Survey Paper | Computer Science & Engineering | Iraq | Volume 6 Issue 7, July 2017
An Overview of Crypto-Compressive Based on Selective Coding
Enas Kh Alamiry, Faisal G. Mohammed
Image encoding (visual cryptography) is special encryption technique to hide the information contained within an image. In such a way it cant be decrypted or recognized by neither human visual system (HVS) nor cryptanalysis algorithms. Partial image encryption have become very popular due to rapid evolution in information technology and visual communications over open networks, it is considered crucial to real time applications that need to be very fast and entirely secured, where the digital data must kept intact from eavesdroppers and unauthorized access. Most of todays techniques encrypt all of the image data which consumes tremendous amount of time and computational payload. This paper introduces the image Encryption strategy along with its main categories (full and partial encryption), partial Encryption sub-categories, and the leading schemes proposed for Partial Image Encryption (PIE) that only apply the encryption algorithm to merely a portion of the image data which produces huge reduction in processing time and computational Complexity
Keywords: Partial Encryption, Selective Encryption, Cryptography, Image Scrambling
Edition: Volume 6 Issue 7, July 2017
Pages: 2178 - 2182
How to Cite this Article?
Enas Kh Alamiry, Faisal G. Mohammed, "An Overview of Crypto-Compressive Based on Selective Coding", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20175749, Volume 6 Issue 7, July 2017, 2178 - 2182
135 PDF Views | 109 PDF Downloads
Similar Articles with Keyword 'Partial Encryption'
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016
Pages: 1037 - 1039Survey on Wavelet Based Image Encryption and Decryption
Manju Lakshmi, Smita C Thomas, Sreelakshmi K
Survey Paper, Computer Science & Engineering, Iraq, Volume 6 Issue 7, July 2017
Pages: 2178 - 2182An Overview of Crypto-Compressive Based on Selective Coding
Enas Kh Alamiry, Faisal G. Mohammed
Similar Articles with Keyword 'Selective Encryption'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1598 - 1601A Novel Approach to Improve the Privacy of Information Brokering in Semantic Web
Supriya S. Sankpal, Rupali A. Mahajan
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1435 - 1439Review on Encryption Techniques in Multimedia Data
Ashwini G. Kamble, Prof. Nikita J. Kulkarni
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 1844 - 1847A Providing Security on Cloud Data Hadoop using Symmetric Encryption and Identity Authentication
Kale Rohitkumar Bhausaheb, R.L.Paikrao
Survey Paper, Computer Science & Engineering, Iraq, Volume 6 Issue 7, July 2017
Pages: 2178 - 2182An Overview of Crypto-Compressive Based on Selective Coding
Enas Kh Alamiry, Faisal G. Mohammed
Similar Articles with Keyword 'Cryptography'
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1057 - 1058Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS
Pranita Prakash Kulkarni
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1069 - 1073Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2394 - 2397Multilayered Security Approach for Cloud Data Centers using Hash Functions
Jashanpreet Pal Kaur, Rajbhupinder Kaur
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1200 - 1203Efficient Hardware Encryption Using Lightweight Process
Deeksha Bhardwaj, Rohit Pawar, Aman Jain
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1525 - 1529Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar
Similar Articles with Keyword 'Image Scrambling'
Research Paper, Computer Science & Engineering, Iraq, Volume 3 Issue 6, June 2014
Pages: 2004 - 2009Image Encryption Based on Pixel Shuffling with 3D Chaotic System
Asia Mahdi Naser Alzubaidi
Survey Paper, Computer Science & Engineering, Iraq, Volume 6 Issue 7, July 2017
Pages: 2178 - 2182An Overview of Crypto-Compressive Based on Selective Coding
Enas Kh Alamiry, Faisal G. Mohammed
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 813 - 818A Comprehensive Survey on Image Scrambling Techniques
Prarthana Madan Modak, Dr. Vijaykumar Pawar