A Survey on Security Mechanism using Colors and Armstrong Numbers
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014

A Survey on Security Mechanism using Colors and Armstrong Numbers

Nutan Gurav, Pratap Singh

In today's tech-savvy world, electronic media is a basic necessity. Modern ways of communication have replaced the simplest of tasks. As the growing computer use implies a need for automated tools for protecting files and other information. The use of networks and communications facilities for carrying data between users and computers is also growing. Network security measures are needed to protect data during transmission, hence data security is very important. In this paper we analyze different techniques of cryptography to secure the data at the time of transmission and along with newly discovered cryptography algorithm that provides more security in data transmission.

Keywords: Encryption, Decryption, Armstrong Number, Authentication, color, matrices

Edition: Volume 3 Issue 12, December 2014

Pages: 2535 - 2538

Share this Article

How to Cite this Article?

Nutan Gurav, Pratap Singh, "A Survey on Security Mechanism using Colors and Armstrong Numbers", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB141133, Volume 3 Issue 12, December 2014, 2535 - 2538

104 PDF Views | 79 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Encryption'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1737 - 1740

Enabling Data Dynamics and Achieving Access Control and Assured Deletion in Cloud

Nilam Musale, Vilas Gaikwad

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1812 - 1814

A Survey on Deduplication Scheme in Cloud Storage

Deepa.D, Revathi.M

Share this Article

Similar Articles with Keyword 'Decryption'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2025 - 2029

Investigation of Security in Cloud Computing

Annu Devi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1436 - 1439

Secure Transmission in Ad-hoc Network: Using Combined Cryptography

Nilesh T Patil

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1833 - 1836

A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing

Roshan M. Kawale, Bharti L. Dhote

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 930 - 932

Effective Approach to Detection of Password File Using Honeywords

Dipali Dhumal, Shyam Gupta

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

Similar Articles with Keyword 'Authentication'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2234 - 2237

Analysis of Protective Mechanism in Roaming Network for Secure Communication

Ashwini A. Lokhande, Sonali U. Nimbhorkar

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1565 - 1567

A Region Boundaries Algorithm for Ear Authentication Based on Plots

G. Harsha Vardhan, K. Jeeva

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1724 - 1727

Privacy Preserving Authenticity Framework for Shared Data Cloud Network

P. Vanitha Sree, K. Narayana Rao

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 842 - 845

Defending Against Source Routing Attacks in Wireless Ad-Hoc Networks

Srihari Babu Kolla, B. B. K. Prasad

Share this Article

Similar Articles with Keyword 'color'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1615 - 1620

Traffic Sign Detection via Graph Based Ranking and Segmentation Algorithm

Premsai Cheedella

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1702 - 1705

An Adaptive Recursive Reconstruction Technique for Segmentation of Images

Peram Nagamani, Gunna Kishore

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1295 - 1299

Video Analysis to Detect and Track Road Ahead for Safety

Laxmi, Dr. Neelam Srivastava

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 627 - 632

LoG Feature Extraction Based Photographic Detection

Sujitha B Cherkottu, Smija Das

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1656 - 1659

A Survey on Graph Partitioning Techniques

Santosh Nage, Girish Potdar

Share this Article

Similar Articles with Keyword 'matrices'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2124 - 2127

Medical Image Compression Using ISPIHT & JPEG2000 Hybrid

Yashpreet Sain

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2535 - 2538

A Survey on Security Mechanism using Colors and Armstrong Numbers

Nutan Gurav, Pratap Singh

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 826 - 829

Neural Systems Approach for Ammography Finding by Utilizing Wavelet Features

A. Mallareddy, A. Priyanka

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1232 - 1237

An Error-Based Statistical Feature Extraction Scheme for Double JPEG Compression Detection

Nivi Varghese, Charlse M Varghese

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 10, October 2017

Pages: 1778 - 1781

A Novel Message Encryption Strategy using Random Numbers for Point-To-Point Message Transfer

Surya Ahuja, Nishit Angrish

Share this Article
Top