SlideShare a Scribd company logo
PICTURE ARITHMETIC CRYPTOSYSTEMS USING SYMMETRIC 
KEY ENCHANCED ALGORITHM WITH LEGITIMATE PICTURES 
ABSTRACT 
The secret messages passed through network are hacked and algorithms 
are not efficient to the expected level. A powerful encryption technique is 
introduced and performs a large variety of generating keys to encrypt the 
message in the form of pictures. The arithmetic operations are performed over 
the picture key to make the technique even more powerful. First encryption is 
done with the help of vigenere cipher and the key is generated through picture. 
Second encryption is done with the help of newly designed 10x26 table and the 
key is generated from the first key. The decryption is done by the reverse of 
encryption process.
EXISTING SYSTEM 
The cryptographic systems use the key to encrypt messages in the form of text or 
string. Vigenere cipher can be broken using counting diagram.Total number of combinations 
required to break the system using counting diagram is very small. Large key size makes the 
system less efficient. The secret key to perform encryption is more reliable to attack because 
it is an easily recognizable format. 
PROPOSED SYSTEM 
The encryption of the message is done using the picture key which is difficult to 
break. Total number of combinations required to break the system exceeds hundred digit 
number and more with increase in number of pictures. The system performances increases 
with increase in key size. The system uses two main operations to make the key stronger. The 
first operation is LOCK-10(Logical Crypto Key)is performed over the secret code to get the 
picture sorting key.LOCK-10 involves 10 different operations and these are performed over 
the secret code to get the picture sorting key. The operation LOCK-10 can be performed in 10 
factorial ways .The picture sorting key is obtained and the ‘N’ pictures are arranged in one of 
the ‘N’ factorial ways. The PACK(Picture Arithmetic Crypto Key) operation is performed 
over the picture key to get the first key. The second key is generated from the first key by 
performing LOCK-5 operation over the first key. The vigenere encryption is performed over 
the first key and encryption is performed over the second key with the help of 10x26 matrix. 
Increase in number of pictures used for ciphering, increases the system performance 
proportionally.
REQUIREMENT SPECIFICATIONS 
HARDWARE REQUIREMENT 
Processor : Pentium IV or above 
Ram : 512 MB 
Hdd : 80 GB 
SOFTWARE REQUIREMENT 
Operating system : windows 
Platform : c#.Net 4.0 
Front End : C Sharp

More Related Content

Similar to Picture arithmetic cryptosystem using symmetric key enhanced algorithm with legitimate pictures-abstract

7. 9589 1-pb
7. 9589 1-pb7. 9589 1-pb
7. 9589 1-pb
IAESIJEECS
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processing
IJMIT JOURNAL
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processing
IJMIT JOURNAL
 
separable reversible data hiding in encrypted image
separable reversible data hiding in encrypted imageseparable reversible data hiding in encrypted image
separable reversible data hiding in encrypted image
ZTech Proje
 
E-Fraud Prevention based on self-authentication of e-documents
E-Fraud Prevention based on self-authentication of e-documentsE-Fraud Prevention based on self-authentication of e-documents
E-Fraud Prevention based on self-authentication of e-documents
MaddiSujitha
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...
Aparna Nk
 
G05124550
G05124550G05124550
G05124550
IOSR-JEN
 
Reversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionReversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryption
Papitha Velumani
 
Unit 2
Unit 2Unit 2
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
IRJET Journal
 
Security System for Data Using Steganography and Cryptography (SSDSC)
Security System for Data Using Steganography and Cryptography (SSDSC) Security System for Data Using Steganography and Cryptography (SSDSC)
Security System for Data Using Steganography and Cryptography (SSDSC)
csandit
 
SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)
SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC) SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)
SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)
cscpconf
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime Pixels
Eswar Publications
 
Biomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithmBiomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithm
ijcsit
 
secure Audio Data Transfer Over Internet Using Steganography
secure Audio Data Transfer Over Internet Using Steganographysecure Audio Data Transfer Over Internet Using Steganography
secure Audio Data Transfer Over Internet Using Steganography
IRJET Journal
 
novel Approach For Data Hiding by integrating Steganography and Extended Visu...
novel Approach For Data Hiding by integrating Steganography and Extended Visu...novel Approach For Data Hiding by integrating Steganography and Extended Visu...
novel Approach For Data Hiding by integrating Steganography and Extended Visu...
swapnalithakur7
 
Secure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and SteganographySecure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and Steganography
IOSR Journals
 
Fx3610771081
Fx3610771081Fx3610771081
Fx3610771081
IJERA Editor
 
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportAes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_report
sakhi rehman
 
Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...
IOSR Journals
 

Similar to Picture arithmetic cryptosystem using symmetric key enhanced algorithm with legitimate pictures-abstract (20)

7. 9589 1-pb
7. 9589 1-pb7. 9589 1-pb
7. 9589 1-pb
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processing
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processing
 
separable reversible data hiding in encrypted image
separable reversible data hiding in encrypted imageseparable reversible data hiding in encrypted image
separable reversible data hiding in encrypted image
 
E-Fraud Prevention based on self-authentication of e-documents
E-Fraud Prevention based on self-authentication of e-documentsE-Fraud Prevention based on self-authentication of e-documents
E-Fraud Prevention based on self-authentication of e-documents
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...
 
G05124550
G05124550G05124550
G05124550
 
Reversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionReversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryption
 
Unit 2
Unit 2Unit 2
Unit 2
 
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
 
Security System for Data Using Steganography and Cryptography (SSDSC)
Security System for Data Using Steganography and Cryptography (SSDSC) Security System for Data Using Steganography and Cryptography (SSDSC)
Security System for Data Using Steganography and Cryptography (SSDSC)
 
SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)
SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC) SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)
SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime Pixels
 
Biomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithmBiomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithm
 
secure Audio Data Transfer Over Internet Using Steganography
secure Audio Data Transfer Over Internet Using Steganographysecure Audio Data Transfer Over Internet Using Steganography
secure Audio Data Transfer Over Internet Using Steganography
 
novel Approach For Data Hiding by integrating Steganography and Extended Visu...
novel Approach For Data Hiding by integrating Steganography and Extended Visu...novel Approach For Data Hiding by integrating Steganography and Extended Visu...
novel Approach For Data Hiding by integrating Steganography and Extended Visu...
 
Secure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and SteganographySecure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and Steganography
 
Fx3610771081
Fx3610771081Fx3610771081
Fx3610771081
 
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportAes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_report
 
Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...
 

More from hari krishnan.n

SEO-Search Engine Optimisation
SEO-Search Engine OptimisationSEO-Search Engine Optimisation
SEO-Search Engine Optimisation
hari krishnan.n
 
Axis Bank Social Media Marketing
Axis Bank Social Media MarketingAxis Bank Social Media Marketing
Axis Bank Social Media Marketing
hari krishnan.n
 
Axis bank strengthens brand with progressive campaign on linkedIn
Axis bank strengthens brand with progressive campaign on linkedInAxis bank strengthens brand with progressive campaign on linkedIn
Axis bank strengthens brand with progressive campaign on linkedIn
hari krishnan.n
 
ERP IN CLOUD
ERP IN CLOUDERP IN CLOUD
ERP IN CLOUD
hari krishnan.n
 
Make science in india
Make science in indiaMake science in india
Make science in india
hari krishnan.n
 
Derivative Market
Derivative MarketDerivative Market
Derivative Market
hari krishnan.n
 
Drawbacks of our Education system
Drawbacks of our Education systemDrawbacks of our Education system
Drawbacks of our Education system
hari krishnan.n
 
Cross-cultural communication
Cross-cultural communicationCross-cultural communication
Cross-cultural communication
hari krishnan.n
 
Chennai express- Social Media Marketing Strategy
Chennai express- Social Media Marketing StrategyChennai express- Social Media Marketing Strategy
Chennai express- Social Media Marketing Strategy
hari krishnan.n
 
political behavior-organisational politics,discretionary behavior,defensive b...
political behavior-organisational politics,discretionary behavior,defensive b...political behavior-organisational politics,discretionary behavior,defensive b...
political behavior-organisational politics,discretionary behavior,defensive b...
hari krishnan.n
 
I-Mode in mobile communication.
I-Mode in mobile communication.I-Mode in mobile communication.
I-Mode in mobile communication.
hari krishnan.n
 
Issues with personality tests
Issues with personality testsIssues with personality tests
Issues with personality tests
hari krishnan.n
 
Issues with personality tests
Issues with personality testsIssues with personality tests
Issues with personality tests
hari krishnan.n
 
Management productivity tools1
Management productivity tools1Management productivity tools1
Management productivity tools1
hari krishnan.n
 
Socio economic classification
Socio economic classificationSocio economic classification
Socio economic classification
hari krishnan.n
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
hari krishnan.n
 
i-mode ppt and syncml
i-mode ppt and syncmli-mode ppt and syncml
i-mode ppt and syncml
hari krishnan.n
 

More from hari krishnan.n (17)

SEO-Search Engine Optimisation
SEO-Search Engine OptimisationSEO-Search Engine Optimisation
SEO-Search Engine Optimisation
 
Axis Bank Social Media Marketing
Axis Bank Social Media MarketingAxis Bank Social Media Marketing
Axis Bank Social Media Marketing
 
Axis bank strengthens brand with progressive campaign on linkedIn
Axis bank strengthens brand with progressive campaign on linkedInAxis bank strengthens brand with progressive campaign on linkedIn
Axis bank strengthens brand with progressive campaign on linkedIn
 
ERP IN CLOUD
ERP IN CLOUDERP IN CLOUD
ERP IN CLOUD
 
Make science in india
Make science in indiaMake science in india
Make science in india
 
Derivative Market
Derivative MarketDerivative Market
Derivative Market
 
Drawbacks of our Education system
Drawbacks of our Education systemDrawbacks of our Education system
Drawbacks of our Education system
 
Cross-cultural communication
Cross-cultural communicationCross-cultural communication
Cross-cultural communication
 
Chennai express- Social Media Marketing Strategy
Chennai express- Social Media Marketing StrategyChennai express- Social Media Marketing Strategy
Chennai express- Social Media Marketing Strategy
 
political behavior-organisational politics,discretionary behavior,defensive b...
political behavior-organisational politics,discretionary behavior,defensive b...political behavior-organisational politics,discretionary behavior,defensive b...
political behavior-organisational politics,discretionary behavior,defensive b...
 
I-Mode in mobile communication.
I-Mode in mobile communication.I-Mode in mobile communication.
I-Mode in mobile communication.
 
Issues with personality tests
Issues with personality testsIssues with personality tests
Issues with personality tests
 
Issues with personality tests
Issues with personality testsIssues with personality tests
Issues with personality tests
 
Management productivity tools1
Management productivity tools1Management productivity tools1
Management productivity tools1
 
Socio economic classification
Socio economic classificationSocio economic classification
Socio economic classification
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
i-mode ppt and syncml
i-mode ppt and syncmli-mode ppt and syncml
i-mode ppt and syncml
 

Recently uploaded

How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
Wahiba Chair Training & Consulting
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
สมใจ จันสุกสี
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 

Recently uploaded (20)

How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 

Picture arithmetic cryptosystem using symmetric key enhanced algorithm with legitimate pictures-abstract

  • 1. PICTURE ARITHMETIC CRYPTOSYSTEMS USING SYMMETRIC KEY ENCHANCED ALGORITHM WITH LEGITIMATE PICTURES ABSTRACT The secret messages passed through network are hacked and algorithms are not efficient to the expected level. A powerful encryption technique is introduced and performs a large variety of generating keys to encrypt the message in the form of pictures. The arithmetic operations are performed over the picture key to make the technique even more powerful. First encryption is done with the help of vigenere cipher and the key is generated through picture. Second encryption is done with the help of newly designed 10x26 table and the key is generated from the first key. The decryption is done by the reverse of encryption process.
  • 2. EXISTING SYSTEM The cryptographic systems use the key to encrypt messages in the form of text or string. Vigenere cipher can be broken using counting diagram.Total number of combinations required to break the system using counting diagram is very small. Large key size makes the system less efficient. The secret key to perform encryption is more reliable to attack because it is an easily recognizable format. PROPOSED SYSTEM The encryption of the message is done using the picture key which is difficult to break. Total number of combinations required to break the system exceeds hundred digit number and more with increase in number of pictures. The system performances increases with increase in key size. The system uses two main operations to make the key stronger. The first operation is LOCK-10(Logical Crypto Key)is performed over the secret code to get the picture sorting key.LOCK-10 involves 10 different operations and these are performed over the secret code to get the picture sorting key. The operation LOCK-10 can be performed in 10 factorial ways .The picture sorting key is obtained and the ‘N’ pictures are arranged in one of the ‘N’ factorial ways. The PACK(Picture Arithmetic Crypto Key) operation is performed over the picture key to get the first key. The second key is generated from the first key by performing LOCK-5 operation over the first key. The vigenere encryption is performed over the first key and encryption is performed over the second key with the help of 10x26 matrix. Increase in number of pictures used for ciphering, increases the system performance proportionally.
  • 3. REQUIREMENT SPECIFICATIONS HARDWARE REQUIREMENT Processor : Pentium IV or above Ram : 512 MB Hdd : 80 GB SOFTWARE REQUIREMENT Operating system : windows Platform : c#.Net 4.0 Front End : C Sharp