Secure Sharing of Documents using Image Encryption and Key Image
N.Archana1, S.Manogna2, Mohammed Ali Hussain3, Sk. Razia4
1N.Archana, B. Tech, Departement of Ecm, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur Dist., A.P., India.
2S.Manogna, B.Tech, Department of Ecm, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur Dist., A.P., India.
3Dr.Md Ali Hussain, Professor, Department of Ecm, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur Dist., A.P., India.
4Dr. Sk. Razia, Assoc. Professor, Department of Computer Science Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur Dist., A.P., India.

Manuscript received on November 19, 2019. | Revised Manuscript received on November 29 2019. | Manuscript published on 30 November, 2019. | PP: 9415-9419 | Volume-8 Issue-4, November 2019. | Retrieval Number: D9724118419/2019©BEIESP | DOI: 10.35940/ijrte.D9724.118419

Open Access | Ethics and Policies | Cite  | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: This Paper Presents Two Strategies For Encryption And Decryption Of Pictures Utilizing Xor Activity. The First Picture Is Encoded By The Key Picture Utilizing The Xor Activity And The Decoding Procedure Likewise Utilizes A Similar Key Picture With Xor Activity Is Done In The Primary Technique. In The Second Strategy One Of The Bit Planes, Rgb Technique, Filter Strategy For The Key Picture Is Utilized For Encoding The First Picture And Rearranging Is Accomplished For Getting The Scrambled Picture. This Technique Additionally Utilizes Xor Activity The Two Strategies Utilize A Picture Of A Similar Size As The Key For Scrambling The First Picture. Trials Have Demonstrated That The Two Calculations Are Appropriate For 2d Just As 3d Pictures. In The Matlab Condition, These Calculations Are Actualized And Tried On Different Pictures That Have Indicated Great Outcomes. For Scrambling Different Pictures These Strategies Are Likewise Utilized.
Keywords: Image Encryption, Image Decryption, Bit Plane, Rgb, Scan Xor Activity, Key Picture.
Scope of the Article: Image Security.