Keywords : Cryptography
IMAGE ENCRYPTION USING AES FEATURE EXTRACTION AND RANDOM NO. GENERATION
European Journal of Molecular & Clinical Medicine,
2023, Volume 10, Issue 2, Pages 453-460
During data transmission, data can be transmitted in the form of text, image, audio and video, hence securing all kinds of data is most essential in today’s era. With the advent of internet technology, the number of unauthorized users to access the data increases.so, the transmission of information through imagesbecomes more. And it also becomes a more reliable form to transmit data. There are a number of algorithms available to solve this problem. One of the efficient methods is to use the AES (Advanced Encryption Standard) algorithm, the most notable and extensively used cryptographic algorithm because itis six times faster than 3- DES and much faster than the RSA algorithm. In this paper we proposed an image encryption and decryption algorithm using AES in which encryption contains a random image and decryption contains the original image. The efficiency of AES is compared using image and text and it is analyzed. The result thus shows that the sharing of information through image is much more reliable and efficient than sharing information as text. Index Terms: AES, Cryptography, Decryption, Encryption, Image.
A Survey on Blockchain Security System and Proactive Integrity Proofing Model in Centralized Cloud Environment
European Journal of Molecular & Clinical Medicine,
2022, Volume 9, Issue 7, Pages 8374-8387
Blockchain technology impact of security is a huge development on many businesses based on secured information processing, transactions, and safety to make in communication, and it still affects many places, due to what it can do for privacy levels. Although the characteristics of blockchain technology make security services in a centralized cloud environment, But most of the innovative technology doesn't provide standards security levels from service management. The development of blockchain leads to more security based on cryptographic issues. The exploration focuses on recent development challenges in the Blockchain security system and then summarizes the specific security threats. We consider some ideas in potential research directions based on security improvements. In this review, K. Hao et al, describe the explore integrity proofing using cryptographic security related to Blockchain model technology and its application. With supportive factors consider destroying many technical areas in the future, deals with security factors. However, it will be upgraded in areas that have been discouraged from many new security areas. Security concerns, not only from some unexpected areas but also from distributed/distributed computing issues and information encryption algorithm issues. The resultant of these conventional algorithms produce a different level of terms of analysis that are reviewed on the rest of the sections.
A refined Algorithm for using Pattern with Variable Length by using the existing pattern matching
European Journal of Molecular & Clinical Medicine,
2021, Volume 8, Issue 3, Pages 1081-1084
It has been observe in past years that the academics have instigated string matching algorithms in several turfs to extract and find the undisclosed key RSA algorithm or any other encryption method for discovering the intruder or malicious pattern in imposition detection system , the DNA matching, carbon chain matching . This article has a signified aim to analyse ,suggest and attain an algorithm which is classified for discrete pattern matching in different mode and moreover more efficiently and effectively. It has been designed for any pattern or type of string whether a character string , decimal value , wild character or any special symbol using your ASCII value.
A REVIEW ARTICLE ON CRYPTOGRAPHY USING FUNCTIONAL PROGRAMMING:HASKELL
European Journal of Molecular & Clinical Medicine,
2021, Volume 8, Issue 2, Pages 2098-2110
A modern wave of programming technology has been at the frontline of functional languages, experiencing growing success as well as impact. Hughes published an article entitled 'Why Functional Programming Matters', that has now been one of the most recent references in the field.Safe programming defines the method used by software engineers to include multiple safety mechanism for their system.Secure programming can be broken down into two subgroups to analyse its correlation with software design: access control, secure programme initialization, input validation, cryptography, secure networking, secure random number generation, and anti-tampering. In this paper we provide a review of various functional programming in Haskell for encryption. The inkling of functional programming is to make programming more closely related to mathematics. We describe crucial features and trade-offs that has to be well-thought-out while selecting the right method for secure computation
Data Hiding Using Deoxyribonucleic Acid (DNA) Computing With Morse Code Cryptosystem
European Journal of Molecular & Clinical Medicine,
2020, Volume 7, Issue 10, Pages 1719-1725
In this paper, DNA computing with Morse code encoding is proposed to bulwark the delicate information within the challenging environment. The plaintext is changed over to DNA sequences utilizing encoding table. Presently, the encoded information is transcript and translated by the RNA arrangements. Translated RNA is stego by the standard genetic code utilizing organic compounds, and the stego DNA is ciphered by Morse code pattern. The designed bio analysis and results show that the hiding capacity is high, and the execution time is less when compared to the current techniques like AES, RSA, DNA based Playfair cipher and Vigenere cipher.
A SURVEY ON CRYPTOGRAPHIC ALGORITHM FOR DATA SECURITY IN CLOUD STORAGE ENVIRONMENT
European Journal of Molecular & Clinical Medicine,
2020, Volume 7, Issue 9, Pages 1602-1620
People are using lot of cloud storage service (CSs) to store documents. The cloud storage
services are used to conserve people personal data and facilitate data transferable. The
computer which connected via internet is adequate to access the data anywhere without
carrying any physical drives like Pen drive, CD, etc. In existing techniques like, CSs providers
are using 256-bit Advanced Encryption Standard (AES) and 128-bit (AES) encryption
algorithm. This is one of the best techniques to secure data, but once the intruder gets
encrypted data, there is possibility for data insecurity by means of applying brute force
attacking technique in future increasing the speed performance of computer. The objective of
this paper to analysis cryptographic algorithm which perfume on various data formats and
data security attacks and threads in cloud storage environment. The aim to overcome this kind
of attacks and key tampering technique, the key generation and maintain process handover to
user’s itself. It makes cloud storage service provider to maintain data only, with high efficientencryption technique that provides strong protection for data.
Enhancement of Big Data Security in Cloud Environment
European Journal of Molecular & Clinical Medicine,
2020, Volume 7, Issue 4, Pages 59-63
In this research, the advanced encryption mechanism is discussed to secure big data in cloud computing. The services of Cloud computing are used on broad level because these services are Platform independent. Cloud computing eliminates the need to set specific software on system of user. To improve the security of cloud, the concept of Advanced Encryption Standard (AES) with Intrusion Detection System (IDS) method is integrated here. It is capable to offer the protection according to demands. It also enlarges the overall time period of the network. It is made to decrease the power utilization by the node. For optimum the local node network is differentiated into little zones. In addition, the algorithm for encoding is mentioned which is used to make encryption with Advanced Encryption Standard (AES).
Prediction of Crypto Currency by Multiple Linear Regressions using Anaconda Software
European Journal of Molecular & Clinical Medicine,
2020, Volume 7, Issue 4, Pages 76-81
Financial instruments traded in the stock markets attract various categories of investors across the world. The major objective of investment strategy is to minimize the risk and maximize the return and this can be achieved by choosing the right security at an appropriate time will result in loss reduction. The modern day investment alternative across the globe is crypto currency. A crypto currency is digital asset designed to work as a medium of exchange that uses strong cryptography to secure financial transactions, control the creation of additional units, and verify the transfer of assets. However, cryptocurrency are highly volatile due to their supply and demand factors as they are been designed to have a high degree of non availability. Hence, it is important to have a bitcoins price prediction model that can predict the bitcoins total supply value. In this paper, a multiple linear regression model for predicting the bitcoins total supply is proposed. The change in bitcoins total supply for definite time intervals like total supply per an hour, a day and a week were input for developing the linear regression model using the software package ANACONDA. This is significant improvement in comparison to traditional models. In the present scenario there is no such method of predicting the price of bitcoins. The proposed model can be used a decision making technique during the intense situations of bitcoins trading, where human predictions will not make appropriate price predictions. This paper comprises of various sections where the first section describes the introduction to Bitcoins, their importance followed by methodology and the strategy of algorithm applied. The third section describes the processing steps and implementation of algorithm and followed by validation of the project accuracy and efficiency checker.
ASCII KM Discrete Matcher: Enhancement of ASCII KS Discrete Matcher using Pattern with Variable Length
European Journal of Molecular & Clinical Medicine,
2019, Volume 6, Issue 1, Pages 77-80
It has been observe in past years that the academics have instigated string
matching algorithms in several turfs to extract and find the undisclosed key RSA
algorithm or any other encryption method for discovering the intruder or malicious
pattern in imposition detection system , the DNA matching, carbon chain matching .
This article has a signified aim to analyse ,suggest and attain an algorithm which is
classified for discrete pattern matching in different mode and moreover more efficiently
and effectively. It has been designed for any pattern or type of string whether a
character string , decimal value , wild character or any special symbol using your
ASCII value.