<?xml version="1.0" encoding="utf-8"?><!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2d1 20170631//EN" "JATS-journalpublishing1.dtd">
<ArticleSet>
  <Article>
    <Journal>
      <PublisherName>IJIRCSTJournal</PublisherName>
      <JournalTitle>International Journal of Innovative Research in Computer Science and Technology</JournalTitle>
      <PISSN>I</PISSN>
      <EISSN>S</EISSN>
      <Volume-Issue>Volume 3 Issue 3</Volume-Issue>
      <PartNumber/>
      <IssueTopic>communication and network technology</IssueTopic>
      <IssueLanguage>English</IssueLanguage>
      <Season>May - June 2015</Season>
      <SpecialIssue>N</SpecialIssue>
      <SupplementaryIssue>N</SupplementaryIssue>
      <IssueOA>Y</IssueOA>
      <PubDate>
        <Year>2019</Year>
        <Month>11</Month>
        <Day>30</Day>
      </PubDate>
      <ArticleType>Computer Sciences</ArticleType>
      <ArticleTitle>IMAGE ENCRYPTION USING HILBERT SPACE FILLING CURVE AND HENON MAP</ArticleTitle>
      <SubTitle/>
      <ArticleLanguage>English</ArticleLanguage>
      <ArticleOA>Y</ArticleOA>
      <FirstPage>56</FirstPage>
      <LastPage>60</LastPage>
      <AuthorList>
        <Author>
          <FirstName>Kavya. K. S</FirstName>          
          <AuthorLanguage>English</AuthorLanguage>
          <Affiliation/>
          <CorrespondingAuthor>Y</CorrespondingAuthor>
          <ORCID/>
                      <FirstName>Mrs.Prabavathi</FirstName>          
          <AuthorLanguage>English</AuthorLanguage>
          <Affiliation/>
          <CorrespondingAuthor>N</CorrespondingAuthor>
          <ORCID/>
           
        </Author>
      </AuthorList>
      <DOI></DOI>
      <Abstract>A proficient but a simple selective image encryption method is suggested based on Hilbert space filling curve, Region of interest, non-linear chaotic map. The main essence of the suggested scheme is to change the pixel positions of an image via Hilbert space filling curve in a way that it cannot be accessed by unauthorized persons followed by choosing significant region via Region of interest method. Next diffusion process is carried out on the selected significant region by a secret image key procured from nonlinear chaotic map. At last, a suitable decryption method is suggested to form original image from the encrypted image. Analysis and experimental results indicates that the suggested method can succeed many goal of selective encryption and is reckoning safe.</Abstract>
      <AbstractLanguage>English</AbstractLanguage>
      <Keywords>Region of interest, Selective encryption, Space filling curve,</Keywords>
      <URLs>
        <Abstract>https://ijircst.org/abstract.php?article_id=199</Abstract>
      </URLs>      
    </Journal>
  </Article>
</ArticleSet>