A Study on Different Techniques for Security of an Image
Parameshachari B D1, K M Sunjiv Soyjaudah2, Chaitanyakumar M V3
1Parameshachai B D, Department of Electronics and Communication Engineering, JSS Academy of Technical Education, Vacoas, Mauritius. Africa, (Research Scholar, Jain University, Bangalore). Bangalore (Karnataka), India
2Dr. K. M. Sunjiv Soyjaudah, Professor, Department of Electrical & Electronic Engineering, University of Mauritius, Reduit, Mauritius. Africa.
3Dr.Chaitanyakumar M V, Principal & Professor, Department of Electronics and Communication Engineering, Bearys Institute of Technology, Mangalore, India.
Manuscript received on 21 January 2013 | Revised Manuscript received on 28 January 2013 | Manuscript published on 30 January 2013 | PP: 14-19 | Volume-1 Issue-6, January 2013 | Retrieval Number: F0389021613/2013©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: With the rapid development of various multimedia technologies, more and more multimedia data are generated and transmitted in the medical, commercial, and military fields, which may include some sensitive information which should not be accessed by or can only be partially exposed to the general users. Therefore, security and privacy has become an important. Over the last few years several encryption algorithms have applied to secure image transmission. This paper is a review on the aspects and approaches of design an image cryptosystem. First a general introduction given for cryptography and images encryption and followed by different techniques in image encryption and related works for each technique surveyed. Finally, general security analysis methods for encrypted images are mentioned.
Keywords: Analysis, Cryptography, Encryption, Image, Image Transmission, Security.
Scope of the Article: Image Processing