Secure Sharing of Documents using Image Encryption and Key Image

  • et al.
N/ACitations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This Paper Presents Two Strategies For Encryption And Decryption Of Pictures Utilizing Xor Activity. The First Picture Is Encoded By The Key Picture Utilizing The Xor Activity And The Decoding Procedure Likewise Utilizes A Similar Key Picture With Xor Activity Is Done In The Primary Technique. In The Second Strategy One Of The Bit Planes, Rgb Technique, Filter Strategy For The Key Picture Is Utilized For Encoding The First Picture And Rearranging Is Accomplished For Getting The Scrambled Picture. This Technique Additionally Utilizes Xor Activity The Two Strategies Utilize A Picture Of A Similar Size As The Key For Scrambling The First Picture. Trials Have Demonstrated That The Two Calculations Are Appropriate For 2d Just As 3d Pictures. In The Matlab Condition, These Calculations Are Actualized And Tried On Different Pictures That Have Indicated Great Outcomes. For Scrambling Different Pictures These Strategies Are Likewise Utilized.

Cite

CITATION STYLE

APA

Archana*, N., Manogna, S., … Razia, Dr. Sk. (2019). Secure Sharing of Documents using Image Encryption and Key Image. International Journal of Recent Technology and Engineering (IJRTE), 8(4), 9415–9419. https://doi.org/10.35940/ijrte.d9724.118419

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free