An Efficient Schema of a Special Permutation Inside of Each Pixel of an Image for its Encryption
The developments of communications and digital transmissions have pushed the data encryption to grow quickly to protect the information, against any hacking or digital plagiarisms. Many encryption algorithms are available on the Internet, but it's still illegal to use a number of them. Therefor...
Saved in:
Main Authors: | Ali-Pacha, Hana (Author), Hadj-Said, Naima (Author), Ali-Pacha, Adda (Author), Mamat, Mustafa (Author), Mohamed, Mohamad Afendee (Author) |
---|---|
Format: | EJournal Article |
Published: |
Institute of Advanced Engineering and Science,
2018-08-01.
|
Subjects: | |
Online Access: | Get fulltext |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
New Binary Code Combined with New Chaotic Map and Gold Code to Ameliorate the Quality of the Transmission
by: Krim, Mohamed, et al.
Published: (2017) -
New Approach of the Playfair's Cipher with A Numerical Value of the Keyword
by: Merzoug, Assia, et al.
Published: (2017) -
Key exchange based on Diffie-Hellman protocol and image registration
by: Rimani, Rachid, et al.
Published: (2021) -
Implementation of a bit permutation-based advanced encryption standard for securing text and image files
by: Gamido, Heidilyn V
Published: (2020) -
A multi-levels RNG permutation
by: Abdulsadah, Ammar Khaleel, et al.
Published: (2020)