Crypto your Belongings by Two Pin Authentication using Ant Algorithm based Technique

Janaki Raman Palaniappan
{"title":"Crypto your Belongings by Two Pin Authentication using Ant Algorithm based Technique","authors":"Janaki Raman Palaniappan","doi":"10.5121/csit.2022.121210","DOIUrl":null,"url":null,"abstract":"Everyone realize data is one of the important strategic for any company to run and win the business. Let it be a mobile apps, websites and so on, there are more chances that our personal data like images, videos, texts get expose while we share across for different purposes. Even though the company says app, website forms are encrypted, the said company itself uses the data internally for their business development. This research presents how one can secure own’s data themselves before sending. There are many cryptography methods that has evolved from time to time. Upon researching and analyzing, I present a unique method to encrypt and decrypt the data, using combination of techniques such as Cryptographic technique, ANT Algorithm based formula and logic gates that would provide stronger protection to the data. Secure your images, videos with a 2-pin authentication and protection to encrypt and decrypt the data. A user must provide 2 different symmetric pins to encrypt and decrypt, where first pin shall be up to 4-digit secret pin and a second pin is a single digit pin. Single digit pin acts on how many stages the encryption takes place. The proposed method had been experimented on several images and videos. This study reveals, A combination of secret keys, ANT algorithm and Logic gates makes difficult for anyone to hack the data. This unique methodology helps us to protect our data more safely at source device itself.","PeriodicalId":174755,"journal":{"name":"Artificial Intelligence and Machine Learning","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Artificial Intelligence and Machine Learning","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5121/csit.2022.121210","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Everyone realize data is one of the important strategic for any company to run and win the business. Let it be a mobile apps, websites and so on, there are more chances that our personal data like images, videos, texts get expose while we share across for different purposes. Even though the company says app, website forms are encrypted, the said company itself uses the data internally for their business development. This research presents how one can secure own’s data themselves before sending. There are many cryptography methods that has evolved from time to time. Upon researching and analyzing, I present a unique method to encrypt and decrypt the data, using combination of techniques such as Cryptographic technique, ANT Algorithm based formula and logic gates that would provide stronger protection to the data. Secure your images, videos with a 2-pin authentication and protection to encrypt and decrypt the data. A user must provide 2 different symmetric pins to encrypt and decrypt, where first pin shall be up to 4-digit secret pin and a second pin is a single digit pin. Single digit pin acts on how many stages the encryption takes place. The proposed method had been experimented on several images and videos. This study reveals, A combination of secret keys, ANT algorithm and Logic gates makes difficult for anyone to hack the data. This unique methodology helps us to protect our data more safely at source device itself.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
使用基于蚂蚁算法的技术对您的物品进行双Pin认证
每个人都意识到数据是任何公司经营和赢得业务的重要战略之一。无论是手机应用程序、网站等等,当我们出于不同目的分享时,我们的个人数据(如图像、视频、文本)暴露的可能性更大。尽管该公司表示应用程序和网站表单是加密的,但该公司本身在内部使用这些数据用于业务发展。这项研究展示了如何在发送之前保护自己的数据。有许多加密方法是不断发展的。在研究和分析的基础上,我提出了一种独特的数据加密和解密方法,该方法结合了加密技术、基于ANT算法的公式和逻辑门等技术,可以为数据提供更强的保护。保护您的图像,视频与2针身份验证和保护加密和解密数据。用户必须提供2个不同的对称pin码进行加密和解密,其中第一个pin码最多为4位秘密pin码,第二个pin码最多为一位数字pin码。单个数字的pin决定了加密发生了多少阶段。该方法已在若干图像和视频上进行了实验。该研究表明:“密钥、ANT算法和逻辑门的组合使得任何人都难以破解数据。”这种独特的方法有助于我们在源设备本身更安全地保护我们的数据。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Learning Structured Information from Small Datasets of Heterogeneous Unstructured Multipage Invoices Are your Sensitive Inputs Secure in Android Applications? Multi-View Human Tracking and 3D Localization in Retail A Pedestrian Counting Scheme for Video Images Detecting Depression in Social Media using Machine Learning
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1