
handle: 20.500.12678/0000004070
Encryption is used to securely transmit data in open network. Each type of data has its own features, therefore different techniques should be used to protect confidential image data from unauthorized access. Most of the available encryption algorithms are mainly used for textual data and may not be suitable for multimedia data. Cryptographic algorithms is divided into symmetric key algorithm and asymmetric key algorithm.. The Ronal Rivest symmetric key algorithm (RC4) is a fast stream cipher with variable keylengths I to 256 bytes (8 to 2948 bits). Integrity check algorithm (CRC32) is a hash function to detect raw data. In this proposed system, we use Ronald Rivest symmetric key algorithm (RC4) for confidentiality and Integrity Check Algorithm (CRC32) for integrity for any format data such as text, image, sound, video and so on.
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
