A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Survey on Efficient, Low-power, AES Image Encryption and Bio-cryptography Schemes
2012
The Smart Computing Review
Data protection from attackers has become essential now-a-days. This protection can be achieved using encryption. There are many encryption standards available. There are different techniques available to achieve high speed and low power, and to increase security. This paper focuses mainly on the different methods of encryption techniques that are available and presents a comparative survey of all the implementation techniques. It also provides information about the various methods for image
doi:10.6029/smartcr.2012.06.001
fatcat:zcxbrg6bnnhh5gopupeoonqz6y