UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 3 | March 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 8 Issue 12
December-2021
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR2112292


Registration ID:
317928

Page Number

c707-c712

Share This Article


Jetir RMS

Title

Linear Algorithm For Imbricate Cryptography By Image Based Encryption Using Embedded Key Technique

Abstract

In this paper we will build up the connection among Randomness and Cryptography. We will create a calculation by consolidating the consequence of the Linear Congruential Pseudo Random Number Generator with Imbricate Cryptography. The accompanying calculation is Symmetric sort Cryptography. It utilizes a layered methodology. The primary layer includes embedding an arbitrarily produced number in the content and afterward changing the content to frame the code text at the absolute first layer. Second layer includes embedding the way in to the code text got in the main layer consequently making the security a two way approach. Consequently, the message must be recuperated by utilizing the right key and the right Random number created. The Random number produced is communicated to the client with the key. Here the message and the key are internally plaited. It is beyond the realm of imagination to expect to locate the key by stage and blend since the client can pick key of variable length. Different Layers of encryption and decoding give security. The upside of the cycle is that it forestalls figure text just assault and realized plain content assault. It is additionally effectively calculable and productive.

Key Words

Bitmap File, Encryption, Imbricate Cryptography, Linear Congruential Generator, Network security.

Cite This Article

"Linear Algorithm For Imbricate Cryptography By Image Based Encryption Using Embedded Key Technique ", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.8, Issue 12, page no.c707-c712, December-2021, Available :http://www.jetir.org/papers/JETIR2112292.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Linear Algorithm For Imbricate Cryptography By Image Based Encryption Using Embedded Key Technique ", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.8, Issue 12, page no. ppc707-c712, December-2021, Available at : http://www.jetir.org/papers/JETIR2112292.pdf

Publication Details

Published Paper ID: JETIR2112292
Registration ID: 317928
Published In: Volume 8 | Issue 12 | Year December-2021
DOI (Digital Object Identifier):
Page No: c707-c712
Country: Pune, Maharashtra, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

000351

Print This Page

Current Call For Paper

Jetir RMS