Submit Search
Upload
Colour Based Cryptography
•
0 likes
•
43 views
IRJET Journal
Follow
https://irjet.net/archives/V4/i1/IRJET-V4I1278.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
Color Cryptography using Substitution Method
Color Cryptography using Substitution Method
ijtsrd
Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on Android
IRJET Journal
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
IJCSIS Research Publications
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel Encryption
IJERA Editor
Analysis of a hybrid cipher algorithm
Analysis of a hybrid cipher algorithm
Tharindu Weerasinghe
A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images
IJECEIAES
Text Steganography Using Compression and Random Number Generators
Text Steganography Using Compression and Random Number Generators
Editor IJCATR
Genetic Algorithm Based Cryptographic Approach using Karnatic Music
Genetic Algorithm Based Cryptographic Approach using Karnatic Music
IRJET Journal
Recommended
Color Cryptography using Substitution Method
Color Cryptography using Substitution Method
ijtsrd
Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on Android
IRJET Journal
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
IJCSIS Research Publications
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel Encryption
IJERA Editor
Analysis of a hybrid cipher algorithm
Analysis of a hybrid cipher algorithm
Tharindu Weerasinghe
A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images
IJECEIAES
Text Steganography Using Compression and Random Number Generators
Text Steganography Using Compression and Random Number Generators
Editor IJCATR
Genetic Algorithm Based Cryptographic Approach using Karnatic Music
Genetic Algorithm Based Cryptographic Approach using Karnatic Music
IRJET Journal
A Comparative Result Analysis of Text Based Steganographic Approaches
A Comparative Result Analysis of Text Based Steganographic Approaches
iosrjce
7. manuscript edit sat
7. manuscript edit sat
IAESIJEECS
ADVANCED LSB TECHNIQUE FOR AUDIO STENOGRAPHY
ADVANCED LSB TECHNIQUE FOR AUDIO STENOGRAPHY
csandit
Ch34508510
Ch34508510
IJERA Editor
Cryptography & Steganography
Cryptography & Steganography
Animesh Shaw
B034205010
B034205010
inventionjournals
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data Decryption
IJERA Editor
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
ijsrd.com
Implementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithm
Ijcem Journal
An Enhanced Message Digest Hash Algorithm for Information Security
An Enhanced Message Digest Hash Algorithm for Information Security
paperpublications3
Implementation of hummingbird cryptographic
Implementation of hummingbird cryptographic
eSAT Publishing House
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
IRJET Journal
GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...
GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...
ijwmn
Proposed Arabic Text Steganography Method Based on New Coding Technique
Proposed Arabic Text Steganography Method Based on New Coding Technique
IJERA Editor
Image compression in digital image processing
Image compression in digital image processing
DHIVYADEVAKI
Paper id 25201451
Paper id 25201451
IJRAT
Speech encryption by multiple chaotic maps with fast fourier transform
Speech encryption by multiple chaotic maps with fast fourier transform
IJECEIAES
Partial encryption of compresed video
Partial encryption of compresed video
eSAT Publishing House
Detection of ARP Spoofing
Detection of ARP Spoofing
IRJET Journal
Ijetcas14 355
Ijetcas14 355
Iasir Journals
Color Code PIN Authentication System Using Multi-TouchTechnology
Color Code PIN Authentication System Using Multi-TouchTechnology
IRJET Journal
1.pdf
1.pdf
ssusere02009
More Related Content
What's hot
A Comparative Result Analysis of Text Based Steganographic Approaches
A Comparative Result Analysis of Text Based Steganographic Approaches
iosrjce
7. manuscript edit sat
7. manuscript edit sat
IAESIJEECS
ADVANCED LSB TECHNIQUE FOR AUDIO STENOGRAPHY
ADVANCED LSB TECHNIQUE FOR AUDIO STENOGRAPHY
csandit
Ch34508510
Ch34508510
IJERA Editor
Cryptography & Steganography
Cryptography & Steganography
Animesh Shaw
B034205010
B034205010
inventionjournals
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data Decryption
IJERA Editor
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
ijsrd.com
Implementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithm
Ijcem Journal
An Enhanced Message Digest Hash Algorithm for Information Security
An Enhanced Message Digest Hash Algorithm for Information Security
paperpublications3
Implementation of hummingbird cryptographic
Implementation of hummingbird cryptographic
eSAT Publishing House
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
IRJET Journal
GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...
GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...
ijwmn
Proposed Arabic Text Steganography Method Based on New Coding Technique
Proposed Arabic Text Steganography Method Based on New Coding Technique
IJERA Editor
Image compression in digital image processing
Image compression in digital image processing
DHIVYADEVAKI
Paper id 25201451
Paper id 25201451
IJRAT
Speech encryption by multiple chaotic maps with fast fourier transform
Speech encryption by multiple chaotic maps with fast fourier transform
IJECEIAES
Partial encryption of compresed video
Partial encryption of compresed video
eSAT Publishing House
Detection of ARP Spoofing
Detection of ARP Spoofing
IRJET Journal
What's hot
(19)
A Comparative Result Analysis of Text Based Steganographic Approaches
A Comparative Result Analysis of Text Based Steganographic Approaches
7. manuscript edit sat
7. manuscript edit sat
ADVANCED LSB TECHNIQUE FOR AUDIO STENOGRAPHY
ADVANCED LSB TECHNIQUE FOR AUDIO STENOGRAPHY
Ch34508510
Ch34508510
Cryptography & Steganography
Cryptography & Steganography
B034205010
B034205010
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data Decryption
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Implementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithm
An Enhanced Message Digest Hash Algorithm for Information Security
An Enhanced Message Digest Hash Algorithm for Information Security
Implementation of hummingbird cryptographic
Implementation of hummingbird cryptographic
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...
GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...
Proposed Arabic Text Steganography Method Based on New Coding Technique
Proposed Arabic Text Steganography Method Based on New Coding Technique
Image compression in digital image processing
Image compression in digital image processing
Paper id 25201451
Paper id 25201451
Speech encryption by multiple chaotic maps with fast fourier transform
Speech encryption by multiple chaotic maps with fast fourier transform
Partial encryption of compresed video
Partial encryption of compresed video
Detection of ARP Spoofing
Detection of ARP Spoofing
Similar to Colour Based Cryptography
Ijetcas14 355
Ijetcas14 355
Iasir Journals
Color Code PIN Authentication System Using Multi-TouchTechnology
Color Code PIN Authentication System Using Multi-TouchTechnology
IRJET Journal
1.pdf
1.pdf
ssusere02009
secure Audio Data Transfer Over Internet Using Steganography
secure Audio Data Transfer Over Internet Using Steganography
IRJET Journal
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share Images
IRJET Journal
Emerging Trends In Cryptography And Digital Forensics
Emerging Trends In Cryptography And Digital Forensics
IRJET Journal
IRJET- Message Encryption using Hybrid Cryptography
IRJET- Message Encryption using Hybrid Cryptography
IRJET Journal
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...
IOSR Journals
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET Journal
An Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit Complementation
IRJET Journal
Analysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithms
IRJET Journal
Fpga based encryption design using vhdl
Fpga based encryption design using vhdl
eSAT Publishing House
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET Journal
Design Package to Build and Evaluate Encryption Algorithms
Design Package to Build and Evaluate Encryption Algorithms
IOSRjournaljce
IRJET- Enhancement of 128-Bits Data Security through Steganography and Crypto...
IRJET- Enhancement of 128-Bits Data Security through Steganography and Crypto...
IRJET Journal
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
IOSR Journals
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET Journal
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
IRJET Journal
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
IRJET Journal
10.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.12
Arindam Paul
Similar to Colour Based Cryptography
(20)
Ijetcas14 355
Ijetcas14 355
Color Code PIN Authentication System Using Multi-TouchTechnology
Color Code PIN Authentication System Using Multi-TouchTechnology
1.pdf
1.pdf
secure Audio Data Transfer Over Internet Using Steganography
secure Audio Data Transfer Over Internet Using Steganography
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share Images
Emerging Trends In Cryptography And Digital Forensics
Emerging Trends In Cryptography And Digital Forensics
IRJET- Message Encryption using Hybrid Cryptography
IRJET- Message Encryption using Hybrid Cryptography
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
An Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit Complementation
Analysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithms
Fpga based encryption design using vhdl
Fpga based encryption design using vhdl
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
Design Package to Build and Evaluate Encryption Algorithms
Design Package to Build and Evaluate Encryption Algorithms
IRJET- Enhancement of 128-Bits Data Security through Steganography and Crypto...
IRJET- Enhancement of 128-Bits Data Security through Steganography and Crypto...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
10.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.12
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
upamatechverse
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
RajkumarAkumalla
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
Asutosh Ranjan
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
rknatarajan
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
ranjana rawat
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
soniya singh
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
SIVASHANKAR N
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
upamatechverse
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Suman Mia
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Tsuyoshi Horigome
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
upamatechverse
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
ranjana rawat
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
ssuser5c9d4b1
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Call Girls in Nagpur High Profile
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
ranjana rawat
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Recently uploaded
(20)
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Colour Based Cryptography
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 www.irjet.net p-ISSN: 2395-0072Volume: 04 Issue: 01 | Jan -2017 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1431 Colour Based Cryptography Dinesh Sharma1, Rohit Prasad2, Gunraj Bedi3, Archita Dad4 1Student, dept of Computer Engineering, Atharva College , Maharashtra, India. 2Student, dept of Computer Engineering, Atharva College , Maharashtra, India. 3Student, dept of Computer Engineering, Atharva College , Maharashtra, India. 4Asst.Professor, dept of Computer Engineering, Atharva College , Maharashtra, India. --------------------------------------------------------------***-------------------------------------------------------------- Abstract-In the increasing concern of the data security ,most commonly method is encryption of messege to cipher text message ,which are based on various strategies to encode. traditional method is to convert the message to cipher text by substitution , swapping ,transposition etc. Transposition cipher is a method of encryption by which the positions held by units of plaintext (which are commonly characters or groups of characters) are shifted according to a regular system, so that the ciphertext constitutes a permutation of the plaintext. Whereas ,we are using an innovative cryptographic substitution method. where we proposed to generate a stronger cipher than the existing substitution algorithms. This method emphasizes on the substitution of characters, numbers and special symbols with color blocks. This algorithm of substitution is based on Play Color Cipher.As there are n decillion of color with wide range of shades are available so the complexity for the attacker increase and that gives the assurance of strong cipher. Keywords: Play Color Cipher(PCC),Color substitution,Color block,Color code. 1. INTRODUCTION: Information Security which refers to securing information in potentially hostile environments is a crucial factor in the growth of information-based processes in industry, business, and companies[1]. Cryptography is a key technology for achieving information security in the various aspects such as communications,computersystems, electronic commerce, and in the emerging information society[3]. Basically Cryptography requires some kind mathematical processing in order to successfully encrypt or decrypt data[2].Many Cryptographic terms has been developed throughout the year which have a great impact in the world of Cyber Security. Two types of Cryptographic algorithm are used throughout the world i.e: Public key Cryptography and Private Key Cryptography[4].DES is a Private key cipher algorithm, in which cryptographic key and algorithm are applied to the block simultaneously instead of one bit at a time. AES is also a private key cipher algorithm which is used to protect useful information and is implemented in software and hardware throughout the world to secure sensitive data. RSA is a Public key Cryptographic algorithm which is used for securing sensitive data with the help of two keys, when being sent over an insecure network such as the Internet[1].There is also a Visual cryptography technique that allows pictures to be encrypted in such a way that decryption should be done via sight reading. 1.1 NEED: Existing Cryptographic algorithms are nowadays not enough to fully secure the information/files that should not be in the hands of the unauthorized people .There are many ways the data can be hacked or leaked by finding the loopholes or flaw in the data or the system even though they are encrypted. Brute force is a trial and error technique which helps to obtain user password or personal identification number of the system[4].The Meet-in-the-Middle attack is a type of attack where attacker targets the block cipher cryptographic function and applies the brute force technique to both plaintext and the ciphertext block and then attempt to encrypt the plaintext according to the various key to achieve an intermediate ciphertext[7].Meet in the middle attack mainly gather the information but cannot change the information. A birthday attack is a type of cryptographic attack that can be used to abuse communication between two or more parties[2].The
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 www.irjet.net p-ISSN: 2395-0072Volume: 04 Issue: 01 | Jan -2017 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1432 attack depends on the higher likelihood of collisions found between random attack attempts and a fixed degree of permutations. DES uses a 64-bit key, but eight bits are used for parity checking, effectively limiting the key to 56-bits. Hence, it would take a maximum of 2^56 attempts to find the correct key which can be now done easily with the help of DES key generator software[5].Similarly AES keys depends on the rounds used in the process of encryption which can be very useful to the to attack if he/she knows the process. All of the above problems can be overcomed or can be reduced by using our technique. For this only 3 parameters (RGB) have been used where, each channel has a color range of 0- 255[1]. Maximum number of color combinations is 1,67,77,216 in decimal. It will be very exhausting to try out all possible combinations. Hence that the brute force attack is not possible[3]. Also, there are 18 Decillions of colors in the world of computer. Thus, if man in the middle, known plain text, known cipher text attacks is considered, it will be impossible to guess or decrypt the plain text just by obtaining the color image[9].Also this technique will ensure the plaintext size reduced by 4 times in a lossless manner. 2.LITERATURE SURVEY: 3.TECHNOLOGY USED: an object-oriented programming language known as C# having strong typing, essential, declarative, efficient, class- based is used to implement this research Sr No. Paper Year Description 1 Cryptography based on Color Substitution April 2014 In this paper, an innovative cryptographic method is proposed to generate a stronger cipher the existing substitution algorithms. This method on the substitution of characters, numbers and symbols with color blocks. 2 Securing Informative Text using Color Visual cryptography. February 2016 The aim of this project is to provide secure communication between two parties. So, that secret message/data cannot be compromise. 3 Extended Visual Cryptography for Color shares using Random Number Generators August 2012 The concept of visual information pixel (VIP) synchronization and error diffusion is used to attain a color visual cryptography encryption method that produces meaningful color shares with high visual quality.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 www.irjet.net p-ISSN: 2395-0072Volume: 04 Issue: 01 | Jan -2017 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1433 4. WORKING Fig 1. Representation of the working. Fig 1. Shows the working pattern of our technique.In this we will create a Windows platform software that will convert the plain-text into the color block image which will be represented as a bitmap-Image 4.1 ALGORITHM: A] ENCRYPTION PART: 1. Accept the text file and the key. 2. Separate the text into individual characters. 3. Specify the size of the block, color-channel (R/G/B) and a color (RGB value). 4. Depending on the block-size (say x), divide the picture box into a grid of blocks, each of size x 5. Add the ASCII value of every character and put the value in the color-channel that is selected. 6. For the remaining 2 channels, put the value of the Color from 0-255,This should be user input. 7. Originate the bitmap image 8. Generate the Key. 9. Send the image to the intended reciever UTPUT AFTER ENCRYPTION: Fig2.Representation of output Fig 2. Shows the output that is obtained after the encryption process.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 www.irjet.net p-ISSN: 2395-0072Volume: 04 Issue: 01 | Jan -2017 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1434 B] DECRYPTION PART: 1. Add the ASCII value of every character and put the value in the color-channel selected. 2. For the remaining channels, put the value of the Color that was given by the user. 3. Originate the bitmap image. 4. Generate the Key. 5. Send the image to the intended receiver. 6. Subtract the blocks position from that value. 7. Convert the resulting value into character and obtain the text. 8. Decrypt the text using the decryption process of the encryption algorithm used. 9. Get the original text back. 5.CONCLUSION: An innovative approach presented in this paper makes information secure by color substitution. The cryptanalysis carried out on this experiment shows that this technique has great potential as it eliminates major attacks like brute force, man in the middle, known plain text and known cipher text attacks. In future, the figures, tables etc. can be included in the plaintext for conversion and hence the scope of the algorithm can be increased. To generate a stronger cipher, the number of parameters can be increased for generation of the color to get 18 Decillions of color combinations. This can be used for languages other than English by making some minor changes. 6.ACKNOWLEDGEMENT: We Would like to express our gratitude to miss Archita Dad for her constant guidance and support also we would like to thank library and computer center department of our college who helped us to carry out our research. 7. REFERENCES: [1] Aditya gaitonde 2012. Color Coded Cryptography, International Journal of Scientific & Engineering Research, Volume 3, Issue 7. [2] Andrey Bogdanov, Dmitry Khovratovich, Christian Rechberger, 2011, Biclique Cryptanalysis of the Full AES, Crypto 2011 cryptology conference, Santa Barbara, California. [3] Prof. K. Ravindra,Dr.S.Udaya Kumar, Dr.A.Vinaya Babu and Dr.Thirupathi Reddy, 2010. A block cipher generation using color substitution, International Journal of Computer Applications Vol-1. [4] Sastry V.U.K, S. Udaya Kumar and A. Vinaya babu, 2006. A large block cipher using modular arithmetic inverse of a key matrix and mixing of the key matrix and the plain text. Journal of Computer Science, 2. [5] Pritha Johar, Santosh Easo and K K Johar, 2012. “A Novel Approach to Substitution Play Color Cipher”, International Journal of Next Generation Computer Application Volume 1. [6] Jay Hilyard and Stephen Teilbet, C# 3.0 Cookbook, 3rd edition, 2007. [7] Nguyen, H. Number Theory and the RSA Public Key Cryptosystem. [8] B.A.Forouzan, Cryptography and Network Security, 4th edition, 2008. [9] Christian Gross, Beginning C# 2008 From Novice to Professional Second Edition 2008.
Download now