Logo
  • Home
  • About Us
    • Aim and Scope
    • Research Area
    • Impact Factor
    • Indexing
  • For Authors
    • Authors Guidelines
    • How to publish paper?
    • Download Paper format
    • Submit Manuscript
    • Processing Charges
    • Download Copyrights Form
    • Submit Payment-Copyrights
  • Archives
    • Current Issues
    • Past Issues
    • Conference Issues
    • Special Issues
    • Advance Search
  • IJARIIE Board
    • Join as IJARIIE Board
    • Advisory Board
    • Editorial Board
    • Sr. Reviewer Board
    • Jr. Reviewer Board
  • Proposal
    • Conferece Proposal
    • Special Proposal
    • Faqs
  • Contact Us
  • Payment Detail

Call for Papers:Vol.9 Issue.1

Submission
Last date
26-Feb-2023
Acceptance Status In One Day
Paper Publish In Two Days
Submit ManuScript

News & Updates

Submit Article

Dear Authors, Article publish in our journal for Volume-9,Issue-1. For article submission on below link: Submit Manuscript


Join As Board

Dear Reviewer, You can join our Reviewer team without given any charges in our journal. Submit Details on below link: Join As Board


Paper Publication Charges

IJARIIE APP
Download Android App

For Authors

  • How to Publish Paper
  • Submit Manuscript
  • Processing Charges
  • Submit Payment

Archives

  • Current Issue
  • Past Issue

IJARIIE Board

  • Member Of Board
  • Join As Board

Downloads

  • Authors Guidelines
  • Manuscript Template
  • Copyrights Form

Android App

Download IJARIIE APP
  • Authors
  • Abstract
  • Citations
  • Downloads
  • Similar-Paper

Authors

Title: :  IMPLEMENTATION OF ROBUST SYSTEM TO GENERATE AUTHENTICATED ENCRYPTION FOR SECURE MESSAGE
PaperId: :  3695
Published in:   International Journal Of Advance Research And Innovative Ideas In Education
Publisher:   IJARIIE
e-ISSN:   2395-4396
Volume/Issue:    Volume 3 Issue 1 2017
DUI:    16.0415/IJARIIE-3695
Licence: :   IJARIIE is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Author NameAuthor Institute
Mr. Shaikh S.I.M.S.Polytechnic, Beed
Mr.Bhillare P.B.Aditya Polytechnic, Beed
Mr.Kulkarni P.R.M.S.Polytechnic, Beed

Abstract

Software Engineering
DCT,IDCT,DFT,MAC,AES,DES,PSNR,MSE
The purpose of this project was to boost the data security focusing on the tow levels of security, namely multimedia encryption and multimedia authentication. The aim is to propose a key-dependent function that returns the same numbers or bits from images and their encrypted versions. By incorporating encryption and hashing in one system, we can have two levels of security and we can prove the authenticity of the data without actually revealing the information. A discrete cosine transform (DCT) expresses a sequence of finitely many data points in terms of a sum of cosine functions oscillating at different frequencies. Watermark is a recognizable image or pattern that appears as various shades of lightness/darkness when viewed by transmitted light, caused by thickness or density variations. A hash function is any algorithm or subroutine that maps large data sets of variable length, called keys, to smaller data sets of a fixed length. Firstly, image is encrypted. For each image, first we compute the 16 × 16 block DCT. Then, each block is encrypted. Decryption is done on encrypted image. Finally, done the image comparison for an input image and an output image with the help of histogram. And the result obtained as expected.

Citations

Copy and paste a formatted citation or use one of the links to import into a bibliography manager and reference.

IJARIIE Mr. Shaikh S.I., Mr.Bhillare P.B., and Mr.Kulkarni P.R.. "IMPLEMENTATION OF ROBUST SYSTEM TO GENERATE AUTHENTICATED ENCRYPTION FOR SECURE MESSAGE" International Journal Of Advance Research And Innovative Ideas In Education Volume 3 Issue 1 2017 Page 437-445
MLA Mr. Shaikh S.I., Mr.Bhillare P.B., and Mr.Kulkarni P.R.. "IMPLEMENTATION OF ROBUST SYSTEM TO GENERATE AUTHENTICATED ENCRYPTION FOR SECURE MESSAGE." International Journal Of Advance Research And Innovative Ideas In Education 3.1(2017) : 437-445.
APA Mr. Shaikh S.I., Mr.Bhillare P.B., & Mr.Kulkarni P.R.. (2017). IMPLEMENTATION OF ROBUST SYSTEM TO GENERATE AUTHENTICATED ENCRYPTION FOR SECURE MESSAGE. International Journal Of Advance Research And Innovative Ideas In Education, 3(1), 437-445.
Chicago Mr. Shaikh S.I., Mr.Bhillare P.B., and Mr.Kulkarni P.R.. "IMPLEMENTATION OF ROBUST SYSTEM TO GENERATE AUTHENTICATED ENCRYPTION FOR SECURE MESSAGE." International Journal Of Advance Research And Innovative Ideas In Education 3, no. 1 (2017) : 437-445.
Oxford Mr. Shaikh S.I., Mr.Bhillare P.B., and Mr.Kulkarni P.R.. 'IMPLEMENTATION OF ROBUST SYSTEM TO GENERATE AUTHENTICATED ENCRYPTION FOR SECURE MESSAGE', International Journal Of Advance Research And Innovative Ideas In Education, vol. 3, no. 1, 2017, p. 437-445. Available from IJARIIE, http://ijariie.com/AdminUploadPdf/IMPLEMENTATION_OF_ROBUST_SYSTEM_TO_GENERATE_AUTHENTICATED_ENCRYPTION_FOR_SECURE_MESSAGE_ijariie3695.pdf (Accessed : ).
Harvard Mr. Shaikh S.I., Mr.Bhillare P.B., and Mr.Kulkarni P.R.. (2017) 'IMPLEMENTATION OF ROBUST SYSTEM TO GENERATE AUTHENTICATED ENCRYPTION FOR SECURE MESSAGE', International Journal Of Advance Research And Innovative Ideas In Education, 3(1), pp. 437-445IJARIIE [Online]. Available at: http://ijariie.com/AdminUploadPdf/IMPLEMENTATION_OF_ROBUST_SYSTEM_TO_GENERATE_AUTHENTICATED_ENCRYPTION_FOR_SECURE_MESSAGE_ijariie3695.pdf (Accessed : )
IEEE Mr. Shaikh S.I., Mr.Bhillare P.B., and Mr.Kulkarni P.R., "IMPLEMENTATION OF ROBUST SYSTEM TO GENERATE AUTHENTICATED ENCRYPTION FOR SECURE MESSAGE," International Journal Of Advance Research And Innovative Ideas In Education, vol. 3, no. 1, pp. 437-445, Jan-Feb 2017. [Online]. Available: http://ijariie.com/AdminUploadPdf/IMPLEMENTATION_OF_ROBUST_SYSTEM_TO_GENERATE_AUTHENTICATED_ENCRYPTION_FOR_SECURE_MESSAGE_ijariie3695.pdf [Accessed : ].
Turabian Mr. Shaikh S.I., Mr.Bhillare P.B., and Mr.Kulkarni P.R.. "IMPLEMENTATION OF ROBUST SYSTEM TO GENERATE AUTHENTICATED ENCRYPTION FOR SECURE MESSAGE." International Journal Of Advance Research And Innovative Ideas In Education [Online]. volume 3 number 1 ().
Vancouver Mr. Shaikh S.I., Mr.Bhillare P.B., and Mr.Kulkarni P.R.. IMPLEMENTATION OF ROBUST SYSTEM TO GENERATE AUTHENTICATED ENCRYPTION FOR SECURE MESSAGE. International Journal Of Advance Research And Innovative Ideas In Education [Internet]. 2017 [Cited : ]; 3(1) : 437-445. Available from: http://ijariie.com/AdminUploadPdf/IMPLEMENTATION_OF_ROBUST_SYSTEM_TO_GENERATE_AUTHENTICATED_ENCRYPTION_FOR_SECURE_MESSAGE_ijariie3695.pdf
BibTex EndNote RefMan RefWorks

Number Of Downloads



Save in Google Drive

Similar-Paper

TitleArea of ResearchAuther NameAction
Rural E-Health Management SystemComputer EngineeringSamadhan Korde Download
“The Sarahu Software Developments – 2019 and 2020”Software Developments Sarahu Nagarazan (Lord Sarahunaath) Download
Understandability & Complexity estimation of Software program in Python Language (UCS-PL)Software EngineeringVISHWA PRAKASH Download
SPACE GROWTH USING THE BIN-PACKING METHODComputer EngineeringRAKOTONDRASOLO Andrianandraina Marijaona Download
Python - The Most Attractive & Fastest-growing Programming Language for DevelopersSoftware EngineeringVISHWA PRAKASH Download
Naive Bayes Classifier for web text AnalysisSoftware EngineeringKasat Priyanka Download
STUDY OF THE PARAMETERS NECESSARY TO DEFINE THE VEHICLE MANUFACTURING ENVELOPEComputer EngineeringRAKOTONDRASOLO Andrianandraina Marijaona Download
A SURVEY ON PREDICTION OF PRIORITY AND SEVERITY IN THE BUG REPORTSSoftware engineeringDeeksha DR Download
A STUDY OF TOOLS, METHODS AND TECHNIQUES OF SOFTWARE COST ESTIMATIONComputer ScienceKhin Sein Hlaing Download
CASE STUDY BASED SOFTWARE ENGINEERING FOR MOBILE APPLICATION DEVELOPMENTComputer ScienceWin Mar Download
STUDY ABOUT OBJECT ORIENTED MODELINGComputer EngineeringSalini Dev P V Download
WEB API for Business ApplicationComputer EngineeringVarsha Sitaram Gite Download
Increasing efficiency of intrusion detection system using stream data mining classificationSoftware EngineeringAkanksha Manikchandji Shrihrimal Download
PRIVACY PRESERVATION FOR HEALTHCARE SYSTEM USING T-CLOSENESS THROUGH MICROAGGREGATIONComputer Network Sonu V. Khapekar Download
IMPLEMENTATION OF ROBUST SYSTEM TO GENERATE AUTHENTICATED ENCRYPTION FOR SECURE MESSAGESoftware EngineeringMr. Shaikh S.I. Download
For Authors
  • Submit Paper
  • Processing Charges
  • Submit Payment
Archive
  • Current Issue
  • Past Issue
IJARIIE Board
  • Member Of Board
  • Join As Board
Privacy and Policy
Follow us

Contact Info
  • +91-8401209201 (India)
  • +86-15636082010 (China)
  • ijariiejournal@gmail.com
  • M-20/234 Ami Appt,
    Nr.Naranpura Tele-Exch,
    Naranpura,
    Ahemdabad-380063
    Gujarat,India.
Copyright © 2023. IJARIIE. All Rights Reserved.