Open Access Open Access  Restricted Access Subscription Access

Files and Folders Security with the Help of Cryptography

Veeranna Kotagi, Prakash Chandra Behera, Chinmaya Dash

Abstract


This paper fundamental point is advanced the usage of cryptography and steganography to secure files and folders in windows stage. It is a windows desktop application. Here the clients can lock their different folders in an alternate arrangement such as recycle receptacle, help and backing, etc. Once it is locked, for instance as recycle receptacle, the first contents of the locked organizer will be covered up and replaced with recycle canister's contents. The locking and unlocking will be finished with the assistance of passwords, which will be encrypted and put away in the database. So also, this application would likewise assist us with locking an individual content record. By executing steganography, the content document, pdf, PowerPoint slide etc can be converted to picture and put away securely. The algorithm utilized for converting the content document to picture and encrypting-decrypting the secret key is AES Algorithm.


Full Text:

PDF

References


Juan-hua, Zhu; Ang, Wu; Kai, Guo. PC Lock Software Design Based On Removable Storage Device and

Dynamic Password. 2nd International Conference on Computer Engineering and Technology Journal 2010.(3).

Rajkumar Janakiraman, Sandeep Kumar, Sheng Zhang, Terence Sim, Using Continuous Face Verification to Improve Desktop Security. Seventh IEEE Workshop on Applications of Computer Vision,

(WACV/MOTION‟05).

Brendan Dolan-Gavitt, (May,2008). Forensic analysis of the Windows registry in memory. MITRE Corporation, 202 Burlington Road, Bedford, MA, USA.

Umut Uludag, Sharath Pankanti, Anil

K. Jain. Fuzzy Vault for Fingerprints.2010.

Ferhaoui Chafia, Chitroub Salim, Benhammadi Farid . A Biometric Crypto-system for Authentication. 2010.

Youn Joo Lee, Kang Ryoung Park, Sung Joo Lee, Kwanghyuk Bae, and Jaihie Kim .A New Method for Generating an Invariant Iris Private Key Based on the Fuzzy Vault System. 5th oct 2008.

Wiedenbeck, S., J.C. Birget, A. Brodskiy, and N. Memon. Authentication Using Graphical Passwords: Effects of Tolerance and Image Choice. ACM SOUPS, 2005.

S. Wiedenbeck, J.C. Birget, A. Brodskiy, N. Memon. Authentication Using Graphical Passwords: Effects of Tolerance and Image Choice. ACM SOUPS 2005.


Refbacks

  • There are currently no refbacks.