Chinmoy Ghosh - Academia.edu (original) (raw)
Related Authors
Kalyani Government Engineering College
Uploads
Papers by Chinmoy Ghosh
In this paper, a new approach has been applied for Image encryption using genetic algorithm. In g... more In this paper, a new approach has been applied for Image encryption using genetic algorithm. In genetic algorithm Crossover operation assembles existing genes and mutation operation produces new genes. Here, for each pair of pixels binary value of an image the crossover and mutation are applied to encrypt the image. Different test analysis like correlation, entropy test and histogram analysis is done for verification of the performance of the algorithm.
International Journal of Advanced Research in Computer Science, 2017
Now days the information become the valuable assets and private information must be protected fro... more Now days the information become the valuable assets and private information must be protected from being compromised. Today we use different sophisticated, robust encryption algorithm which are vulnerable to classical computational attack as well as the powerful parallel quantum computer. In this paper, we examine limitations and vulnerabilities and attacks to which Quantum Key Distribution can be exposed.
Lecture Notes in Electrical Engineering, 2020
In this paper, a new approach has been applied for Image encryption using genetic algorithm. In g... more In this paper, a new approach has been applied for Image encryption using genetic algorithm. In genetic algorithm Crossover operation assembles existing genes and mutation operation produces new genes. Here, for each pair of pixels binary value of an image the crossover and mutation are applied to encrypt the image. Different test analysis like correlation, entropy test and histogram analysis is done for verification of the performance of the algorithm.
International Journal of Advanced Research in Computer Science, 2017
Now days the information become the valuable assets and private information must be protected fro... more Now days the information become the valuable assets and private information must be protected from being compromised. Today we use different sophisticated, robust encryption algorithm which are vulnerable to classical computational attack as well as the powerful parallel quantum computer. In this paper, we examine limitations and vulnerabilities and attacks to which Quantum Key Distribution can be exposed.
Lecture Notes in Electrical Engineering, 2020