Loading

A Review: Image Encryption Techniques and its Terminologies
Ambika Oad1, Himanshu Yadav2, Anurag Jain3
1Ambika Oad, CSE Department, RITS, Bhopal, India.
2Himanshu Yadav, CSE Department, RITS, Bhopal, India.
3Anurag Jain, CSE Department, RITS, Bhopal, India.
Manuscript received on March 22, 2014. | Revised Manuscript received on April 14, 2014. | Manuscript published on April 30, 2014. | PP: 373-376  | Volume-3, Issue-4, April 2014. | Retrieval Number:  D2998043414/2013©BEIESP

Open Access | Ethics and Policies | Cite
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In today’s environment, security becomes an important issue in communication. For secure transmission of data in open network, encryption is very important methodology. Though encryption we can prevent our data from unauthorized access during transmission. In recent years many image encryption methods have been proposed and used to protect confidential data. In this paper, we survey on existing work which is used different techniques for image encryption and we also give general introduction about cryptography.
Keywords: Cryptography, Image Encryption, Decryption, Security.