Highly Secure Method for Image Transmission Using Partition and Multi Encryption Technique
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 7, July 2013

Highly Secure Method for Image Transmission Using Partition and Multi Encryption Technique

Pooja Mishra, Biju Thankachan

In present times, the protection of multimedia data is becoming very important. The protection of this multimedia data can be done with encryption. There are so many different techniques should be used to protect confidential image data from an unauthorized access. In this paper, we are using multi encryption technique. Here we are using more than one encryption algorithm. First we apply segmentation process to divide the image in to 2n equal parts. These image parts are encrypted through encryption algorithm. In encryption for each image part we are using different encryption key. Now we add n bits to each image parts to identify it uniquely. Encryption keys are depends on additional bits. After encryption we are sending image parts through the network. At the receiver side first we extract the additional bits then we apply decryption algorithm into the image parts with the help of appropriate decryption key.

Keywords: Encryption, Decryption, Image parts, Segmentation, Key

Edition: Volume 2 Issue 7, July 2013

Pages: 347 - 350

Share this Article

How to Cite this Article?

Pooja Mishra, Biju Thankachan, "Highly Secure Method for Image Transmission Using Partition and Multi Encryption Technique", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSROFF2013319, Volume 2 Issue 7, July 2013, 347 - 350

113 PDF Views | 98 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Encryption'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2025 - 2029

Investigation of Security in Cloud Computing

Annu Devi

Share this Article

Similar Articles with Keyword 'Decryption'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2025 - 2029

Investigation of Security in Cloud Computing

Annu Devi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1579 - 1582

Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format

Neenu Shereef

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1833 - 1836

A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing

Roshan M. Kawale, Bharti L. Dhote

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016

Pages: 1345 - 1350

Security Methods for Privacy Preserving and Data Sharing Over Cloud Computing and Big Data Frameworks

Kapilesh S. Swami, Dr. P Sai Kiran

Share this Article

Similar Articles with Keyword 'Segmentation'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1615 - 1620

Traffic Sign Detection via Graph Based Ranking and Segmentation Algorithm

Premsai Cheedella

Share this Article

Research Paper, Computer Science & Engineering, China, Volume 10 Issue 1, January 2021

Pages: 1165 - 1168

A Capsule Robot Attitude Transformation Perception Method based on Intestinal Fold Features

Chengcheng Yan, Yanping Hu

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1624 - 1627

Video Segmentation Using Global Motion Estimation and Compensation

Pallavi R. Wagh, Shubhangi Vaikole

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2357 - 2361

An Efficient Coin Recognition Technique using Rotational Invariance Approach

Nikita N Shelgikar, Prof. L. M. R. J Lobo

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1702 - 1705

An Adaptive Recursive Reconstruction Technique for Segmentation of Images

Peram Nagamani, Gunna Kishore

Share this Article

Similar Articles with Keyword 'Key'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 886 - 889

Survey on Algorithms Predicting Performance of Keyword Queries

Snehal Borole

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 823 - 826

Survey Paper on Users Location Hiding In Geosocial Recommendation Applications

Mayura Phadnis, Kanchan Varpe

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2253 - 2256

Survey on Hubness - Based Clustering Algorithms

Nikita Dhamal, Antara Bhatttacharya

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1028 - 1031

Secure and Efficient Item Information Retrieval in Cloud Computing

Dr. Shameem Akther, Tahseen Begum

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2394 - 2397

Multilayered Security Approach for Cloud Data Centers using Hash Functions

Jashanpreet Pal Kaur, Rajbhupinder Kaur

Share this Article
Top