Implementation of Image Cryptography Algorithms: A Review
||International Journal of Computer & Organization Trends (IJCOT)||
|© 2013 by IJCOT Journal|
|Year of Publication : 2013|
|Authors : Harpreet Singh , Dr.Naveen Dhillon , Sukhpreet Singh Bains|
Harpreet Singh , Dr.Naveen Dhillon , Sukhpreet Singh Bains . "Implementation of Image Cryptography Algorithms: A Reviews " . International Journal of Computer & organization Trends (IJCOT), V3(5):59-61 Sep - Oct 2013, ISSN 2249-2593, www.ijcotjournal.org. Published by Seventh Sense Research Group.
Cryptography techniques plays important role in image security systems in communication. There are many cryptographic algorithms are used to protect or hide confidential data from unauthorized access. Encryption is used to protect data in networks in unreadable form. On the other way, Decryption is used to access unreadable form to original form. This paper consists of comparison between four most common Encryption/Decryption algorithms: DES, 3DES, AES AND BLOWFISH in terms of showing these parameters: block size, correlation, entropy values, key size, rounds, time consumption and throughput of algorithms. The results show that Blowfish algorithm is more suitable than other algorithms for protection of confidential data.
 Image Encryption and Decryption using blowfish algorithm, World Journal of Science and Technology, Pg: 151-156.
 A Modified Approach for Symmetric Key Cryptography based on Blowfish Algorithm, Volume-1, Issue-6, and Pg: 79-82.
 A study of New Trends in Blowfish Algorithm, Volume-1, Issue-2, Pg: 321-326.
 Privacy and Authentication: An Introduction to Cryptography, proceeding of the IEEE, Volume- 67, Number-3.
 Image Security using Encryption based Algorithm, International Conference on Trends in Electrical, Electronics and Power Engineering (ICTEEP), Pg: 110-112.
 A New Encryption Algorithm for Image Cryptosystems, The Journal of Systems and Software, Pg: 83-91.
 Introduction to Cryptography, IEEE, Pg: 144-146.
 Encryption and Decryption of Digital Image using Color Signal, Volume-9, Number-2, Pg: 588-591.
Cryptography, Image Encryption, Cipher, Blowfish