Image Encryption Technique Based on Permutation and Combination

Combination of encryption and decryption for secure communication is an application. Here, the authors are using permutation and substitution technique to make the people’s data more secure. It is concerned in hiding the information in secure and robust manner so that the confidentiality of the data remains. This paper also attempts to identify the requirement of good key generation algorithm and its decryption. This allows the user to choose whether or not they want to encrypt the data and have it password protected and the type of algorithm to use for encryption.

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Resource Details

Provided by:
International Journal of Computer Science and Mobile Computing (IJCSMC)
Topic:
Security
Format:
PDF