Download PDFOpen PDF in browser

V-Crypto Images/Videos/Texts by Two Key Authentication Using ACO Algorithm Technique

EasyChair Preprint 9617

6 pagesDate: January 24, 2023

Abstract

Everyone has a query, whether our data is safe when shared across internet services like emails, websites, apps and so on for a variety of purposes. Companies grub these data to extract the user needs and grow their business because this is one of the main strategies to taste the victory. This research discusses the unique method of protecting our own data ourselves before we send it. Cryptography is the method to secure the data and there are several methods and algorithms evolved in due course of time. After the research, I have come up with the unique cryptographic method that can encrypt and decrypt text files, images and videos. My method merges multi secret keys and 2 different techniques such as ACO algorithm and logical operation technique. A customer must provide two different secret keys as an input to encrypt and decrypt the data. Second key tells the distance of the path for the encryption to take place. This proposed method makes the encryption stronger as it is difficult for anyone to hack the data while decryption. The unique design algorithm helps the user to secure the data safely at source itself. This method has been experimented on multiple text files, images and videos.

Keyphrases: ACO algorithm, Ciphertext Cryptography, Logical Operation Technique, Visual Cryptography

BibTeX entry
BibTeX does not have the right entry for preprints. This is a hack for producing the correct reference:
@booklet{EasyChair:9617,
  author    = {Janaki Raman Palaniappan},
  title     = {V-Crypto Images/Videos/Texts by Two Key Authentication Using ACO Algorithm Technique},
  howpublished = {EasyChair Preprint 9617},
  year      = {EasyChair, 2023}}
Download PDFOpen PDF in browser