Open Access Open Access  Restricted Access Subscription or Fee Access

A Novel Technique Reduce Image Encryption And Decryption Time With Using Parallel Processing

Chauhan E.


Electronic commerce commonly known as e-commerce, trade in products using the internet. Security at the e-commerce becomes more and more important. For example, if you pay through the internet you want to be sure, that nobody can get your payment information. To prevent the misuse of personal data in the field of online banking. Public key biometric identification is a sequence of bytes used to authenticate, biometric identifications are built by assigning a cryptographic hash function to a public key. Since, biometric identifications are lower than the keys they refer to, they can be used to disentangle certain key management functions. In this paper, we have proposed a new algorithm to make an e-commerce transaction more secure. In our work, we are using AES to encrypt data and this data is embedded to image edges to perform steganography. This paper targets on compress at the time of encryption and decryption adopting parallel processing on which AES will be applied freely.

Keywords: AES, e-commerce, steganography, algorithm, encryption and decryption

Cite this Article
Chauhan E. A Novel Technique Reduce Image Encryption And Decryption Time With Using Parallel Processing. E - Commerce for Future and Trends. 2015; 2(3): 27–34p.

Full Text:



Bhatnager et al. On risk, convenience, and internet shopping behaviour. Communications of the ACM. Nov 2000; 43; 98–106p.

Caldwell K. Global electronic commerce-moving forward. Commerce Net: The Public Policy Report, Dec 2000; 2: 2–17p.

Adams C and Lloyd S. Understanding Public-key Infrastructure: Concepts, Standards, and Deployment Considerations. New riders, Indianapolis: Macmillan, 1999.

Mohamed et al. Information hiding using steganography. Telecommunication Technology. 2003; NCTT 2003 Proceedings of 4th National Conference on IEEE, 2003.

Channalli S, Jadhav A. Steganography An Art of Hiding Data. International Journal on Computer Science and Engineering. 2009; 1(3): 137–141p.

Niranjanamurthy M, Dharmendra C. The study of e-commerce security issues and solutions. International Journal of Advanced Research in Computer and Communication Engineering. July 2013; 2(7): copyright © to IJARCCE 2885.

Tayana et al. An overview of image steganography, ISSA. 2005.

Chung YY, Xu FF. Development of video watermarking for MPEG2 video. City University of Hong Kong, IEEE 2006.

Friedman et al. Trust Online. Communications of the ACM. Dec 2000; 43: 34–40p.

Kahate A. Cryptography and Network Security. Tata McGraw-Hill Companies, 2008.

Giff S. The influence of metaphor, smart cards, and interface dialogue on trust in ecommerce. M.Sc project, University College London, 2000.

Stallings W. Network Security Essentials (Applications and Standards). Pearson Education, 2004.

Farrell et al. A study on consumer fears and trust in internet based electronic commerce. In Proceedings of 13th International Bled Electronic Commerce Conference. June 2000; 647–658p.

Goyal S. A Survey on the Applications of Cryptography. International Journal of Science and Technology. Mar 2012; 1(3): 137–140p.

Donovan A. Digital steganography: hiding data within data. Internet Computing IEEE. 2001; 5(3): 75–80p.

Goyal S. A Survey on the Applications of Cryptography. International Journal of Science and Technology. IJST. 1(3): Mar 2012; 137–140p.

Garg P and Dilawari JS. A Review Paper on Cryptography and Significance of Key Length. International Journal of Computer Science and Communication Engineering. IJCSCE Special issue on Emerging Trends in Engineering ICETIE, 2012; 88–91p.

Mitali, Kumar V, Sharma A et al. A Survey on Various Cryptography Techniques. International Journal of Emerging Trends & Technology in Computer Science (IJETTCS). Website:, E-mail: [email protected]. Jul-Aug 2014; 3(4): 307–312p.

Oad A, Yadav H, Jain A et al. A Review: Image Encryption Techniques and its Terminologies. International Journal of Engineering and Advanced Technology (IJEAT). ISSN: 2249–8958, Apr 2014; 3(4): 373–376p.

Nivedhitha R and Meyyappan. Image Security Using Steganography And Cryptographic Techniques. International Journal of Engineering Trends and Technology. 2012; 3(3): 366–371p.

Sharma et al. Secure Image Hiding Algorithm using Cryptography and Steganography. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p-ISSN: 2278-8727. 13(5): (Jul-Aug 2013), 01–06p.


  • There are currently no refbacks.

This site has been shifted to