IJSER Home >> Journal >> IJSER
International Journal of Scientific and Engineering Research
ISSN Online 2229-5518
ISSN Print: 2229-5518 11    
Website: http://www.ijser.org
scirp IJSER >> Volume 3,Issue 11,November 2012
Level by Level Image Based Data Security Approach
Full Text(PDF, )  PP.258-262  
Deepak Gupta, Shikha Gupta, Ranjeet Kumar Singh, Abhisek Gour
Cryptography, Steganography, Scrambling
Now-a-days, digital communication is part of every computing system. As the usage is increasing in every aspect of data transfer and sharing; so is the threat of information stealing and security. Data Security over the public network is the major concern
[1] Musheer ahmed and M. shamsher Alam,”A new Algorithm of Encryption and decryption of Images Using Chaotic Mapping”,Musheer Ahmed et al/international Journal on Computer Science and Engineering,Vol2(1),2009,46-50

[2] Menezes, P. van Oorschot, and S. Vanstonen, Handbook of Applied Cryptography, 5th ed. CRC Press, 2001, ch.1, pp 4.

[3] Dhananjay K. Theckedath, “Image Processing using MATLAB codes”.

[4] Y.B. Mao,G. Chen. S.G. Lian,”A novel fast image Encryption scheme based on the 3D chaotic baker map,”Int. j. Bifurcate Chaos, vol. 14,pp.3613-3624,2004

[5] Yas A. Alsultanny,”Image encryption by cipher feedback mode”, ICIC International Journal vol.3,589-596

[6] S.K. Panigrahy,B.Achraya,and D.jena,”Image Encryption using self-Invertible Key Matrix o Hill Cipher Algorithm,”1st International Conference on Advances in Computing ,Chikhli,India,21-22February 2008

[7] I.Qzturk and I.Sogupinar, “Analysis and Comparison of Image Encryption Algorithms”, International Journal of Information Tec.

[8] Chin-Chen Chang, Min-Shian Hawang, tung-shou Chen, “A New Encryption Algorithm for Image Cryptosystems”, The Journal of Systems and Software 58(2001),83-91

[9] Piyush Marwaha and Paresh Marwaha, “Visual Cryptographic Steganography in Images”, Infosys Technologies Limited, India.

[10] A.Mitra,Y V.Subba Rao,and S.R.M. Prasnna, “A new Image encryption approach using combinational permutation techniques”, Journal of Computer Science,Vol.1,no.1,2006,p.127

[11] A.Sinha, K.Singh, “A technique foe image encryption using digital signature”, Optics Communications,2003,pp. 1-6

[12] S.S. Maniccam, N.G. Bourbakis, “Lossles Image Compression and Encryption using SCAN,” Pattern Recognization, vol. 34,2001, pp.229-1245

[13] Arvind Kumar and Km. Pooja, “Steganography- A Data Hiding Technique”, International Journal of Computer Applications, vol. 9, No. 7, November 2010

[14] Hanbo Sun, “Exploring the internal structure of a 24-bit Uncompressed Bitmap File”. Available: http://www.codeguru.com.

[15] Rafael C.Gonzalez and Richard E.Woods, Digital Image Processing, 3th ed. Addison-Wesley, 1992.

Untitled Page