iG Protection (Data Encryption using Gestures)
Namit Mohale1, Sourabh Gupta2, Shubham Goyal3, Ruchi Goel4
1Namit Mohale, Department of Computer Science and Engineering, Maharaja Agrasen Institute of Technology (Affiliated to Guru Gobind Singh Indraprastha University), Rohini Sector-22, New Delhi, India.
2Sourabh Gupta, Department of Computer Science and Engineering, Maharaja Agrasen Institute of Technology (Affiliated to Guru Gobind Singh Indraprastha University), Rohini Sector-22, New Delhi, India.
3Shubham Goyal, Department of Computer Science and Engineering, Maharaja Agrasen Institute of Technology (Affiliated to Guru Gobind Singh Indraprastha University), Rohini Sector-22, New Delhi, India.
4Ruchi Goel, Department of Computer Science and Engineering, Maharaja Agrasen Institute of Technology (Affiliated to Guru Gobind Singh Indraprastha University), Rohini Sector-22, New Delhi, India.
Manuscript received on 04 July 2018 | Revised Manuscript received on 23 July 2018 | Manuscript published on 30 July 2018 | PP: 13-16 | Volume-7 Issue-3, July 2018 | Retrieval Number: B1745057218©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: In today’s world, unimaginable bytes of data is being generated every second around the globe. A lot of this data is private and confidential to individuals or organizations, and they do not wish for others to access this data. They might keep the data safe in portable drives, but as soon as the data gets connected to a network or is being transferred through a network, it becomes highly vulnerable to threats of it being stolen by hackers, as network has the biggest loopholes as compared to rest when it comes to security. The data is also vulnerable to being physically stolen. Depending on the delicacy of data, it could be highly misused for all you know it could be the nuclear launch codes. Here we propose a method to not only encrypt the data for protection, but to take it to a different level. Whilst data encryption algorithms auto-generate secret keys that are used to encrypt the data, we propose in our method to use hand gestures to generate to generate the key, each key being unique to a certain set and sequence of hand gestures, to be used as encryption key in encryption algorithm. Hence we are using Blowfish algorithm for data encryption and Open CV for gesture recognition. Blowfish being a symmetric key algorithm, the same set of gestures that were used to encrypt the data would be used to decrypt it.
Keywords: Data Encryption, Blowfish Algorithm, Gesture Recognition, Open CV, Artificial, Intelligence, Symmetric Key Encryption, Decryption
Scope of the Article: Application Artificial Intelligence and machine learning in the Field of Network and Database