PlumX Metrics
Embed PlumX Metrics

Enhancing security for document exchange using authentication and GAN encryption

Multimedia Tools and Applications, ISSN: 1573-7721, Vol: 83, Issue: 28, Page: 71203-71233
2024
  • 1
    Citations
  • 0
    Usage
  • 1
    Captures
  • 1
    Mentions
  • 0
    Social Media
Metric Options:   Counts1 Year3 Year

Metrics Details

  • Citations
    1
  • Captures
    1
  • Mentions
    1
    • News Mentions
      1
      • 1

Most Recent News

New Information and Data Encoding and Encryption Study Findings Have Been Reported by Investigators at University of Sfax (Enhancing Security for Document Exchange Using Authentication and Gan Encryption)

2024 MAR 04 (NewsRx) -- By a News Reporter-Staff News Editor at NewsRx Policy and Law Daily -- Research findings on Information Technology - Information

Article Description

The real threat to the privacy of a plain document exchanged over insecure channels is content manipulation or eavesdropping by unauthorized parties. To protect a transferred document, the architecture proposed in this paper offers encryption, authentication, and scrambling GAN with shuffle confusion (EAGAN) comprehensively with a relatively rapid execution time average of 2s for each colored document. The EAGAN encrypts and signs the document content at the origin point (sender side) and then decrypts and verifies the cipher document at the receiver side, achieving two verification levels and three levels of confidentiality, reinforced with two keys of chaos and equal document content. Each document has a unique hash value (signature or identity) with a QR code watermark to detect forgery, even when the change is small (even by one bit), without depending on any third party. If case the intermediate encrypted document, the neural network model (Decoder-Key), the cipher document, or the initial values of the Chaos Key are leaked, an unauthorized person won’t be able to retrieve the document. As proven by the experiments in this paper, EAGAN has characteristics that make it more resistant to security threats.

Bibliographic Details

Provide Feedback

Have ideas for a new metric? Would you like to see something else here?Let us know