Image Encryption and Decryption REVIEW 2
Image Encryption and Decryption REVIEW 2
Performance (Pronika, S.S.Tyagi)- 1. The paper benchmarks encryption and decryption algorithms on
analysis of 2021 metrics like time complexity and resource utilization, offering
encryption and valuable insights into their efficiency.
decryption 2. It emphasizes the need for a balance between performance and
algorithm security, addressing potential vulnerabilities in the algorithms.
3. The findings indicate practical applications in secure
communications and data protection, showing the algorithms'
suitability for real-world use.
A Review Paper ( Bharti Kaushik, 1. The paper offers a thorough overview of various encryption and
on Data Vikas Malik, Vinod decryption techniques, highlighting their strengths and
Encryption and Saroha)-2023 weaknesses.
Decryption 2. It discusses recent advancements in cryptographic algorithms,
emphasizing their relevance to contemporary security
challenges.
3. The authors suggest future research directions, encouraging
exploration of hybrid models and improved key management
Analytical Study of Chiranji Lal Chowdhary, 1. The paper evaluates hybrid encryption techniques for
Hybrid Techniques for Pushpam Virenbhai Patel )- improving image security through combined methods.
Image Encryption and 2020 2. It compares performance metrics such as encryption
Decryption speed and security level, providing valuable insights.
3. The authors highlight practical applications in secure
communications and digital watermarking.
An Efficient and (Mohan Naik Ramachandra, 1. The paper enhances big data security in cloud storage
Secure Big Data Jayachandra Ananda)-2022 using the Triple Data Encryption Standard.
Storage in Cloud 2. It addresses efficiency improvements in data handling
Environment by Using and encryption processes for big data.
Triple Data Encryption 3. The authors highlight the method's robust security and
Standard high performance in cloud applications.
Various Techniques to (Ankita Laad,Khushboo 1. The paper reviews various techniques for data
Perform Encryption Sawant)-2021 encryption and decryption.
and Decryption of 2. It compares the effectiveness and security of different
Data encryption methods.
3. The authors discuss the practical applications of these
techniques in real-world scenarios.
Encryption and Decryption of (Aparna , meera )-2024 1. The paper explores using QR decomposition
messages using QR for the encryption and decryption of
Decomposition messages.
2. It discusses the mathematical foundation
and effectiveness of this approach.
3. The authors highlight potential applications
in secure communication.
Image encryption and decryption (OJO , Folorunso Fidelis )- 1. The paper focuses on image encryption and
using triple data encryption 2022 decryption using the Triple Data Encryption
standard (3des) algorithm Standard (3DES) algorithm.
2. It analyzes the effectiveness of 3DES in
securing image data.
3. The authors discuss potential applications
and benefits in digital image protection.
DEVELOPMENT MODULES
1.Dashboard Module
Description: The central interface for users to access encryption and decryption functionalities.
Functionality: The dashboard provides two main buttons: "Encrypt" and "Decrypt," allowing the user to navigate to the
respective features.
2.Encryption Module
Description: Allows users to encrypt images using Triple DES (3DES) encryption.
Functionality:
Upload an image (via drag-and-drop or file selector).
The image is displayed and processed into a base64 data URL.
The user enters a secret key, and the image is encrypted using 3DES.
The encrypted image is then saved as a downloadable text file.
DEVELOPMENT MODULE
3.Decryption Module
Description: Facilitates the decryption of previously encrypted images.
Functionality:
The user uploads the encrypted file (text format).
A secret key is entered to decrypt the file.
If the decryption is successful, the decrypted image is generated and available for download.
Error handling is in place to alert users if the key is incorrect.
Description: Implements the core cryptographic operations using the CryptoJS library for 3DES encryption and
decryption.
Functionality:
•In the encryption module, the image data is encrypted using the secret key and CryptoJS.
•In the decryption module, the encrypted data is decrypted using the provided key and rendered for download.
OUTPUT
Decryption
encrypti
on
RESULT
1. Overview of Results
• The ImageCryptor3DES project successfully implements encryption and decryption of images using
the Triple DES algorithm.
• Tested with various image types and sizes to ensure reliability and security.
2. Functionality Demonstration
• Encryption Process:
• Input: Original image file (e.g., JPG, PNG).
• Output: Encrypted image file (cipher text).
• Key Length: 168 bits (Triple DES uses multiple keys).
• Decryption Process:
• Input: Encrypted image file.
• Output: Original image restored from cipher text.
RESULT
3. Security Analysis
• Encryption Strength: Triple DES provides a high level of security against brute-force attacks.
• Key Management: The program securely generates and manages encryption keys, ensuring they are
not hardcoded or easily accessible.
4. Test Cases and Results
• The project demonstrates that Triple DES can effectively encrypt and decrypt images while maintaining
quality.
• The implementation is efficient, with acceptable execution times for a variety of image sizes.
REFERENCES
Anup & Suchithra (2017). "Image Encryption using Triple DES Algorithm” Imperial Journal of Interdisciplinary
Research (IJIR) 3(5); Pg 23.
Archana M., Kaushik S., Kaushal T. & Brijesh U. (2016). "A Literature Survey on Image Encryption";
Department of Computer Engineering, GIDC Degree Engineering College, Abrama, Navsari, Gujarat, India.
2(6); Pg. 15.
Diaa S., Hatem M., & Mohiy H. (2010). "Evaluating the Performance of Symmetric Encryption Algorithms"
International Journal of Network Security, 10(3) Pg. 213-219
Diaa S., Hatem M., & Mohiy H. (2010). "Evaluating the Effects of Symmetric Cryptography Algorithms on
Power Consumption for Different Data Types" International Journal of Network Security; 11(2), Pg.78-87.
Fauzan S. & Mustafa R. (2010). "Integrating Classical Encryption with Modern Technique”; International
Journal of Computer Science and Network Security (IJCSNS), 10(5). P 261-270.
Kamlesh G. & Sanjay S. (2009). "Chaos Based Image Encryption Using Block-Based Transformation
Algorithm"; International Journal of Computer and Network Security (IJCNS), 1(3), Pg. 32-35.
Karthik S. & Muruganandam A. (2014): "Data Encryption and Decryption by Using Triple DES and Performance
Analysis of Crypto System"; International Journal of Scientific Engineering and Research (IJSER). 2(11).