Avinash Ray, A. Potnis, Prashant Dwivedy, Shahbaz Soofi, Uday Bhade
{"title":"Comparative study of AES, RSA, genetic, affine transform with XOR operation, and watermarking for image encryption","authors":"Avinash Ray, A. Potnis, Prashant Dwivedy, Shahbaz Soofi, Uday Bhade","doi":"10.1109/RISE.2017.8378166","DOIUrl":null,"url":null,"abstract":"In present scenario whole world is moving towards digital communication for fast and better communication. But in this a problem arises with security i.e. when we have to transmit information (either data or image) over internet or to store information at any random location then its security is very important. To protect our information from hackers we use a technique i.e. Encryption. In this paper we use image as information and use different types of encryption techniques to encrypt it and protect it from hackers. After that we find various parameters from each image encryption technique and then compare each technique's parameters from one another. After that we search for the best result and then proceed forward with that technique for future scope.","PeriodicalId":166244,"journal":{"name":"2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"17","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RISE.2017.8378166","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 17
Abstract
In present scenario whole world is moving towards digital communication for fast and better communication. But in this a problem arises with security i.e. when we have to transmit information (either data or image) over internet or to store information at any random location then its security is very important. To protect our information from hackers we use a technique i.e. Encryption. In this paper we use image as information and use different types of encryption techniques to encrypt it and protect it from hackers. After that we find various parameters from each image encryption technique and then compare each technique's parameters from one another. After that we search for the best result and then proceed forward with that technique for future scope.