Research Paper | Computer Science & Engineering | India | Volume 2 Issue 7, July 2013
Highly Secure Method for Image Transmission Using Partition and Multi Encryption Technique
Pooja Mishra, Biju Thankachan
In present times, the protection of multimedia data is becoming very important. The protection of this multimedia data can be done with encryption. There are so many different techniques should be used to protect confidential image data from an unauthorized access. In this paper, we are using multi encryption technique. Here we are using more than one encryption algorithm. First we apply segmentation process to divide the image in to 2n equal parts. These image parts are encrypted through encryption algorithm. In encryption for each image part we are using different encryption key. Now we add n bits to each image parts to identify it uniquely. Encryption keys are depends on additional bits. After encryption we are sending image parts through the network. At the receiver side first we extract the additional bits then we apply decryption algorithm into the image parts with the help of appropriate decryption key.
Keywords: Encryption, Decryption, Image parts, Segmentation, Key
Edition: Volume 2 Issue 7, July 2013
Pages: 347 - 350
How to Cite this Article?
Pooja Mishra, Biju Thankachan, "Highly Secure Method for Image Transmission Using Partition and Multi Encryption Technique", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSROFF2013319, Volume 2 Issue 7, July 2013, 347 - 350
113 PDF Views | 98 PDF Downloads
Similar Articles with Keyword 'Encryption'
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020
Pages: 470 - 478Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT
Aditya Tiwari, Ayush Pandey
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1069 - 1073Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1200 - 1203Efficient Hardware Encryption Using Lightweight Process
Deeksha Bhardwaj, Rohit Pawar, Aman Jain
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1525 - 1529Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2025 - 2029Investigation of Security in Cloud Computing
Annu Devi
Similar Articles with Keyword 'Decryption'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1525 - 1529Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2025 - 2029Investigation of Security in Cloud Computing
Annu Devi
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1579 - 1582Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format
Neenu Shereef
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1833 - 1836A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing
Roshan M. Kawale, Bharti L. Dhote
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016
Pages: 1345 - 1350Security Methods for Privacy Preserving and Data Sharing Over Cloud Computing and Big Data Frameworks
Kapilesh S. Swami, Dr. P Sai Kiran
Similar Articles with Keyword 'Segmentation'
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1615 - 1620Traffic Sign Detection via Graph Based Ranking and Segmentation Algorithm
Premsai Cheedella
Research Paper, Computer Science & Engineering, China, Volume 10 Issue 1, January 2021
Pages: 1165 - 1168A Capsule Robot Attitude Transformation Perception Method based on Intestinal Fold Features
Chengcheng Yan, Yanping Hu
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015
Pages: 1624 - 1627Video Segmentation Using Global Motion Estimation and Compensation
Pallavi R. Wagh, Shubhangi Vaikole
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2357 - 2361An Efficient Coin Recognition Technique using Rotational Invariance Approach
Nikita N Shelgikar, Prof. L. M. R. J Lobo
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1702 - 1705An Adaptive Recursive Reconstruction Technique for Segmentation of Images
Peram Nagamani, Gunna Kishore
Similar Articles with Keyword 'Key'
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 886 - 889Survey on Algorithms Predicting Performance of Keyword Queries
Snehal Borole
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 823 - 826Survey Paper on Users Location Hiding In Geosocial Recommendation Applications
Mayura Phadnis, Kanchan Varpe
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 2253 - 2256Survey on Hubness - Based Clustering Algorithms
Nikita Dhamal, Antara Bhatttacharya
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020
Pages: 1028 - 1031Secure and Efficient Item Information Retrieval in Cloud Computing
Dr. Shameem Akther, Tahseen Begum
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2394 - 2397Multilayered Security Approach for Cloud Data Centers using Hash Functions
Jashanpreet Pal Kaur, Rajbhupinder Kaur