{"title":"图像加密技术的回报:定量研究","authors":"S. Stalin, P. Maheshwary, P. Shukla","doi":"10.1109/ICCS45141.2019.9065762","DOIUrl":null,"url":null,"abstract":"Recently, it is one of the concerns to protect multimedia applications with storage of images being an important security issue. The process used to encrypt data and protect these multimedia applications is encryption. Present cryptography provides crucial techniques in order to secure information and these encryption techniques are utilized for protection of private data from the unauthorized user. In this paper, literature reviews based mostly upon numerous secret writing techniques are explained and also the poll taker are going to be ready to get a plan for competent technique to be used.","PeriodicalId":433980,"journal":{"name":"2019 International Conference on Intelligent Computing and Control Systems (ICCS)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Payback of Image Encryption Techniques: A Quantitative Investigation\",\"authors\":\"S. Stalin, P. Maheshwary, P. Shukla\",\"doi\":\"10.1109/ICCS45141.2019.9065762\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recently, it is one of the concerns to protect multimedia applications with storage of images being an important security issue. The process used to encrypt data and protect these multimedia applications is encryption. Present cryptography provides crucial techniques in order to secure information and these encryption techniques are utilized for protection of private data from the unauthorized user. In this paper, literature reviews based mostly upon numerous secret writing techniques are explained and also the poll taker are going to be ready to get a plan for competent technique to be used.\",\"PeriodicalId\":433980,\"journal\":{\"name\":\"2019 International Conference on Intelligent Computing and Control Systems (ICCS)\",\"volume\":\"98 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 International Conference on Intelligent Computing and Control Systems (ICCS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCS45141.2019.9065762\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Intelligent Computing and Control Systems (ICCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCS45141.2019.9065762","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Payback of Image Encryption Techniques: A Quantitative Investigation
Recently, it is one of the concerns to protect multimedia applications with storage of images being an important security issue. The process used to encrypt data and protect these multimedia applications is encryption. Present cryptography provides crucial techniques in order to secure information and these encryption techniques are utilized for protection of private data from the unauthorized user. In this paper, literature reviews based mostly upon numerous secret writing techniques are explained and also the poll taker are going to be ready to get a plan for competent technique to be used.