0% found this document useful (0 votes)
104 views2 pages

Secured Image Communicator

This document summarizes a secured image communicator system that encrypts and decrypts images for secure transmission over the internet. The key functions of the system include: 1) User management with admin and operator roles 2) Encrypting images using algorithms like RSA and AES 3) Decrypting encrypted images back to their original format 4) Sending encrypted images to other users 5) Receiving encrypted images that were sent 6) Allowing operators to change their passwords. The system aims to securely transmit important images for defense and research organizations over networks and prevent unauthorized access.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
104 views2 pages

Secured Image Communicator

This document summarizes a secured image communicator system that encrypts and decrypts images for secure transmission over the internet. The key functions of the system include: 1) User management with admin and operator roles 2) Encrypting images using algorithms like RSA and AES 3) Decrypting encrypted images back to their original format 4) Sending encrypted images to other users 5) Receiving encrypted images that were sent 6) Allowing operators to change their passwords. The system aims to securely transmit important images for defense and research organizations over networks and prevent unauthorized access.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Secured Image communicator Abstract: Internet based communications are evolving at a tremendous rate.

Encryption of data has become an important way to protect data resources especially on the Internet, intranets and extranets. Encryption involves applying special mathematical algorithms and keys to transform digital data into cipher code before they are transmitted and decryption involves the application of mathematical algorithms and keys to get back the original data from cipher code. The goal of security management is to provide authentication of users, and integrity, accuracy and safety of data resources. Moreover, an image-based data requires more effort during encryption and decryption. In most of the defense and other research organizations, they need to send and receive the import images related to weapon designs, maps, satellite pictures etc. If those images are sending normally hackers can tap the images and import information is leaked out. In order to overcome this difficult, the image to be processed is first encrypted and then it is decrypted so that no intermediate users can read the images unauthorized. For this standard encryption, decryption algorithms are used such as RSA, AES, DSA etc. Some of the functions of the proposed system: 1. User Management this is the option of admin. This system is provided with two types of users. One Admin and second is operator. Admin do user management.

2. Encrypting Images Images are encrypted in this operation. 3. Decrypting Images any image can be decrypted to its original format, 4. Sending Images An Encrypted image can be forward to a user. 5. Receiving Images it is possible receive the sent images through this. 6. Change Password It allows an operator to change his/her password whenever it is needed. Hardware Requirements Processor: P-IV Processor RAM : 1 GB HDD : 80 GB Network: Internet/Intranet Software Requirements Operating System: Windows Server Front End: HTML/AWT/SWING

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy