0% found this document useful (0 votes)
35 views11 pages

CN PPT-2

Uploaded by

cpe007thala
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views11 pages

CN PPT-2

Uploaded by

cpe007thala
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 11

Vishwakarma Institute of Technology, Pune

Upper Indira nagar, Bibwewadi, Pune - 411037


Department of Artificial Intelligence & Data Science

Project Title: Image Encryption and Decryption


Guided by: PROF. Bhagwan Dinkar Thorat
Group members Details:

Sr. Name of Student Class & E-mail ID


No. Roll No.
1.
Saish Pisolkar SYAIDS-C_03 saish.pisolkar24@vit.edu

2.
Ratnali Pawar SYAIDS-C_06 ratnali.pawar24@vit.edu
3. Harsh Suryawanshi SYAIDS-C_14 harsh. suryawanshi24@vit.edu
4.
Prachi Jamdade SYAIDS-B_21 prachi. jamdade24@vit.edu
Contents
1. Problem statement
2. Abstract
3. Introduction
4. Literature Survey
5. Explanation
6. Applications
7. Advantages & Disadvantages
8. Future Scope
9. Conclusion
Problem Statement

• Digital images are vulnerable to unauthorized access


and modification.
• Need for a secure method to protect images from
unauthorized access.
• The challenge is to provide a user-friendly application
that allows easy encryption and decryption of images.
Abstract

• This presentation discusses the implementation


of an AES-based image encryption and
decryption application.
• The application features a GUI for user
interaction, enabling users to select images and
apply encryption or decryption using a
customizable key.
• It aims to demonstrate the effectiveness of AES
in securing image data while being accessible to
users without a technical background.
Introducti
1. Encryption: The process of converting information into a
format that is unreadable without a decryption key.
on
2. Decryption: The reverse process where encrypted data is
converted back into its original, readable format.
3. Why Encryption?: To secure sensitive information, prevent
unauthorized access, and maintain data integrity.
4. AES (Advanced Encryption Standard): is a widely adopted
symmetric encryption algorithm. It secures sensitive data in
various applications, including file storage and communication.
The need for encryption in digital image processing is growing
as the internet continues to evolve.
Literature Survey
Year Author Purpose Techniques Used

2014 Sanjay Kumar To fulfill the security requirements of digital images. Simplified-Data Encryption
Standard (S-DES)

2021 Paavni Gaur To deal with the development of encrypting and AES (Advance Encryption
decryption software for images. Standard)

The purpose of this paper is to optimize the RSA


2022 Aradhana Sahoo, encryption algorithm by reducing execution time and RSA(Rivest–Shamir–Adleman)
Pratyasha Mohanty improving efficiency during image encryption.

This paper focuses on the implementation and evaluation


of image encryption using the Advanced Encryption
2023 Veman Ashqi Saeed Standard (AES) algorithm a widely recognized and AES, XOR operation
Bareen Haval Sadiq extensively studied symmetric encryption scheme
Explantation
• Overview of the main components of the application:
• File Selection: Users can browse and select image files.
• Key Input: Users enter a key for encryption or decryption.
• Mode Selection: Users choose between encryption and
decryption.
• Technical details of the code:
• Utilizes the PyCryptodome library for AES encryption.
• The selected image is read as binary data, padded, and then
encrypted.
• Encrypted data is saved back to the original file, maintaining
user experience.
Application
s
Confidentiality: Protect personal or sensitive images from unauthorized
access.

Secure Image Transfer: Encrypt images before sharing them online to


prevent interception.

Digital Forensics: Ensuring the integrity and confidentiality of digital


evidence.

Cloud Storage: Protecting images stored in cloud services from


unauthorized access.
Advantage
s
• High security and efficiency with large key sizes (128, 192, 256 bits).
• Fast encryption and decryption processes.
• Widely accepted and used globally, ensuring compatibility.

Disadvantag
es
• Symmetric encryption requires secure key management.
• Vulnerability to attacks if keys are poorly chosen or managed.
• If the key is lost, the encrypted data cannot be recovered.
Future
Scope
• Integration with secure cloud storage for direct encrypted
uploads.
• Development of key management solutions to enhance security.
• Implementation of additional encryption algorithms for
comparative analysis.
• User education and documentation to enhance user
understanding of encryption.
Conclusion

• AES encryption is an effective method for securing images


against unauthorized access.

• The developed GUI application provides a user-friendly


interface for encryption and decryption.

• Future enhancements can improve usability and security,


further broadening the application’s reach in various sectors.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy