Comparison of Encryption Levels for Image Security Using Various Transforms

被引:0
|
作者
Sumathy, K. [1 ]
Tamilselvi, R. [1 ]
机构
[1] RMK Engn Coll, Madras, Tamil Nadu, India
来源
关键词
Key Generation; DCT; DWT; Encryption; correlation coefficient;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In recent trends, information security is becoming more important in data storage and transmission. Therefore, the protection of information from unauthorized access is important. Image encryption plays a significant role in the field of information security. Several security Algorithms are existing for safer transmission of data. In this paper a new encryption method is developed and a comparison is done by transforming images using DCT, DWT and DCT with DWT. Various parameters are analyzed for comparison of encrypting levels.
引用
收藏
页码:244 / 248
页数:5
相关论文
共 50 条
  • [1] Image Encryption using Various Transforms-A Brief Comparative Analysis
    Agrawal, Hemlata
    Kalot, Dimple
    Jain, Ankita
    Kahtri, Narendra
    [J]. 2014 ANNUAL INTERNATIONAL CONFERENCE ON EMERGING RESEARCH AREAS: MAGNETICS, MACHINES AND DRIVES (AICERA/ICMMD), 2014,
  • [2] Radon Transforms and Chaotic Mask Based Image Encryption for Information Security
    Jha, Avinash Kumar
    Ambadiyil, Sajan
    Shekhar, Himanshu
    [J]. ADVANCES IN OPTICAL SCIENCE AND ENGINEERING, 2017, 194 : 327 - 334
  • [3] Image Security using Image Encryption and Image Stitching
    Kankonkar, Jyoti T. G.
    Naik, Nitesh
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC), 2017, : 151 - 154
  • [4] Optical image encryption using improper Hartley transforms and chaos
    Singh, Narendra
    Sinha, Aloka
    [J]. OPTIK, 2010, 121 (10): : 918 - 925
  • [5] Introducing real-time image encryption technology using key vault, various transforms, and phase masks
    Yadav, Poonam
    Singh, Hukum
    Khanna, Kavita
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (25) : 39099 - 39117
  • [6] Introducing real-time image encryption technology using key vault, various transforms, and phase masks
    Poonam Yadav
    Hukum Singh
    Kavita Khanna
    [J]. Multimedia Tools and Applications, 2023, 82 : 39099 - 39117
  • [7] MIXED FOURIER TRANSFORMS AND IMAGE ENCRYPTION
    Du, Nan
    Devineni, Sree
    Grigoryan, Artyom M.
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC 2009), VOLS 1-9, 2009, : 547 - 552
  • [8] Optical image encryption with Hartley transforms
    Chen, Linfei
    Zhao, Daomu
    [J]. OPTICS LETTERS, 2006, 31 (23) : 3438 - 3440
  • [9] Chaos based multiple image encryption using multiple canonical transforms
    Singh, Narendra
    Sinha, Aloka
    [J]. OPTICS AND LASER TECHNOLOGY, 2010, 42 (05): : 724 - 731
  • [10] Joint image compression-encryption using discrete fractional transforms
    Jindal, N.
    Singh, K.
    [J]. IMAGING SCIENCE JOURNAL, 2014, 62 (05): : 265 - 272