An Overview of Crypto-Compressive Based on Selective Coding
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 123 | Monthly Hits: ⮙5

Survey Paper | Computer Science & Engineering | Iraq | Volume 6 Issue 7, July 2017

An Overview of Crypto-Compressive Based on Selective Coding

Enas Kh Alamiry, Faisal G. Mohammed

Image encoding (visual cryptography) is special encryption technique to hide the information contained within an image. In such a way it cant be decrypted or recognized by neither human visual system (HVS) nor cryptanalysis algorithms. Partial image encryption have become very popular due to rapid evolution in information technology and visual communications over open networks, it is considered crucial to real time applications that need to be very fast and entirely secured, where the digital data must kept intact from eavesdroppers and unauthorized access. Most of todays techniques encrypt all of the image data which consumes tremendous amount of time and computational payload. This paper introduces the image Encryption strategy along with its main categories (full and partial encryption), partial Encryption sub-categories, and the leading schemes proposed for Partial Image Encryption (PIE) that only apply the encryption algorithm to merely a portion of the image data which produces huge reduction in processing time and computational Complexity

Keywords: Partial Encryption, Selective Encryption, Cryptography, Image Scrambling

Edition: Volume 6 Issue 7, July 2017

Pages: 2178 - 2182

Share this Article

How to Cite this Article?

Enas Kh Alamiry, Faisal G. Mohammed, "An Overview of Crypto-Compressive Based on Selective Coding", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20175749, Volume 6 Issue 7, July 2017, 2178 - 2182

Enter Your Email Address and Click Download Button





Similar Articles with Keyword 'Partial Encryption'

Downloads: 109 | Weekly Hits: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1037 - 1039

Survey on Wavelet Based Image Encryption and Decryption

Manju Lakshmi, Smita C Thomas, Sreelakshmi K

Share this Article

Downloads: 123 | Monthly Hits: ⮙5

Survey Paper, Computer Science & Engineering, Iraq, Volume 6 Issue 7, July 2017

Pages: 2178 - 2182

An Overview of Crypto-Compressive Based on Selective Coding

Enas Kh Alamiry, Faisal G. Mohammed

Share this Article

Similar Articles with Keyword 'Selective Encryption'

Downloads: 107 | Weekly Hits: ⮙3 | Monthly Hits: ⮙9

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1435 - 1439

Review on Encryption Techniques in Multimedia Data

Ashwini G. Kamble, Prof. Nikita J. Kulkarni

Share this Article

Downloads: 108 | Monthly Hits: ⮙9

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1844 - 1847

A Providing Security on Cloud Data Hadoop using Symmetric Encryption and Identity Authentication

Kale Rohitkumar Bhausaheb, R.L.Paikrao

Share this Article

Downloads: 109 | Weekly Hits: ⮙4 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1598 - 1601

A Novel Approach to Improve the Privacy of Information Brokering in Semantic Web

Supriya S. Sankpal, Rupali A. Mahajan

Share this Article

Downloads: 123 | Monthly Hits: ⮙5

Survey Paper, Computer Science & Engineering, Iraq, Volume 6 Issue 7, July 2017

Pages: 2178 - 2182

An Overview of Crypto-Compressive Based on Selective Coding

Enas Kh Alamiry, Faisal G. Mohammed

Share this Article

Similar Articles with Keyword 'Cryptography'

Downloads: 8 | Monthly Hits: ⮙8

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article

Downloads: 91 | Weekly Hits: ⮙4 | Monthly Hits: ⮙16

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Downloads: 93 | Weekly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Downloads: 99 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2394 - 2397

Multilayered Security Approach for Cloud Data Centers using Hash Functions

Jashanpreet Pal Kaur, Rajbhupinder Kaur

Share this Article

Downloads: 101 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

Similar Articles with Keyword 'Image Scrambling'

Downloads: 121 | Weekly Hits: ⮙4 | Monthly Hits: ⮙13

Research Paper, Computer Science & Engineering, Iraq, Volume 3 Issue 6, June 2014

Pages: 2004 - 2009

Image Encryption Based on Pixel Shuffling with 3D Chaotic System

Asia Mahdi Naser Alzubaidi

Share this Article

Downloads: 123 | Monthly Hits: ⮙5

Survey Paper, Computer Science & Engineering, Iraq, Volume 6 Issue 7, July 2017

Pages: 2178 - 2182

An Overview of Crypto-Compressive Based on Selective Coding

Enas Kh Alamiry, Faisal G. Mohammed

Share this Article

Downloads: 133 | Weekly Hits: ⮙4 | Monthly Hits: ⮙17

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 813 - 818

A Comprehensive Survey on Image Scrambling Techniques

Prarthana Madan Modak, Dr. Vijaykumar Pawar

Share this Article



Top