Implementation of Encryption and Decryption Techniques in Data Transaction

  • Dilmurod Akhmedov Amity University Tashkent, Uzbekistan
Keywords: Network, Encryption, Security, Decryption, Classification

Abstract

An application is to make sure about all records from various clients. It is worried about scrambling the data most safely and heartily. It additionally incorporates the calculation that changes over the given content information into an alternate structure. This task additionally incorporates a great key age that makes sure about the given record from malignant clients. This venture permits clients to encode their significant documents from different clients. It gives gigantic security from destructive clients. Record Encryption incorporates Audio Encryption, Video Encryption, Picture Encryption and Text File Encryption. Data Hiding of this venture incorporates Watermarking and Steganography to stow away the data in the picture. Watermarking incorporate key age to make sure about the content from different clients. Steganography incorporates the instrument to change over the information into another dependent on some Algorithm.

References

1. R.Datta, D. Joshi, and J.Z. Wang (2007), “Image Retrieval: Ideas, Influences, and Trends” ACM
Computing Surveys, vol. 40, article 5
2. A.W.M. Smeulders, M. Worring, S. Santini, A. Gupta, and R. Jain (2000),“Content-Based Image Retrieval,”IEEE Trans. Pattern Analysis and Machine Intelligence,
vol. 22, no. 12, pp. 1349-1380
3. Y. Rui, T. S. Huang, M. Ortega, and S. Mehrotra(1998), “Relevance Feedback: A Power Tool for Interactive Content-Based Image Retrieval,” IEEE Trans. Circuits
and Systems for Video Technology, vol. 8, no. 5, pp. 644-655
4. X. S. Zhou and T.S. Huang (2003), “Relevance Feedback in Image Retrieval: A Comprehensive Review,” Multimedia Systems, vol. 8,pp. 536-544D.G.Savakar, Anand Ghuli (2015), “Digital Watermarking A Combined Approach by DWT, Chirp-Z and Fast WalshHadamard Transform”, IJCTA, Vol. 5 No.6, pp 2006-
2010.
5. D. G. Savakar, Anand Ghuli (2015), “Digital
Watermarking as a distributed noise by Discrete Wavelet Transformation, Fast Fourier Transformation and Fast Walsh-Hadamard Transform to study the sensitivity between Robustness and Fidelity”, IJCA, Issue 1, Volume 5, pp 102-107
6. Dayanand G. Savakar (2012), Identification and
Classification of Bulk Fruits Images using Artificial Neural Networks. International Journal of Engineering and Innovative Technology (IJEIT), Volume 1, Issue 3,
Pages: 35-40
7. Dayanand G. Savakar (2012), Recognition and
Classification of Similar Looking Food Grain Images using ANN, Journal of Applied Computer Science and Mathematics ,Volume 13(6), Pages: 61- 65
Published
2021-12-04
How to Cite
Akhmedov, D. (2021). Implementation of Encryption and Decryption Techniques in Data Transaction. International Journal of Human Computing Studies, 3(10), 1-6. https://doi.org/10.31149/ijhcs.v3i10.2432
Section
Articles