Open Access   Article Go Back

Privacy Concern Code Generation Using Crypto Neural Scheme

Anaswara Venunadh1 , Shruthi N2 , Mannar Mannan3

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-5 , Page no. 824-828, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i5.824828

Online published on May 31, 2019

Copyright © Anaswara Venunadh, Shruthi N, Mannar Mannan . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Anaswara Venunadh, Shruthi N, Mannar Mannan, “Privacy Concern Code Generation Using Crypto Neural Scheme,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.824-828, 2019.

MLA Style Citation: Anaswara Venunadh, Shruthi N, Mannar Mannan "Privacy Concern Code Generation Using Crypto Neural Scheme." International Journal of Computer Sciences and Engineering 7.5 (2019): 824-828.

APA Style Citation: Anaswara Venunadh, Shruthi N, Mannar Mannan, (2019). Privacy Concern Code Generation Using Crypto Neural Scheme. International Journal of Computer Sciences and Engineering, 7(5), 824-828.

BibTex Style Citation:
@article{Venunadh_2019,
author = {Anaswara Venunadh, Shruthi N, Mannar Mannan},
title = {Privacy Concern Code Generation Using Crypto Neural Scheme},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {7},
Issue = {5},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {824-828},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4320},
doi = {https://doi.org/10.26438/ijcse/v7i5.824828}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i5.824828}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4320
TI - Privacy Concern Code Generation Using Crypto Neural Scheme
T2 - International Journal of Computer Sciences and Engineering
AU - Anaswara Venunadh, Shruthi N, Mannar Mannan
PY - 2019
DA - 2019/05/31
PB - IJCSE, Indore, INDIA
SP - 824-828
IS - 5
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
305 238 downloads 118 downloads
  
  
           

Abstract

Frequent imagination by cryptosystem designers that secrets will be manipulated in closed reliable computing environments. Unfortunately, computers and micro systems leak information about the operations they process. This paper examines self-organising neural network to securely transfer data through a given network. We also discuss approaches for building cryptosystems that can operate securely in existing system that leaks.

Key-Words / Index Term

Cryptography, code generation, key management, self-organizing neural networks, encryption, decryption (key words)

References

[1] Manel Dridi, Mohamed Ali Hajjaji, Belgacem Bouallegue, Abdellatif Mtibaa Cryptography of medical images based on a combination between chaotic and neural network IET Image processing,volume 10 isssue 11.
[2] Lipschitz-Hankel type involving products of Bessel functions,” Phil. Trans. Roy. Soc. London, vol. A247, pp. 529–551, April 1955. (references)
[3] R. M. Gray, “Vector quantization,” IEEE Acoust., Speech, Signal Processing Mag., pp. 9–31, Apr. 1984.
[4] [2] A. Gersho and Robert M. Gray, Vector Quantization and Signal Compression. London: Kluwer, 1992.
[5] J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892, pp.68–73.
[6] I. S. Jacobs and C. P. Bean, “Fine particles, thin films and exchange anisotropy,” in Magnetism, vol. III, G. T. Rado and H. Suhl, Eds. New York: Academic, 1963, pp. 271–350.
[7] K. Elissa, “Title of paper if known,” unpublished.
[8] R. Nicole, “Title of paper with only first word capitalized,” J. Name Stand. Abbrev., in press.
[9] Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron spectroscopy studies on magneto-optical media and plastic substrate interface,” IEEE Transl. J. Magn. Japan, vol. 2, pp. 740–741, August 1987 [Digests 9th Annual Conf. Magnetics Japan, p. 301, 1982].
[10] M. Young, The Technical Writer’s Handbook. Mill Valley, CA: University Science, 1989.[10] M. Hu, J. Liu, and D. Luo, “Adaptive digital watermarking using neural network techniques”, in Proc. Of the 37th Annual Carnahan on intelligent control and Automation, vol. 5, pp. 4066-4069, 2004.
[11] Z. W. N. Wang, and B. Shi, “A novel bind watermarking scheme based on neural network in wavelet domain”, in Proc. Of the 6th World Congress on Intelligent Control and Automation, vol. 1, pp. 3024-3027, 2006.
[12] W. Kinzel, and I. Kanter, “Neural Cryptography”, in Proc. 9th Int’l Conf. on Neural information Processing (ICONIP’02), vol. 3, pp. 1351-1354,2002.
[13] E. Kilen, R. Mislovaty, I. Kanter, A. Ruttor, and W.Kinzel, “Synchronization of neural network by mutual learning and its application to cryptography”, in Proc. NIPS, pp. 689-696, 2004.
[14] R. M. Jogdand, Sahana S. Bisalapur, “Design of an efficient neural key generation”, International Journal of Artificial Intelligence and Application (IJAIA), vol. 2, No.1, 60-69, 2011.
[15] Ajit Singh, Aartinandal, “Neural cryptography for secret key exchange and encryption with AES”,International Journal of Advanced researched in computer science and software Engineering, vol. 3, issue. 5,376-381,2013.
[16] A. Ruttor, W. Kinzel, I. Kanter, “Neural cryptography with queries”, J. stat. Mech., P01009, 2005