{"title":"使用RSA和高级凯撒密码方法进行图像加密","authors":"Arpan Maity, Ritobina Ghosh, Shidhu Bhadra","doi":"10.1109/ASSIC55218.2022.10088329","DOIUrl":null,"url":null,"abstract":"In the field of Computer Science, proper storage and analysis of data is one of the most trending topics. The development of modern tools and techniques, has come down as a blessing for this. But along with the blessing, comes the curse of being easily attacked and the privacy of the data being vulnerable. The attackers and the hackers are becoming very smart and with their modern equipment, they can break into any system. For this several methods have been developed to save the privacy of our data. Out of these methods, the symmetric key method and the asymmetric key method are the most popular ones. Though both of the methods are powerful enough, they come with their own set of disadvantages. In this research work, an approach has been taken, where the combination of both the above spoken methods are used, making use of the advantages of both the methods, where both of them are also cancelling out each others disadvantages. The results confirmed that the accuracy, efficiency and the security of the algorithms are good enough, so that it can be used to deal with real world problems.","PeriodicalId":441406,"journal":{"name":"2022 International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Image Encryption Using RSA and Advanced Caesar Cipher Method\",\"authors\":\"Arpan Maity, Ritobina Ghosh, Shidhu Bhadra\",\"doi\":\"10.1109/ASSIC55218.2022.10088329\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the field of Computer Science, proper storage and analysis of data is one of the most trending topics. The development of modern tools and techniques, has come down as a blessing for this. But along with the blessing, comes the curse of being easily attacked and the privacy of the data being vulnerable. The attackers and the hackers are becoming very smart and with their modern equipment, they can break into any system. For this several methods have been developed to save the privacy of our data. Out of these methods, the symmetric key method and the asymmetric key method are the most popular ones. Though both of the methods are powerful enough, they come with their own set of disadvantages. In this research work, an approach has been taken, where the combination of both the above spoken methods are used, making use of the advantages of both the methods, where both of them are also cancelling out each others disadvantages. The results confirmed that the accuracy, efficiency and the security of the algorithms are good enough, so that it can be used to deal with real world problems.\",\"PeriodicalId\":441406,\"journal\":{\"name\":\"2022 International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC)\",\"volume\":\"35 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ASSIC55218.2022.10088329\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ASSIC55218.2022.10088329","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Image Encryption Using RSA and Advanced Caesar Cipher Method
In the field of Computer Science, proper storage and analysis of data is one of the most trending topics. The development of modern tools and techniques, has come down as a blessing for this. But along with the blessing, comes the curse of being easily attacked and the privacy of the data being vulnerable. The attackers and the hackers are becoming very smart and with their modern equipment, they can break into any system. For this several methods have been developed to save the privacy of our data. Out of these methods, the symmetric key method and the asymmetric key method are the most popular ones. Though both of the methods are powerful enough, they come with their own set of disadvantages. In this research work, an approach has been taken, where the combination of both the above spoken methods are used, making use of the advantages of both the methods, where both of them are also cancelling out each others disadvantages. The results confirmed that the accuracy, efficiency and the security of the algorithms are good enough, so that it can be used to deal with real world problems.