S. Alex, P. A., Rakshita N Patil, A. Kanavalli, Nandish Mahadev Karki
{"title":"Implementation and Comparison of File Security Using AES, DES and RSA and Anomaly Detection in Videos Using Convolutional Auto Encoder","authors":"S. Alex, P. A., Rakshita N Patil, A. Kanavalli, Nandish Mahadev Karki","doi":"10.14704/web/v19i1/web19047","DOIUrl":null,"url":null,"abstract":"Security is the vital part which helps in trying to exchange huge amount of data in the form of valid data from source to destination. Nowadays technology is modifying very fast based on the view on secure information. Every individual who are interacting with social network wishes their communication to be confidential and secured from the access of the unauthenticated users over the internet. Symmetric and Asymmetric Cryptography Techniques play a vital role as the arms of security. Cryptography is the skill of properly modifying the readable plain text data into a not readable cipher form. There are many individual symmetric and asymmetric algorithms that are implemented to secure the files but have their own disadvantages. Proposed technique in this paper is to use a combination of symmetric and asymmetric encryption algorithms and compare the performance with the existing systems. The file is divided into n-parts depending on the size then each part of the file is encrypted with any of the AES, DES, and RSA algorithms. Results of this Hybrid technique provides a stronger security. The comparison is made on the basis of time taken by the proposed and existing systems in milliseconds to encrypt different numbers of bytes of text and image data.","PeriodicalId":35441,"journal":{"name":"Webology","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Webology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14704/web/v19i1/web19047","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Social Sciences","Score":null,"Total":0}
引用次数: 0
Abstract
Security is the vital part which helps in trying to exchange huge amount of data in the form of valid data from source to destination. Nowadays technology is modifying very fast based on the view on secure information. Every individual who are interacting with social network wishes their communication to be confidential and secured from the access of the unauthenticated users over the internet. Symmetric and Asymmetric Cryptography Techniques play a vital role as the arms of security. Cryptography is the skill of properly modifying the readable plain text data into a not readable cipher form. There are many individual symmetric and asymmetric algorithms that are implemented to secure the files but have their own disadvantages. Proposed technique in this paper is to use a combination of symmetric and asymmetric encryption algorithms and compare the performance with the existing systems. The file is divided into n-parts depending on the size then each part of the file is encrypted with any of the AES, DES, and RSA algorithms. Results of this Hybrid technique provides a stronger security. The comparison is made on the basis of time taken by the proposed and existing systems in milliseconds to encrypt different numbers of bytes of text and image data.
WebologySocial Sciences-Library and Information Sciences
自引率
0.00%
发文量
374
审稿时长
10 weeks
期刊介绍:
Webology is an international peer-reviewed journal in English devoted to the field of the World Wide Web and serves as a forum for discussion and experimentation. It serves as a forum for new research in information dissemination and communication processes in general, and in the context of the World Wide Web in particular. Concerns include the production, gathering, recording, processing, storing, representing, sharing, transmitting, retrieving, distribution, and dissemination of information, as well as its social and cultural impacts. There is a strong emphasis on the Web and new information technologies. Special topic issues are also often seen.