IJPAM: Volume 116, No. 3 (2017)

Title

FUZZY APPLICATION IN SECURED DATA TRANSMISSION

Authors

M. Muthumeenakshi$^1$, T. Archana$^2$, P. Muralikrishna$^3$
$^1$Department of Commerce
VIT University
Vellore, 632014, Tamilnadu, INDIA
$^2$School of Computer Science and Engineering
VIT University
Vellore, 632014, Tamilnadu, INDIA
$^3$PG and Research Department of Mathematics
Muthurangam Government Arts College (Autonomous)
Vellore, 632002, Tamilnadu, INDIA

Abstract

The art or science encompasses the principles and methods of transforming an intelligible message into unintelligible, and then, retransforms that message back to its original form for more security. The objective is to develop simple, real time and secure system, which can be achieved through the software implementation. In this article, a fuzzy logic approach has been introduced to embed the encrypted message.

History

Received: 2017-06-12
Revised: 2017-09-28
Published: October 26, 2017

AMS Classification, Key Words

AMS Subject Classification: 68P25, 94A60
Key Words and Phrases: encryption, decryption, fuzzy subset, fuzzy membership function

Download Section

Download paper from here.
You will need Adobe Acrobat reader. For more information and free download of the reader, see the Adobe Acrobat website.

Bibliography

1
Chandrasekaran. V.M. , Manimaran, A and Akhil Ranjan, Cryptography using a pair of dice, International Journal of PharmTech Research, (2015) 7(1), 85-89.

2
Monisha S and Kowar MK, Generation of quasigroup for cryptographic application. Indian Journal of Science and Technology, (2009) 2(11), 35–6.

3
Narander Kumarand Priyanka Chaudhary, Performance Evaluation of Encryption/Decryption Mechanisms to Enhance Data Security, Indian Journal of Science and Technology, (2016) 9(20), 1-10.

4
Yamuna.M and Karthika.K, Data Transfer using bipartite graph, International Journal of Advance Research In Science And Engineering, (2015) 4(2), 128-131.

5
Vineet Sukhraliya , Sumit Chaudhary and Sangeeta Solanki, Encryption and Decryption Algorithm using ASCII values with substitution array Approach, International Journal of Advanced Research in Computer and Communication Engineering, (2013) 2(8), 3094-3097.

6
Wael Mahmoud Al Etaiwi, Encryption Algorithm using Graph Theory, Journal of Scientific Research & Reports, (2014) 3(19), 2519–2527.

7
Zadeh L.A, Fuzzy Sets, Inform Control, (1965) 8, 338-353.

How to Cite?

DOI: 10.12732/ijpam.v116i3.17 How to cite this paper?

Source:
International Journal of Pure and Applied Mathematics
ISSN printed version: 1311-8080
ISSN on-line version: 1314-3395
Year: 2017
Volume: 116
Issue: 3
Pages: 711 - 715


Google Scholar; DOI (International DOI Foundation); WorldCAT.

CC BY This work is licensed under the Creative Commons Attribution International License (CC BY).