Open Access Open Access  Restricted Access Subscription Access

Records and Organizers Security with the Assistance of Cryptography

Chinmaya Behera

Abstract


This paper principal point is progressed the use of cryptography and steganography to get documents and organizers in windows stage. It is a windows work area application. Here the clients can secure their various organizers in a substitute course of action, for example, reuse container, help and sponsorship, and so on. Whenever it is locked, for example as reuse repository, the main items in the locked coordinator will be concealed and supplanted with reuse canister's items. The locking and opening will be done with the help of passwords, which will be scrambled and taken care of in the data set. So additionally, this application would similarly help us with locking a singular substance record. By executing steganography, the substance record, pdf, PowerPoint slide and so forth can be switched over completely to picture and take care of safely. The calculation used for changing the substance archive over completely to picture and encoding unscrambling the mystery key is AES Calculation.

 


Full Text:

PDF

References


Juan-hua, Zhu; Ang, Wu; Kai, Guo. PC Lock Software Design Based On Removable Storage Device and

Dynamic Password. 2nd International Conference on Computer Engineering and Technology Journal 2010.(3).

Rajkumar Janakiraman, Sandeep Kumar, Sheng Zhang, Terence Sim, Using Continuous Face Verification to Improve Desktop Security. Seventh IEEE Workshop on Applications of Computer Vision,

(WACV/MOTION‟05).

Brendan Dolan-Gavitt, (May,2008). Forensic analysis of the Windows registry in memory. MITRE Corporation, 202 Burlington Road, Bedford, MA, USA.

Umut Uludag, Sharath Pankanti, Anil

K. Jain. Fuzzy Vault for Fingerprints.2010.

Ferhaoui Chafia, Chitroub Salim, Benhammadi Farid . A Biometric Crypto-system for Authentication. 2010.

Youn Joo Lee, Kang Ryoung Park, Sung Joo Lee, Kwanghyuk Bae, and Jaihie Kim .A New Method for Generating an Invariant Iris Private Key Based on the Fuzzy Vault System. 5th oct 2008.


Refbacks

  • There are currently no refbacks.