2012
DOI: 10.5120/5654-7543
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Approach for Image Encryption by New M Box Encryption Algorithm using Block based Transformation along with Shuffle Operation

Abstract: In the present brutal competitive world, security is prime factor to transmit confidential data over the internet. Cryptographic algorithms play very important role in providing the data security against the various attacks. The specific characteristics of image, like high transmission rate with limited bandwidth, correlation among pixels, redundancy and requirement of high storage capacity makes traditional algorithms unsuitable for image encryption. To cross these boundaries for real time applications, desig… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 15 publications
0
6
0
Order By: Relevance
“…It is called symmetric key cryptography. [10]. Some commonly used algorithms are-AES, DES, IDEA, RC2, BLOWFISH.…”
Section: Authentication Protocolsmentioning
confidence: 99%
See 2 more Smart Citations
“…It is called symmetric key cryptography. [10]. Some commonly used algorithms are-AES, DES, IDEA, RC2, BLOWFISH.…”
Section: Authentication Protocolsmentioning
confidence: 99%
“…A public key is used to encrypt the message at sender's end and a private key is used to decrypt the message at receiver's end. For the same message, two different keys will generate two different cipher texts [10]. It is called asymmetric key cryptography.…”
Section: Authentication Protocolsmentioning
confidence: 99%
See 1 more Smart Citation
“…is the estimation of mathematical expectations of x, and D(x) is the estimation of variance of x, and also Cov(x,y) is the estimation of covariance between x and y. In addition, x and y are grey scale values of two adjacent pixels in the image [30,33]. that w and h are the width and height of or .…”
Section:  Correlation Coefficient Analysismentioning
confidence: 99%
“…However, the decipher phase suffers from difficulties in extracting the original image. Meanwhile, Pandey et al [19] demonstrated a block-based transformation algorithm by combining the image conversion with BA. The original image divided into blocks and rearranged into a transformed image.…”
Section: Introductionmentioning
confidence: 99%