ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Review on Various Encryption Techniques and Quality Metrics for Images

Journal: International Journal for Modern Trends in Science and Technology (IJMTST) (Vol.3, No. 7)

Publication Date:

Authors : ; ;

Page : 72-76

Keywords : IJMTST; ISSN:2455-3778;

Source : Downloadexternal Find it from : Google Scholarexternal


In the competitive modern world, the entire transactions and communications are converted into electrically. Off course all transactions are being done with in a period of time to decrease the man power process. One important and hectic thing is needed here to enhance the perfect transaction is called as “security”. Recent day's security assumes an essential part for whole electrical exchanges. For, most of the online business, interaction between websites and servers uses cryptography concepts to maintain their secrets in secured manner. In cryptography, lot algorithms were designed for working with text, image as well as video. These types of cryptographic encryption algorithms are entirely working against hacker's knowledge. Encryption techniques are considered by two varieties that are, public and private. The main difference between public and private algorithm is, in public system, need 3000 bit key to achieve the same level of security of a 128 bit private system. Asymmetric algorithms are incredibly slow and it is impractical to us them to encrypt large amounts of data. Symmetric algorithms are about 1000 times faster than Asymmetric ones. This article shows the collection of encryption techniques particularly for image and evaluates these techniques based on the performance metrics.

Last modified: 2017-07-29 01:05:51