Downloads: 110
Informative Article | Computer Science & Engineering | India | Volume 5 Issue 8, August 2016
Implementation of Encryption and Decryption Technique
Dayanand G Savakar [9] | Anand S Ghuli [2]
Abstract: An application is to secure the all files from different users. It is concerned with encrypting the information in most secure and robust manner. It also includes the algorithm that convert the given text data into different form. This project also includes the good key generation that secure the given file from malicious users. This project allows the users to encrypt there important files from various other users. It gives immense security from the harmful users. File Encryption includes Audio Encryption, Video Encryption, Image Encryption and Text File Encryption. Information Hiding of this project includes Watermarking And Steganography to hide the information in the image. Watermarking include key generation to secure the text from other users. Steganography includes the mechanism to convert the data into another based on some Algorithm.
Keywords: Network, Encryption, Security, Decryption, classification
Edition: Volume 5 Issue 8, August 2016,
Pages: 1551 - 1554
Similar Articles with Keyword 'Network'
Downloads: 105
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1751 - 1754Joining Delay; Packet Delivery and Limitations of EGMP
G. Anandhi [3] | Dr. S. K. Srivatsa
Downloads: 91 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020
Pages: 1626 - 1628Image Noise Reduction with Autoencoder using Tensor Flow
Jai Sehgal | Dr Yojna Arora