Online ISSN: 2515-8260

Keywords : encryption


IMAGE ENCRYPTION USING AES FEATURE EXTRACTION AND RANDOM NO. GENERATION

Dr.M.Rajaiah, Mr. Syed Akthar Basha,, Mr.D.Hidayathulla, Mr.V.Anirudh Reddy, Ms.S.Kusuma,, Mr.S.Ansar Ahammad, .

European Journal of Molecular & Clinical Medicine, 2023, Volume 10, Issue 2, Pages 453-460

During data transmission, data can be transmitted in the form of text, image, audio and video, hence securing all kinds of data is most essential in today’s era. With the advent of internet technology, the number of unauthorized users to access the data increases.so, the transmission of information through imagesbecomes more. And it also becomes a more reliable form to transmit data. There are a number of algorithms available to solve this problem. One of the efficient methods is to use the AES (Advanced Encryption Standard) algorithm, the most notable and extensively used cryptographic algorithm because itis six times faster than 3- DES and much faster than the RSA algorithm. In this paper we proposed an image encryption and decryption algorithm using AES in which encryption contains a random image and decryption contains the original image. The efficiency of AES is compared using image and text and it is analyzed. The result thus shows that the sharing of information through image is much more reliable and efficient than sharing information as text. Index Terms: AES, Cryptography, Decryption, Encryption, Image.

REVIEW AND ANALYSIS ON PRIVACY ISSUES IN DATA MINING AND SECURITY

Manogna vengala, Dr. CH N Santhosh Kumar

European Journal of Molecular & Clinical Medicine, 2022, Volume 9, Issue 7, Pages 5514-5521

This article provides a complete review on new perspectives and systematic interpretations of published literatures by painstakingly organising them into subcategories. [This article] [gives] [a] comprehensive overview on new perspectives and this is accomplished by supplying a list of the various pieces of published literature. This article discusses the fundamental ideas behind the numerous existing data mining methods that protect users' privacy, as well as the benefits and drawbacks associated with these technologies. The techniques that are currently available for protecting the privacy of users during data mining can be categorised according to various aspects. These aspects include things like distortion, association rule, hide association rule, taxonomy, clustering, associative classification, outsourced data mining, distributed, and k-anonymity. The most salient advantages and disadvantages of the procedures are outlined here within their respective categories. This in-depth investigation highlights the historical development, the research issues that are occurring at the present time, the future tendencies, the gaps, and the deficiencies. It has been decided that obligatory additional significant changes must be implemented for the purpose of providing stronger protection and preservation of personal privacy

A refined Algorithm for using Pattern with Variable Length by using the existing pattern matching

Kuljinder Singh Bumrah; Himani Sivaraman; Dr. Sandeep Budhani

European Journal of Molecular & Clinical Medicine, 2021, Volume 8, Issue 3, Pages 1081-1084

It has been observe in past years that the academics have instigated string matching algorithms in several turfs to extract and find the undisclosed key RSA algorithm or any other encryption method for discovering the intruder or malicious pattern in imposition detection system , the DNA matching, carbon chain matching . This article has a signified aim to analyse ,suggest and attain an algorithm which is classified for discrete pattern matching in different mode and moreover more efficiently and effectively. It has been designed for any pattern or type of string whether a character string , decimal value , wild character or any special symbol using your ASCII value.

Analysis of VLSI architecture in computerized information transmission using hamming code algorithm

Aasheesh Shukla; Manish Kumar

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 4, Pages 515-523

In the present innovations, correspondence has numerous applications, and in each field the information is encoded at the transmitter, exchanged over a correspondence channel and got at the recipient after information is decoded. Amid the procedure of transmission in a channel, a few information might be debased because of clamour. At recipient side, blunder information must be distinguished and remedied. Hamming code is one of the famous procedures for mistake discovery and rectification which comprises of encryption and unscrambling process. Encryption is the way toward changing over data or information into a code, particularly headed for counteract unapproved access and Decryption is a procedure of taking encoded or scrambled content and convert it again into unique content. The diverse models of encryption and decoding framework for hamming code calculation are proposed in the writing, which depend on low power, superior, limited expense and so on. In this paper different designs for Encryption, Decryption framework like EC(Encoder)- reversible rationale are indicated and execution qualities are watched dependent on parameters like frame rate, delay are watched for the Hamming code.

Secure Hybrid Watermarking Technique In Medical Imaging

G. Nagaraju; P. Pardhasaradhi; V. S. Ghali; G.R.K Prasad

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 5, Pages 160-176

Medical imaging organizations currently face a significant problem with stealing of medical data. Watermarking is a powerful tool that can be used to authorize the hidden information in cover image. The unique features associated with watermarking are authorization and copyright protection. Because of its unique characteristics, watermarking associated with medical data hiding gives more robustness in medical imaging. In spite of this adding security to watermarking in medical imaging, gives more protection for medical information. This paper explored two main fields that, the encryption of medical images using DNA Encoding and Spatiotemporal Chaos Algorithm and the embedding of medical images in cover image using hybrid transformation of NSCT, RDWT and SVD. The goal of this study was to develop a methodology to improve the robustness, imperceptibility and security for medical information without implementing a physical model, thus saving time, money and reducing the risks associated with hacking partners. For this paper, I used patient health document as one watermark and his medical image as another watermark. The theoretical model has demonstrated that it is possible to use this type of technique and apply it to a complex digital image transmission. The correlation observed before and after encryption and embedding procedures. Experimental results show how robustness and imperceptibility and security of medical images are improved.

ASCII KM Discrete Matcher: Enhancement of ASCII KS Discrete Matcher using Pattern with Variable Length

Kuljinder Singh Bumrah, Himani Sivaraman, Dr. Sandeep Budhani

European Journal of Molecular & Clinical Medicine, 2019, Volume 6, Issue 1, Pages 77-80

It has been observe in past years that the academics have instigated string
matching algorithms in several turfs to extract and find the undisclosed key RSA
algorithm or any other encryption method for discovering the intruder or malicious
pattern in imposition detection system , the DNA matching, carbon chain matching .
This article has a signified aim to analyse ,suggest and attain an algorithm which is
classified for discrete pattern matching in different mode and moreover more efficiently
and effectively. It has been designed for any pattern or type of string whether a
character string , decimal value , wild character or any special symbol using your
ASCII value.