Download PDFOpen PDF in browserV-Crypto Images/Videos/Texts by Two Key Authentication Using ACO Algorithm TechniqueEasyChair Preprint 96176 pages•Date: January 24, 2023AbstractEveryone has a query, whether our data is safe when shared across internet services like emails, websites, apps and so on for a variety of purposes. Companies grub these data to extract the user needs and grow their business because this is one of the main strategies to taste the victory. This research discusses the unique method of protecting our own data ourselves before we send it. Cryptography is the method to secure the data and there are several methods and algorithms evolved in due course of time. After the research, I have come up with the unique cryptographic method that can encrypt and decrypt text files, images and videos. My method merges multi secret keys and 2 different techniques such as ACO algorithm and logical operation technique. A customer must provide two different secret keys as an input to encrypt and decrypt the data. Second key tells the distance of the path for the encryption to take place. This proposed method makes the encryption stronger as it is difficult for anyone to hack the data while decryption. The unique design algorithm helps the user to secure the data safely at source itself. This method has been experimented on multiple text files, images and videos. Keyphrases: ACO algorithm, Ciphertext Cryptography, Logical Operation Technique, Visual Cryptography
|