Enhanced authentication based security using TDES and MD5
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 7
Abstract
For secure authentication over the internet and secure data transfer purposed using cryptography technique which provide high security. Encryption of an image, audio encryption, chaos based encryption contain various applications in numerous fields, concluding internet communication, transmission, medical imaging. Encryption is the most general method for image security promoting. Image encryption, video encryption, chaos centered encryption have functions in countless fields together with medical imaging, Tele-treatment and military communication, etc. in this paper using TDES and MD5 for secure authentication. In cryptography, firstly DES algorithm using for high security using 3DES and also called TDES. MD5 is an algorithm that's used to the data integrity authenticate with the aid in the production of a 128-bit message. Digest from information input (which may be an any length message) that is claimed to be as unique to that particular information. In this paper provide more security using TDES and MD5 on palm image.
Authors and Affiliations
Chirag Singh Sisodia, Aprajit Shrivastava
An Analysis of Network-Based Control System Using Controller Area Network (CAN) Protocol
Active safety is an important feature of a modern vehicle to provide precaution warning or compensatory control before the pre-crash stage of vehicle safety. All vehicle signals and information are acquired by several i...
Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Cloud computing is renowned as an alternative to Traditional information technology due to its inherent resourcesharing and low-maintenance characteristics. With the nature of low preservation, cloud computing provides a...
Restoration of Motion Blurred Images using Non Blind Technique-A Review
Image deblurring and restoration has been of great importance nowadays. Image recognition becomes difficult when it comes to blurred and poorly illuminated images and it is here image restoration come to picture. In thi...
Investigating Fresh and Dried Okra (Hibiscus Esculentus) for their Physico-Chemical and Antioxidant Properties: A Comparative Study
This study aimed to determine and compare the proximate composition and antioxidant assays of fresh and dried okra pods and seeds. The okra mucilage extracted from the okra fruit was evaluated for the antioxidant proper...
Reversible Encrypted Data Concealment In Encrypted Images By Reserving Room For Data Protection
This paper proposes a novel scheme for separate reversible data hiding in encrypted images. In the first phase, a content owner encrypts using an encryption key the original image. Then, a data-hider may compress the le...