{"title":"Modern Technique of Encryption Decryption Based On Image","authors":"Hemlata","doi":"10.1109/iciptm52218.2021.9388361","DOIUrl":null,"url":null,"abstract":"In today's age of technology, sharing of information and transfer of data has increased rapidly. The problem of facing the third party accessing the has been the issue of highly concern for the experts of data communication. The security measures plays an important role to provide authentication only of the authorized person, with accuracy, safety and integrity of data and resources. This method is to gain secure communication. There are number of techniques for security of data. To enhance the security to made the data safe from un authorized users “MODREN TECHNIQUE OF ENCRYPTION DECRYPTION BASED ON IMAGE.” Is designed by using key generation, key exchange and binary complements for data (text/image) authentication.","PeriodicalId":315265,"journal":{"name":"2021 International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"161 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Innovative Practices in Technology and Management (ICIPTM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iciptm52218.2021.9388361","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In today's age of technology, sharing of information and transfer of data has increased rapidly. The problem of facing the third party accessing the has been the issue of highly concern for the experts of data communication. The security measures plays an important role to provide authentication only of the authorized person, with accuracy, safety and integrity of data and resources. This method is to gain secure communication. There are number of techniques for security of data. To enhance the security to made the data safe from un authorized users “MODREN TECHNIQUE OF ENCRYPTION DECRYPTION BASED ON IMAGE.” Is designed by using key generation, key exchange and binary complements for data (text/image) authentication.