0% found this document useful (0 votes)
11 views12 pages

Image Encryption and Decryption REVIEW 2

Uploaded by

ccgovardhan60
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views12 pages

Image Encryption and Decryption REVIEW 2

Uploaded by

ccgovardhan60
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

HINDUSTAN INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


ECS51803: Design Project
IMAGECRPTOR3DE
S

NAME:GOVARDHAN NAME:LOKESH NAME:HEMANTH


22112006 22112005 22112007
PROJECT SUMMARY

Problem statement solution Plan for next 6


weeks
Maintaining Image Quality and The encryption and decryption process ensures
Integrity that the original image quality is retained after
decryption, without any loss or corruption of data.
User-Friendly Interface for a user interface (UI) that allows users to easily
Encryption/Decryption select images and apply encryption or decryption.
This reduces complexity for users who might not
be familiar with cryptography.
Efficient Encryption for Large Although 3DES is computationally more intensive
Image Files than single DES, optimizations in the code ensure
that large images can be encrypted and
decrypted in reasonable time frames without
compromising security.
Adaptability for Various Image The tool supports multiple image formats, such as
Formats JPEG, PNG, and BMP, making it versatile for
various use cases.
Literature review
TITLE AUTHORS REMARKS

Performance (Pronika, S.S.Tyagi)- 1. The paper benchmarks encryption and decryption algorithms on
analysis of 2021 metrics like time complexity and resource utilization, offering
encryption and valuable insights into their efficiency.
decryption 2. It emphasizes the need for a balance between performance and
algorithm security, addressing potential vulnerabilities in the algorithms.
3. The findings indicate practical applications in secure
communications and data protection, showing the algorithms'
suitability for real-world use.
A Review Paper ( Bharti Kaushik, 1. The paper offers a thorough overview of various encryption and
on Data Vikas Malik, Vinod decryption techniques, highlighting their strengths and
Encryption and Saroha)-2023 weaknesses.
Decryption 2. It discusses recent advancements in cryptographic algorithms,
emphasizing their relevance to contemporary security
challenges.
3. The authors suggest future research directions, encouraging
exploration of hybrid models and improved key management
Analytical Study of Chiranji Lal Chowdhary, 1. The paper evaluates hybrid encryption techniques for
Hybrid Techniques for Pushpam Virenbhai Patel )- improving image security through combined methods.
Image Encryption and 2020 2. It compares performance metrics such as encryption
Decryption speed and security level, providing valuable insights.
3. The authors highlight practical applications in secure
communications and digital watermarking.
An Efficient and (Mohan Naik Ramachandra, 1. The paper enhances big data security in cloud storage
Secure Big Data Jayachandra Ananda)-2022 using the Triple Data Encryption Standard.
Storage in Cloud 2. It addresses efficiency improvements in data handling
Environment by Using and encryption processes for big data.
Triple Data Encryption 3. The authors highlight the method's robust security and
Standard high performance in cloud applications.

Various Techniques to (Ankita Laad,Khushboo 1. The paper reviews various techniques for data
Perform Encryption Sawant)-2021 encryption and decryption.
and Decryption of 2. It compares the effectiveness and security of different
Data encryption methods.
3. The authors discuss the practical applications of these
techniques in real-world scenarios.

An enhanced (R.Priyadarshini,abdul)-2022 1. The paper presents an enhanced encryption-based


encryption-based security framework for cloud computing in cyber-
security framework in physical systems (CPS).
the cps cloud 2. It focuses on improving data security and integrity in
cloud environments.
3. The authors discuss the framework's effectiveness in
mitigating security threats in CPS.
RSA and Elliptic Curve (Musa,marion)-2024 1. The paper compares RSA and Elliptic Curve
Encryption System Encryption systems for data security.
2. It analyzes the strengths and weaknesses of
each encryption method.
3. The authors highlight practical applications
and performance considerations for both
systems.

Encryption and Decryption of (Aparna , meera )-2024 1. The paper explores using QR decomposition
messages using QR for the encryption and decryption of
Decomposition messages.
2. It discusses the mathematical foundation
and effectiveness of this approach.
3. The authors highlight potential applications
in secure communication.
Image encryption and decryption (OJO , Folorunso Fidelis )- 1. The paper focuses on image encryption and
using triple data encryption 2022 decryption using the Triple Data Encryption
standard (3des) algorithm Standard (3DES) algorithm.
2. It analyzes the effectiveness of 3DES in
securing image data.
3. The authors discuss potential applications
and benefits in digital image protection.
DEVELOPMENT MODULES

1.Dashboard Module
Description: The central interface for users to access encryption and decryption functionalities.
Functionality: The dashboard provides two main buttons: "Encrypt" and "Decrypt," allowing the user to navigate to the
respective features.

2.Encryption Module
Description: Allows users to encrypt images using Triple DES (3DES) encryption.
Functionality:
 Upload an image (via drag-and-drop or file selector).
 The image is displayed and processed into a base64 data URL.
 The user enters a secret key, and the image is encrypted using 3DES.
 The encrypted image is then saved as a downloadable text file.
DEVELOPMENT MODULE

3.Decryption Module
Description: Facilitates the decryption of previously encrypted images.
Functionality:
 The user uploads the encrypted file (text format).
 A secret key is entered to decrypt the file.
 If the decryption is successful, the decrypted image is generated and available for download.
 Error handling is in place to alert users if the key is incorrect.

4. Encryption/Decryption Logic (JavaScript)

Description: Implements the core cryptographic operations using the CryptoJS library for 3DES encryption and
decryption.
Functionality:
•In the encryption module, the image data is encrypted using the secret key and CryptoJS.
•In the decryption module, the encrypted data is decrypted using the provided key and rendered for download.
OUTPUT
Decryption

encrypti
on
RESULT

 1. Overview of Results

• The ImageCryptor3DES project successfully implements encryption and decryption of images using
the Triple DES algorithm.
• Tested with various image types and sizes to ensure reliability and security.
 2. Functionality Demonstration

• Encryption Process:
• Input: Original image file (e.g., JPG, PNG).
• Output: Encrypted image file (cipher text).
• Key Length: 168 bits (Triple DES uses multiple keys).
• Decryption Process:
• Input: Encrypted image file.
• Output: Original image restored from cipher text.
RESULT
 3. Security Analysis

• Encryption Strength: Triple DES provides a high level of security against brute-force attacks.
• Key Management: The program securely generates and manages encryption keys, ensuring they are
not hardcoded or easily accessible.
 4. Test Cases and Results

• Sample Images Tested:


• Image A: 256x256 pixels, encryption and decryption successful.
• Image B: 1024x768 pixels, encryption and decryption successful.
• Edge Cases: Successfully handled images with varying sizes and formats without loss of data.
 5. Conclusion

• The project demonstrates that Triple DES can effectively encrypt and decrypt images while maintaining
quality.
• The implementation is efficient, with acceptable execution times for a variety of image sizes.
REFERENCES

 Anup & Suchithra (2017). "Image Encryption using Triple DES Algorithm” Imperial Journal of Interdisciplinary
Research (IJIR) 3(5); Pg 23.
 Archana M., Kaushik S., Kaushal T. & Brijesh U. (2016). "A Literature Survey on Image Encryption";
Department of Computer Engineering, GIDC Degree Engineering College, Abrama, Navsari, Gujarat, India.
2(6); Pg. 15.
 Diaa S., Hatem M., & Mohiy H. (2010). "Evaluating the Performance of Symmetric Encryption Algorithms"
International Journal of Network Security, 10(3) Pg. 213-219
 Diaa S., Hatem M., & Mohiy H. (2010). "Evaluating the Effects of Symmetric Cryptography Algorithms on
Power Consumption for Different Data Types" International Journal of Network Security; 11(2), Pg.78-87.
 Fauzan S. & Mustafa R. (2010). "Integrating Classical Encryption with Modern Technique”; International
Journal of Computer Science and Network Security (IJCSNS), 10(5). P 261-270.
 Kamlesh G. & Sanjay S. (2009). "Chaos Based Image Encryption Using Block-Based Transformation
Algorithm"; International Journal of Computer and Network Security (IJCNS), 1(3), Pg. 32-35.
 Karthik S. & Muruganandam A. (2014): "Data Encryption and Decryption by Using Triple DES and Performance
Analysis of Crypto System"; International Journal of Scientific Engineering and Research (IJSER). 2(11).

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy