Document verification using quick response code with modified secure hash algorithm-1 and modified blowfish algorithm
نویسندگان
چکیده
A previous study has been conducted integrating modification on secure hash algorithm 1 (SHA-1) to document integrity verification of printed documents using quick response (QR) codes. However, encryption is warranted as data transmitted in plaintext directly the server prevent hacking and ensuring not only but security well. more secured QR code was designed developed by successfully incorporating a better hashing algorithm– modified SHA-1 modern algorithm–modified blowfish algorithm. By both, confidentiality assured compared research. The software checked against user requirements check acceptability software. Error rate accuracy were also see how performed. Based testing conducted, it found that with integration Modified Blowfish acceptable, accurate, secure.
منابع مشابه
A Wavelet Transform Based Secure Data Transfer Using Blowfish Algorithm
The modern era has seen ample number of cryptographic and stenographic techniques to transmit and receive data in a secure and confidential manner. In our paper we use a multi resolution wavelet domain by collaborating the concepts of steganography and cryptography. Initially we use a modified blowfish algorithm and will embed the encrypted message into an image. At the later part of the techni...
متن کاملSecure Secret Key Transfer Using Modified Hash Based LSB method
Recent advancements in computer security have shifted the focus of security officials from, using only the cryptography techniques to using steganography as well, or the combination of both. In steganography the most widely used technique is the LSB method, but this technique being the simplistic of all, is well known and hence is vulnerable to attacks. However, modifying the LSB method to the ...
متن کاملA Hybrid Data Clustering Algorithm Using Modified Krill Herd Algorithm and K-MEANS
Data clustering is the process of partitioning a set of data objects into meaning clusters or groups. Due to the vast usage of clustering algorithms in many fields, a lot of research is still going on to find the best and efficient clustering algorithm. K-means is simple and easy to implement, but it suffers from initialization of cluster center and hence trapped in local optimum. In this paper...
متن کاملA Secure Hash Function MD-192 With Modified Message Expansion
Cryptographic hash functions play a central role in cryptography. Hash functions were introduced in cryptology to provide message integrity and authentication. MD5, SHA1 and RIPEMD are among the most commonly used message digest algorithm. Recently proposed attacks on well known and widely used hash functions motivate a design of new stronger hash function. In this paper a new approach is prese...
متن کاملSolving the Unit Commitment Problem Using Modified Imperialistic Competition Algorithm
One of the most important problems for power system operation is unit commitment (UC), for which different constraints should be satisfied. UC is a nonlinear and large-scale problem; thus, using the evolutionary algorithms has been considered for solving the problem. In this paper, the solution of the UC problem was investigated using Modified Imperialistic Competition Algorithm (MICA). Simula...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Indonesian Journal of Electrical Engineering and Computer Science
سال: 2022
ISSN: ['2502-4752', '2502-4760']
DOI: https://doi.org/10.11591/ijeecs.v28.i1.pp470-479