti L. Dhote

Share this Article

Views: 126 , Downloads: 100 | CTR: 79 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1579 - 1582

Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format

Neenu Shereef

Share this Article

Views: 135 , Downloads: 101 | CTR: 75 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

Views: 141 , Downloads: 102 | CTR: 72 %

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2535 - 2538

A Survey on Security Mechanism using Colors and Armstrong Numbers

Nutan Gurav, Pratap Singh

Share this Article

Views: 125 , Downloads: 103 | CTR: 82 % | Weekly Popularity: ⮙5

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2467 - 2469

Literature Review on: Secure Sharing of Data for Dynamic Groups in Cloud

Shazadi Fatima Rizvi, A. N. Jaiswal

Share this Article

Similar Articles with Keyword 'MSE'

Views: 146 , Downloads: 83 | CTR: 57 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013

Pages: 297 - 300

Balancing the Trade-Offs between Data Availability and Query Delay in MANETs

Umar I. Masumdar, N. S. Killarikar

Share this Article

Views: 135 , Downloads: 98 | CTR: 73 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1165 - 1168

Privacy Preserving Closed Frequent Pattern Mining

Anju Vijayan

Share this Article

Views: 138 , Downloads: 100 | CTR: 72 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1054 - 1058

Colour Extended Visual Cryptography based on MKGED

T. Anuradha, Dr. K. Usha Rani

Share this Article

Views: 152 , Downloads: 100 | CTR: 66 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 2040 - 2043

An Efficient Method for Image Denoising Using Orthogonal Wavelet Transform

Akshata S Kori, Manjunatha A S.

Share this Article

Views: 146 , Downloads: 101 | CTR: 69 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2124 - 2127

Medical Image Compression Using ISPIHT & JPEG2000 Hybrid

Yashpreet Sain

Share this Article

Similar Articles with Keyword 'DWT'

Views: 134 , Downloads: 73 | CTR: 54 % | Weekly Popularity: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Views: 130 , Downloads: 104 | CTR: 80 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1587 - 1589

A Survey on Comparison between DCT and DWT Techniques of Image Compression

Pooja Rani, Apoorva Arora

Share this Article

Views: 130 , Downloads: 104 | CTR: 80 % | Weekly Popularity: ⮙4

Comparative Studies, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2049 - 2052

Fingerprint Compression Technique using Sparse Representation

Swapnil Raut, Nisha Wankhade

Share this Article

Views: 139 , Downloads: 105 | CTR: 76 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1338 - 1343

Implementation of Adaptive Video Compression using Hybridized Wavelet Transform

Anurag Srivastava, Puneet Sharma

Share this Article

Views: 151 , Downloads: 105 | CTR: 70 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1856 - 1858

A Review On Digital Video Watermarking Using DWT

Shweta Sharma, Sarika Chaudhary

Share this Article

Similar Articles with Keyword 'CWT'

Views: 120 , Downloads: 107 | CTR: 89 %

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1037 - 1039

Survey on Wavelet Based Image Encryption and Decryption

Manju Lakshmi, Smita C Thomas, Sreelakshmi K

Share this Article

Views: 136 , Downloads: 111 | CTR: 82 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2650 - 2652

A Brief Review of Different Image Fusion Algorithm

Apurva Sharma, Anil Saroliya

Share this Article

Views: 148 , Downloads: 113 | CTR: 76 % | Weekly Popularity: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1153 - 1155

A Brief Overview of Satellite Image Resolution Enhancement

Ruchita Choudhary, Anil Saroliya

Share this Article

Similar Articles with Keyword 'PSNR,'

Views: 138 , Downloads: 100 | CTR: 72 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1054 - 1058

Colour Extended Visual Cryptography based on MKGED

T. Anuradha, Dr. K. Usha Rani

Share this Article

Views: 146 , Downloads: 101 | CTR: 69 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2124 - 2127

Medical Image Compression Using ISPIHT & JPEG2000 Hybrid

Yashpreet Sain

Share this Article

Views: 108 , Downloads: 105 | CTR: 97 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1169 - 1172

Image Registration Using MAC RANSAC

Krishma, Navpreet Kaur Walia

Share this Article

Views: 133 , Downloads: 106 | CTR: 80 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2078 - 2080

Image Enhancement Technique Using Symlet and Daubechies Wavelets

Shivani Jain, Jyoti Rani

Share this Article

Views: 147 , Downloads: 106 | CTR: 72 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1467 - 1471

XOR Encryption Based Video Steganography

Ramandeep Kaur, Pooja

Share this Article
Top