Conglomerate Encipher
B. Karthikeyan1, R. Phani Teja2, G. V. Gowtham3

1B.Karthikeyan, School of Computing, SASTRA Deemed to be University, Thanjavur (Tamil Nadu), India.
2R. Phani Teja, Information Technology, School of Computing SASTRA Deemed to be University, Thanjavur (Tamil Nadu), India.
3G.V.Gowtham, Information Technology, School of Computing, SASTRA Deemed to be University, Thanjavur (Tamil Nadu), India.

Manuscript received on 18 June 2019 | Revised Manuscript received on 25 June 2019 | Manuscript published on 30 June 2019 | PP: 2505-2508 | Volume-8 Issue-5, June 2019 | Retrieval Number: E7666068519/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: As the technology is growing day by day, the entire human activities are dependent on it, thereby the rate of transfer of data is increasing exponentially. The knowledge discovered from this data can be in the form of graphs, plots, images etc. Due to the loop holes in the technology, the attackers can retrieve the data which increases the rate of Cyber-crime. In this evolved world, images are playing a vital role in transmitting information. There is a need to implement few efficient protective schemes that provides higher security. In this paper one such protective scheme is proposed using Huffman code and AES mechanism. Firstly, the plain text is taken and encoded with Huffman code then the output obtained after encoding will be given as an input to the AES which results in the encrypted data. The encrypted data will be hidden into an image. Each character consists of 8 bits which are hidden in Grey image. After hiding this encrypted data into the grey image the original pixels of the image will be disturbed. In this paper we will calculate the (MSE) and (PSNR) between the original image and output image. The problem that might occur during this process is the output obtained from the Huffman code may not always produce 128-bit because AES need 128 bit as input to provide optimal solution.
Keywords: AES, Huffman Code, MSE, PSNR

Scope of the Article: Human Computer Interactions