IOSR Journal of Computer Science (IOSR-JCE) e-ISSN: 2278-0661, p-ISSN: 2278-8727 PP 43-46 www.iosrjournals.org International Conference on Advances in Engineering & Technology 2014 (ICAET-2014) 43 | Page Efficient TIMG Algorithm for Secure Transmission of Data Sujeet More 1 , Mohammed Mujeeb Arab 2 Asst. Prof, Dept of Computer Science Shaikh College of Engg and Technology, Belgaum 1 sujeetmore7@gmail.com 2 mujeeb017@gmail.com Abstract--- Cryptography is the process where an individual or message sending by party to other individual such that only the authorize party will get the scrambled message, which will be unscrambled to get the original message. In the public network hacking is the biggest problem. Many existing encryption algorithms like DES, 3DES, AES, and RC6 have been used to protect different-different types of attacks to eavesdrop or prevent the data to be communicating to the end-user safely. In this paper, a new encryption algorithm for transfer of data is proposed to achieve the different goals of security i.e., Integrity, Availability, and Confidentiality. This new TIMG algorithm is based on combination of two algorithms. The results show better efficiency compared to different existing algorithms. Keywords--- Decryption, Encryption, Key generation, Pixel, Security, TIMG Algorithm. I. INTRODUCTION The people have to be assured that the information to be read by only the sender and receiver. The basic need to provide security is using cryptography. In our work we are combining neural network and cryptography. Cryptography is often seen as an art something other understand but this is need. These of course need not the case at all. Cryptography is security engineering technique where it is used mathematics. It provides us with the tools that underlie most modern security approaches. It is the key driven technique for protecting information. Cryptography is the science of writing in secret code and is an ancient art. There are a number of security concerns in a dynamic and agile context; especially data confidentiality is regarded as on of the most fundamental issues. There are various cryptosystem dominating the area of information security and one of them is symmetric key algorithm. In this symmetric key algorithm, same secret key is used for encryption & decryption which is only known by sender and receiver of exchanged message and keep confidential to other irrelevant entities. At present various encryption algorithms have been proposed & widely used such as DES, IDEA, RSA, AES etc. Most of which are used for text & binary data. The secrecy of the message will be protected well when key is kept confidential. Since wireless devices is equipped with battery as their power supply, they have limited computational capabilities and one of them main concern is energy saving. But it cannot be achieved if the encryption & decryption is applied on the complete message. As a result an efficient pixel encryption algorithm is the potential solution to save power for wireless devices and at the same time to sufficiently protect the data. In this article we mainly study how to encrypt pixels, as it is selective approach to conserve time of data transmission and energy of network. Through applying this method our proposed scheme enhances the features of pixel encryption and avoiding the relevance between different messages. Thus we present the solution for the issue of applying traditional symmetric key algorithm along with pixel encryption for data protection in dynamic environment, such as MANET, WANET etc. The paper is divided in five sections. Section 1 presents introduction about cryptography, Section 2 presents proposed work, Section 3 presents implementation algorithm Section 4 presents results and Section 5 presents conclusion and future work. II. PROPOSED WORK Using cryptography the hackers can know that there is some data is transferring. So that, they can modify the data during the message transfer. In order to overcome this we are proposing a model. In our model we are using a combined technique. Using combined technique we can hide the original message in a hidden format. So that the hacker even cannot expect that there some message present in it. Firstly we embed original data into an