0% found this document useful (0 votes)
35 views2 pages

Photo Encryption Tool

The document proposes an app that uses image encryption techniques to securely store and share personal photos. The app would split secret images into multiple random images, and allow the original to be retrieved with minimal computation. This ensures privacy by requiring collective acceptance from multiple participants to access encrypted photos. The app provides two-step security by requiring login to view normal images, and authentication in the cloud to view encrypted ones. It has advantages like not needing keys, being robust against brute force attacks, and not reducing image quality or expanding file sizes. The app would run on Windows 7 or higher and require basic hardware components like an i3 processor, 5GB hard disk, 1GB RAM, and internet connection.

Uploaded by

sachin mohan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views2 pages

Photo Encryption Tool

The document proposes an app that uses image encryption techniques to securely store and share personal photos. The app would split secret images into multiple random images, and allow the original to be retrieved with minimal computation. This ensures privacy by requiring collective acceptance from multiple participants to access encrypted photos. The app provides two-step security by requiring login to view normal images, and authentication in the cloud to view encrypted ones. It has advantages like not needing keys, being robust against brute force attacks, and not reducing image quality or expanding file sizes. The app would run on Windows 7 or higher and require basic hardware components like an i3 processor, 5GB hard disk, 1GB RAM, and internet connection.

Uploaded by

sachin mohan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Photo encryption tool

Photos are our prized private possessions that we sometime want and sometimes don’t want
to share them with anyone.
Proposed app is a photo encryption tool that helps to maintain the privacy of personal photos
A secret image is split into multiple random images and with minimum computation the
original secret image can be retrieved back.
• The scheme is suitable for authentication based application or where trust cannot be
reposed in any one participant for decision making and a collective acceptance is
required to proceed.
• Ex: A typical scenario for this could be thought of as a secret code which has to be fed
in to commence a nuclear strike; the said code could be converted into an image and
split into random shares, held with the collective decision making body. To retrieve
the secret code random share of all the participants would be required

• An app that acts as a private vault to keep and share images encrypted using high security
algorithms .

• image encryption technique is used

• confidential graphical information, like coordinate cards, sensitive pics will be kept highly
secured using & stored in the cloud.

• It provides 2-step security,

– accessing normal images requires user to login

– accessing encrypted image requires authentication in cloud

Advantages

• No need of using keys, so key management is not an issue.

• It is robust to withstand brute force attack.

• Image quality is not reduced.

• No pixel expansion.

• Storage space consumed is exactly same as original image (no additional space).
Software Requirements:

 Windows 7 or higher.
 Mysql
 Sublime Text
 Xampp

Hardware Components:

 Processor – i3
 Hard Disk – 5 GB
 Memory – 1GB RAM
 Internet Connection

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy