Abstract
Currently, data security has been a major issue as data is usually transferred over the Internet between users. Some security flaw might leak sensitive data. For resolving this, we can use cryptography to secure data so that other unauthorized individuals can’t access the data stored in the file. Use of one cryptography algorithm might not provide higher level security for sensitive data. In this paper, we have proposed a new security system which uses three separate cryptography algorithms to provide better security for the data and facial recognition to verify the user who is currently using the system to provide better security. The file to be secured is split into three parts and is encrypted using AES, Blowfish and Twofish, respectively. File and user information are added to the database. The user of the system is verified using facial recognition during the authorization process in decryption phase.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
M. Jain, A. Agrawal, implementation of hybrid cryptography algorithm. Int. J. Core Eng. Manag. 1(3), 1–8 (2014)
P. Shaikh, V. Kaul, Enhanced security algorithm using hybrid encryption and ECC. IOSR J. Comput. Eng. (IOSRJCE) 16(3), 80–85 (2014)
A.E. Takieldeen, Design and implementation of hybrid encryption algorithm. Int. J. Sci. Eng. Res. 4(12), 669–673 (2013)
J.M. Najar, S.B. Dar, A new design of a hybrid encryption algorithm. Int. J. Eng. Comput. Sci. 3(11), 9169–9171 (2014)
J. Thakur, N. Kumar, DES, AES and Blowfish: symmetric key cryptography algorithms simulation based performance analysis. Int. J. Emerg. Technol. Adv. Eng. 1(2), 06–12 (2011)
H.K. Verma, R.K. Singh, Performance analysis of RC6, Twofish and Rijndael Block Cipher algorithms (2012)
F. Schroff, D. Kalenichenko, J. Philbin, FaceNet: a unified embedding for face recognition and clustering, 06–19 Oct 2015
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Khadka, S., Shah, N., Shrestha, R., Acharya, S., Karna, N. (2022). File Security Using Hybrid Cryptography and Face Recognition. In: Shakya, S., Bestak, R., Palanisamy, R., Kamel, K.A. (eds) Mobile Computing and Sustainable Informatics. Lecture Notes on Data Engineering and Communications Technologies, vol 68. Springer, Singapore. https://doi.org/10.1007/978-981-16-1866-6_38
Download citation
DOI: https://doi.org/10.1007/978-981-16-1866-6_38
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-1865-9
Online ISBN: 978-981-16-1866-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)