Sign In to Follow Application
View All Documents & Correspondence

Method And System To Develop Data Encryption And Decryption Using Crypto Stego Ai Based

Abstract: Securing data encryption and decryption using Cryptography and Steganography techniques with AI based system. Due to recent developments in stego analysis, providing security to personal contents, messages, or digital images using steganography has become difficult. By using stego analysis, one can easily reveal existence of hidden information in carrier files. This invention introduces a novel steganographic approach for communication between two private parties. The approach introduced in this innovation makes use of both steganographic as well as cryptographic techniques. In Cryptography we are using AI based RSA. In Steganography we are using Image Steganography for hiding the data. And we also use Mutual Authentication process to satisfy all services in Cryptography i.e., Access Control, Confidentiality, Integrity, Authentication. In this way we can maintain the data more securely. Since we use AI-based RSA algorithm for securing the data and again on this we perform Steganography to hide the data in an image. Such that any other person in the network cannot access the data present in the network. Only the sender and receiver can retrieve the message from the data.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
02 June 2022
Publication Number
23/2022
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
sunil.t@ncetmail.com
Parent Application

Applicants

pavan kumar E
SAI VIDYA INSTITUTE OF TECHNOLOGY
BGANS
#12, 4th floor, 4th A cross, Vinayakanagara, Magadi main road, Bangalore 560079

Inventors

1. Sunil T
Assistant Professor, Dept of ECE Nagarjuna College of Engineering & Technology Mudugurki, Venkatagiri Kote Post, Devanahalli, Bangalore- 562 164
2. ASHOK KUMAR S
Assistant Professor, Dept of Electrical and Electronics Engineering, Chennai Institute of Technology, Sarathy Nagar, Kundrathur, Chennai – 600069, TamilNadu,
3. Himanshu Sharma
Assistant Professor, Dept of CSE, JECRC UNIVERSITY Plot No.IS-2036 to 2039,Ramchandrapura , Sitapura Industrial Area Extension, Near Mahatma Gandhi Hospital, Jaipur, Rajasthan – 303905
4. NIDHI GOUR
Assistant Professor, Dept of CSE, JECRC UNIVERSITY Plot No.IS-2036 to 2039,Ramchandrapura , Sitapura Industrial Area Extension, Near Mahatma Gandhi Hospital, Jaipur, Rajasthan – 303905
5. ANITHA K
Professor,Dept of ECE, Prathyusha Engineering College, Poonamallee- Tiruvallur Road, Aranvayal Kuppam Village, Aranvayal Post, Tiruvallur Taluk- 602025
6. KARTHIKEYAN R
Professor,Dept of ECE, Chennai Institute of Technology, Sarathy Nagar, Kundrathur, Chennai – 600069

Specification

Description:In the invention, Digital communication witnesses a noticeable and continuous development in many applications in the Internet. Hence, secure communication sessions must be provided. The security of data transmitted across a global network has turned into a key factor on the network performance measures. So, the confidentiality and the integrity of data are needed to prevent eavesdroppers from accessing and using transmitted data. Steganography and Cryptography are two important techniques that are used to provide network security.
Cryptography is one of the traditional methods used to guarantee the privacy of communication between parties. This method is the art of secret writing, which is used to encrypt the plaintext with a key into ciphertext to be transferred between parties on an insecure channel. Using a valid key, the ciphertext can be decrypted to the original plaintext. Without the knowledge of the key, nobody can retrieve the plaintext. Cryptography plays an essential role in many factors required for secure communication across an insecure channel, like confidentiality, privacy, non- repudiation, key exchange, and authentication. , C , C , Claims:1. A method for detect of anomalies in health record, the method comprising:
Securing data encryption and decryption using Cryptography and Steganography techniques with AI based system . Due to recent developments in stego analysis, providing security to personal contents, messages, or digital images using steganography has become difficult. By using stego analysis, one can easily reveal existence of hidden information in carrier files. This invention introduces a novel steganographic approach for communication between two private parties. The approach introduced in this innovation makes use of both steganographic as well as cryptographic techniques. In Cryptography we are using AI based RSA. In Steganography we are using Image Steganography for hiding the data. And we also use Mutual Authentication process to satisfy all services in Cryptography i.e., Access Control, Confidentiality, Integrity, Authentication. In this way we can maintain the data more securely. Since we use AI-based RSA algorithm for securing the data and again on this we perform Steganography to hide the data in an image. Such that any other person in the network cannot access the data present in the network. Only the sender and receiver can retrieve the message from the data.

2. An method according to claim 1,Capability of system implement AI based RSA model for secure data transmission .

3. An system according to claim 2,Capability of system to development of stego analysis

4. An system according to claim 1,Capability of system to detect anomalies data transmission.

Documents

Application Documents

# Name Date
1 202241031736-COMPLETE SPECIFICATION [02-06-2022(online)].pdf 2022-06-02
1 202241031736-FORM-9 [02-06-2022(online)].pdf 2022-06-02
2 202241031736-DRAWINGS [02-06-2022(online)].pdf 2022-06-02
2 202241031736-FORM 1 [02-06-2022(online)].pdf 2022-06-02
3 202241031736-FIGURE OF ABSTRACT [02-06-2022(online)].jpg 2022-06-02
4 202241031736-DRAWINGS [02-06-2022(online)].pdf 2022-06-02
4 202241031736-FORM 1 [02-06-2022(online)].pdf 2022-06-02
5 202241031736-COMPLETE SPECIFICATION [02-06-2022(online)].pdf 2022-06-02
5 202241031736-FORM-9 [02-06-2022(online)].pdf 2022-06-02