Logo
  • Home
  • About Us
    • Aim and Scope
    • Research Area
    • Impact Factor
    • Indexing
  • For Authors
    • Authors Guidelines
    • How to publish paper?
    • Download Paper format
    • Submit Manuscript
    • Processing Charges
    • Download Copyrights Form
    • Submit Payment-Copyrights
  • Archives
    • Current Issues
    • Past Issues
    • Conference Issues
    • Special Issues
    • Advance Search
  • IJARIIE Board
    • Join as IJARIIE Board
    • Advisory Board
    • Editorial Board
    • Sr. Reviewer Board
    • Jr. Reviewer Board
  • Proposal
    • Conferece Proposal
    • Special Proposal
    • Faqs
  • Contact Us
  • Payment Detail

Call for Papers:Vol.11 Issue.3

Submission
Last date
28-Jun-2025
Acceptance Status In One Day
Paper Publish In Two Days
Submit ManuScript

News & Updates

Submit Article

Dear Authors, Article publish in our journal for Volume-11,Issue-3. For article submission on below link: Submit Manuscript


Join As Board

Dear Reviewer, You can join our Reviewer team without given any charges in our journal. Submit Details on below link: Join As Board


Paper Publication Charges

IJARIIE APP
Download Android App

For Authors

  • How to Publish Paper
  • Submit Manuscript
  • Processing Charges
  • Submit Payment

Archives

  • Current Issue
  • Past Issue

IJARIIE Board

  • Member Of Board
  • Join As Board

Downloads

  • Authors Guidelines
  • Manuscript Template
  • Copyrights Form

Android App

Download IJARIIE APP
  • Authors
  • Abstract
  • Citations
  • Downloads
  • Similar-Paper

Authors

Title: :  IMPLEMENTATION OF ROBUST SYSTEM TO GENERATE AUTHENTICATED ENCRYPTION FOR SECURE MESSAGE
PaperId: :  3695
Published in:   International Journal Of Advance Research And Innovative Ideas In Education
Publisher:   IJARIIE
e-ISSN:   2395-4396
Volume/Issue:    Volume 3 Issue 1 2017
DUI:    16.0415/IJARIIE-3695
Licence: :   IJARIIE is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Author NameAuthor Institute
Mr. Shaikh S.I.M.S.Polytechnic, Beed
Mr.Bhillare P.B.Aditya Polytechnic, Beed
Mr.Kulkarni P.R.M.S.Polytechnic, Beed

Abstract

Software Engineering
DCT,IDCT,DFT,MAC,AES,DES,PSNR,MSE
The purpose of this project was to boost the data security focusing on the tow levels of security, namely multimedia encryption and multimedia authentication. The aim is to propose a key-dependent function that returns the same numbers or bits from images and their encrypted versions. By incorporating encryption and hashing in one system, we can have two levels of security and we can prove the authenticity of the data without actually revealing the information. A discrete cosine transform (DCT) expresses a sequence of finitely many data points in terms of a sum of cosine functions oscillating at different frequencies. Watermark is a recognizable image or pattern that appears as various shades of lightness/darkness when viewed by transmitted light, caused by thickness or density variations. A hash function is any algorithm or subroutine that maps large data sets of variable length, called keys, to smaller data sets of a fixed length. Firstly, image is encrypted. For each image, first we compute the 16 × 16 block DCT. Then, each block is encrypted. Decryption is done on encrypted image. Finally, done the image comparison for an input image and an output image with the help of histogram. And the result obtained as expected.

Citations

Copy and paste a formatted citation or use one of the links to import into a bibliography manager and reference.

IJARIIE Mr. Shaikh S.I., Mr.Bhillare P.B., and Mr.Kulkarni P.R.. "IMPLEMENTATION OF ROBUST SYSTEM TO GENERATE AUTHENTICATED ENCRYPTION FOR SECURE MESSAGE" International Journal Of Advance Research And Innovative Ideas In Education Volume 3 Issue 1 2017 Page 437-445
MLA Mr. Shaikh S.I., Mr.Bhillare P.B., and Mr.Kulkarni P.R.. "IMPLEMENTATION OF ROBUST SYSTEM TO GENERATE AUTHENTICATED ENCRYPTION FOR SECURE MESSAGE." International Journal Of Advance Research And Innovative Ideas In Education 3.1(2017) : 437-445.
APA Mr. Shaikh S.I., Mr.Bhillare P.B., & Mr.Kulkarni P.R.. (2017). IMPLEMENTATION OF ROBUST SYSTEM TO GENERATE AUTHENTICATED ENCRYPTION FOR SECURE MESSAGE. International Journal Of Advance Research And Innovative Ideas In Education, 3(1), 437-445.
Chicago Mr. Shaikh S.I., Mr.Bhillare P.B., and Mr.Kulkarni P.R.. "IMPLEMENTATION OF ROBUST SYSTEM TO GENERATE AUTHENTICATED ENCRYPTION FOR SECURE MESSAGE." International Journal Of Advance Research And Innovative Ideas In Education 3, no. 1 (2017) : 437-445.
Oxford Mr. Shaikh S.I., Mr.Bhillare P.B., and Mr.Kulkarni P.R.. 'IMPLEMENTATION OF ROBUST SYSTEM TO GENERATE AUTHENTICATED ENCRYPTION FOR SECURE MESSAGE', International Journal Of Advance Research And Innovative Ideas In Education, vol. 3, no. 1, 2017, p. 437-445. Available from IJARIIE, https://ijariie.com/AdminUploadPdf/IMPLEMENTATION_OF_ROBUST_SYSTEM_TO_GENERATE_AUTHENTICATED_ENCRYPTION_FOR_SECURE_MESSAGE_ijariie3695.pdf (Accessed : ).
Harvard Mr. Shaikh S.I., Mr.Bhillare P.B., and Mr.Kulkarni P.R.. (2017) 'IMPLEMENTATION OF ROBUST SYSTEM TO GENERATE AUTHENTICATED ENCRYPTION FOR SECURE MESSAGE', International Journal Of Advance Research And Innovative Ideas In Education, 3(1), pp. 437-445IJARIIE [Online]. Available at: https://ijariie.com/AdminUploadPdf/IMPLEMENTATION_OF_ROBUST_SYSTEM_TO_GENERATE_AUTHENTICATED_ENCRYPTION_FOR_SECURE_MESSAGE_ijariie3695.pdf (Accessed : )
IEEE Mr. Shaikh S.I., Mr.Bhillare P.B., and Mr.Kulkarni P.R., "IMPLEMENTATION OF ROBUST SYSTEM TO GENERATE AUTHENTICATED ENCRYPTION FOR SECURE MESSAGE," International Journal Of Advance Research And Innovative Ideas In Education, vol. 3, no. 1, pp. 437-445, Jan-Feb 2017. [Online]. Available: https://ijariie.com/AdminUploadPdf/IMPLEMENTATION_OF_ROBUST_SYSTEM_TO_GENERATE_AUTHENTICATED_ENCRYPTION_FOR_SECURE_MESSAGE_ijariie3695.pdf [Accessed : ].
Turabian Mr. Shaikh S.I., Mr.Bhillare P.B., and Mr.Kulkarni P.R.. "IMPLEMENTATION OF ROBUST SYSTEM TO GENERATE AUTHENTICATED ENCRYPTION FOR SECURE MESSAGE." International Journal Of Advance Research And Innovative Ideas In Education [Online]. volume 3 number 1 ().
Vancouver Mr. Shaikh S.I., Mr.Bhillare P.B., and Mr.Kulkarni P.R.. IMPLEMENTATION OF ROBUST SYSTEM TO GENERATE AUTHENTICATED ENCRYPTION FOR SECURE MESSAGE. International Journal Of Advance Research And Innovative Ideas In Education [Internet]. 2017 [Cited : ]; 3(1) : 437-445. Available from: https://ijariie.com/AdminUploadPdf/IMPLEMENTATION_OF_ROBUST_SYSTEM_TO_GENERATE_AUTHENTICATED_ENCRYPTION_FOR_SECURE_MESSAGE_ijariie3695.pdf
BibTex EndNote RefMan RefWorks

Number Of Downloads



Save in Google Drive

Similar-Paper

TitleArea of ResearchAuther NameAction
UNIFIED BLOOD DONOR & RECEIVER PLATFORMComputer Engineering RITIK MITTAL Download
Client/Server Model of Students’ Result Processing Application for the Federal Polytechnic BauchiComputing and Information TechnologyAbubakar Sulaiman, Hamza Download
Real-time fall detection and emergency alert system for elderly individualsComputer EngineeringSiddharth Subhash Jadhav Download
Pharmaceutical compliance management softwarePharmaceutical technologyUjjval shukla Download
Sentiment Analysis: Unveiling Emotions in TextComputer scienceVaishali Anilkumar Download
“Revolutionizing Healthcare Operations” using Next.js, Twilio, Appwrite, Sentry, TypeScript, and TailwindCSSComputer EngineeringG Vivek Download
From Algorithms to Savings: AI's impact on personal finance behaviorComputer Science and Information TechnologyYash Gohil Download
ATTENDANCE MONITORING SYSTEM USING FACE RECOGNITION AND UNIFORM DETECTION THROUGH MACHINE LEARNINGIT EngineeringSahil Srivastav Download
BAKERY APP DESIGN(UX/UI RESEARCH)Computer EngineeringNIKHILESH PP Download
FAULT DETECTION METHOD FOR TAIL ROPE USING MACHINE LEARNINGCOMPUTER ENGINEERINGDIVIYA K Download
SEMANTIC SEGMENTATION OF RETINAL ARTERIES AND VEINS USING DEEP LEARNING BASED METHODSDeep LearningBommi Naveen Download
VITAMIN DEFICIENCY DETECTION USING CONVOLUTIONAL NEURAL NETWORK WITH ADAM OPTIMIZATIONMachine LearningDr N. Durga Rao Download
ENHANCING BREAST CANCER DIAGNOSIS USING DEEP LEARNINGDEEP LEARNINGBANDLA LAKSHMI MONISHA Download
ALZHEIMER’S DETECTION AND CLASSIFICATION USING SVMMachine LearningLavanya Danaboyina Download
Analysis of network intrusion detection using feature engineering in MLMachine LearningG Tejaswini Download
12
For Authors
  • Submit Paper
  • Processing Charges
  • Submit Payment
Archive
  • Current Issue
  • Past Issue
IJARIIE Board
  • Member Of Board
  • Join As Board
Privacy and Policy
Follow us

Contact Info
  • +91-8401209201 (India)
  • +86-15636082010 (China)
  • ijariiejournal@gmail.com
  • M-20/234 Ami Appt,
    Nr.Naranpura Tele-Exch,
    Naranpura,
    Ahemdabad-380063
    Gujarat,India.
Copyright © 2025. IJARIIE. All Rights Reserved.