Cryptography for jpeg images using backpropagation neural network

By: Valenzuela, Jarlou T
Publisher: Cebu City ; CIT-U ; 2012DDC classification: T V235 2012 c.1 Summary: Millions of data are stolen from the internet, thus result to problems such as stolen identity, scandals and wide spread of piracy. There are already many ways existing to protect this data and one of which is cryptography. Cryptography is widely used to ensure security in open networks and maintain data secrecy. This study presents a new technique of Cryptography and a new application of artificial Neural Network. The system is designed to model the way in which the brain performs a task or function of interest. The system thus only accepts image data. The cryptography is designed to generate keys using ANNs, weighs generated are use to encrypt and decrypt the data. Backpropagation Neural Network and image processing are two main techniques applied. This study ensures that the desired result is achieved. For encryption, the encrypted data did not show similarities with the input data. For decryption, the encrypted data returns from its original form using the right key.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)

Millions of data are stolen from the internet, thus result to problems such as stolen identity, scandals and wide spread of piracy. There are already many ways existing to protect this data and one of which is cryptography. Cryptography is widely used to ensure security in open networks and maintain data secrecy. This study presents a new technique of Cryptography and a new application of artificial Neural Network.
The system is designed to model the way in which the brain performs a task or function of interest. The system thus only accepts image data. The cryptography is designed to generate keys using ANNs, weighs generated are use to encrypt and decrypt the data. Backpropagation Neural Network and image processing are two main techniques applied. This study ensures that the desired result is achieved. For encryption, the encrypted data did not show similarities with the input data. For decryption, the encrypted data returns from its original form using the right key.

000-099

There are no comments for this item.

to post a comment.