International Journal of Computer Applications
In this paper, the authors are explaining the management of security. This will allow users authorization and integrity, accuracy and images security circulating on the internet. Addition to that, more effort is required for an image-based data in the process of encrypting and decrypting the image. Proposed architecture facilities for encrypting and decrypting an image using the suitable key and is designed to work for the same purpose. In this paper, they present a strategy for the new permutations based on a combination of different blocks of pixels and the symmetric encryption algorithm newly developed called "Image symmetric encryption based on block displacement".