SlideShare ist ein Scribd-Unternehmen logo
1 von 14
WHAT IS ENCRYPTION ?
Encryption is a process which uses a finite
set of instruction called an algorithm to
convert original message, known as
plaintext, into cipher text, its encrypted
form.
Cryptographic algorithms normally
require a set of characters called a key to
encrypt or decrypt data.
With the help of key and the algorithm we
can encrypt or Decrypt the plaintext into
cipher text and then cipher text back into
plaintext.
WHY ENCRYPTION AND WHY
IMAGE ENCRYPTION ?
Nowadays, information security is becoming more
important in data storage and transmission.
Images are widely used in different-different
processes. Therefore, the security of image data from
unauthorized uses is important.
Image encryption plays a important role in the field of
information hiding.
Image encryption method prepared information
unreadable. Therefore, no hacker or eavesdropper,
including server administrators and others, have access
to original message or any other type of transmitted
information through public networks such as internet
REQUIREMENTS OF IMAGE
ENCRYPTION
Ability to get the pixels of the original image.
Create a strong encryption image such that it cannot
be hacked easily.
Faster encryption time such that encrypted image is
transferred faster to the person.
Perfection in the original image we obtain after
decrypting it.
PROJECT DESIGN
The ALGORITHM which is used to design IMAGE ENCRYPTION is GAUSSIAN
ELIMINATION WITH PARTIAL PIVOTING AND ROW EXCHANGE.
Each image is actually a matrix consisting of RGB and alpha values.
The first step of the project involves extracting the matrix from the image
◦ The average of RGB values is then taken (which converts the color to
grayscale image) so as to get one image matrix.
◦ Gaussian Elimination (and row exchanges is necessary) is then applied on
the image matrix to get an upper-triangular matrix (U) which is the
encrypted image matrix and the decryption key (L) is generated. The
encrypted image matrix is converted back into the image, image is
executed and encryption process is completes. The program waits for
decryption signal.
◦ As soon as the user approves decryption ,the encrypted image matrix(U)
and the decryption key(L) are multiplied so as to get back the original
image matrix(A).The original image matrix(A) is converted back into
image(which is in grayscale),image is executed and decryption process
completes.
GAUSSIAN ELIMINATION
EXAMPLE
The goal of Forward Elimination is to
transform the coefficient matrix into an
Upper Triangular Matrix
7.000
56.18.40
1525





















112144
1864
1525
TEST CASES CONSIDERED
RESULTS AND SNAPSHOTS
CASE 1 :
BREADTH >HEIGHT
AFTER
ENCRYPTION
AFTER
DECRYPTION
CASE 2 :
BREADTH <HEIGHT
AFTER
ENCRYPTION
CASE 2 :
BREADTH <HEIGHT
AFTER
DECRYPTION
ADVANTAGES AND DISADVANTAGES
OF THIS ALGORITHM
ADVANTAGES :
 Simplicity: It’s simpler, cheaper.
 Ratio: Encryption takes ¼ th time the decryption process takes.
 Robust: The encrypted image is hard to hack to obtain the original image.
 Pixels obtained after Gaussian elimination is fully distorted, so the key is needed
to obtain original image because it’s hard to crack that encrypted form.
 We have reduced time taken by encryption by smartly by updating row
exchanges using another matrix. So basically it’s a Space for time tradeoff.
DISADVANTAGES
 Efficiency of our algorithm is 2/3 * O(n^3).
 Decryption takes 4 times larger the time taken by Encryption.
CONCLUSION
Thus, the project entitled “Image Encryption and Decryption’ was
successfully completed. A complex project involving the
conversion of image into matrix form, using a mathematical
concept to encrypt and decrypt it, was instrumental in giving us
a thorough understanding of how the concepts of ADA and
Linear Algebra together can actually be implemented in the real
world. By the end of the project, we have gained valuable skills
including a grounding of how to interact with the operating
system, file handling in java, optimizing algorithms, calculating
the efficiencies, and learning how to form and manipulate
images.
FUTURE SCOPE OF
IMPROVEMENT
We are very excited by the vast future possibilities that
our project has to offer. Possible improvements include
getting back the decrypted image in color. We are also
looking forward to encrypt videos by extracting each
frame and encrypting the images simultaneously. We
know that all the videos have sound. So we are planning
to encrypt frames and sound simultaneously. Finally after
achieving all of the above, we are planning to create an
app which will do all of the above. With two people
having the app, one will become the sender and other the
receiver at a time, based on the requirements of either of
the two. This is future of our project we are looking at and
looking forward to implementing all of the above
successfully.

Weitere ähnliche Inhalte

Was ist angesagt?

Steganography
Steganography Steganography
Steganography
Uttam Jain
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
Jitu Choudhary
 

Was ist angesagt? (20)

IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design Principles
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
 
Image steganography
Image steganographyImage steganography
Image steganography
 
Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java  Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java
 
Steganography
Steganography Steganography
Steganography
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithm
 
Driver Drowsiness Detection report
Driver Drowsiness Detection reportDriver Drowsiness Detection report
Driver Drowsiness Detection report
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
CMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signatureCMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signature
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
IP Security
IP SecurityIP Security
IP Security
 
Steganography
SteganographySteganography
Steganography
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
 
Substitution techniques
Substitution techniquesSubstitution techniques
Substitution techniques
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
 
Secure Hash Algorithm
Secure Hash AlgorithmSecure Hash Algorithm
Secure Hash Algorithm
 
Audio steganography project presentation
Audio steganography project presentationAudio steganography project presentation
Audio steganography project presentation
 
Idea(international data encryption algorithm)
Idea(international data encryption algorithm)Idea(international data encryption algorithm)
Idea(international data encryption algorithm)
 

Ähnlich wie Image encryption and decryption

REAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUE
REAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUEREAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUE
REAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUE
International Journal of Technical Research & Application
 

Ähnlich wie Image encryption and decryption (20)

IRJET- Low Band Width High Secured Image Transmission in Robust Channels
IRJET-  	  Low Band Width High Secured Image Transmission in Robust ChannelsIRJET-  	  Low Band Width High Secured Image Transmission in Robust Channels
IRJET- Low Band Width High Secured Image Transmission in Robust Channels
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Image Encryption Using Differential Evolution Approach in Frequency Domain
Image Encryption Using Differential Evolution Approach in Frequency DomainImage Encryption Using Differential Evolution Approach in Frequency Domain
Image Encryption Using Differential Evolution Approach in Frequency Domain
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
 
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
 
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
 
DCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video SequenceDCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video Sequence
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
 
Encryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix MultiplicationEncryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix Multiplication
 
Implementation of image steganography using lab view
Implementation of image steganography using lab viewImplementation of image steganography using lab view
Implementation of image steganography using lab view
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
 
IRJET- Homomorphic Image Encryption
IRJET-  	  Homomorphic Image EncryptionIRJET-  	  Homomorphic Image Encryption
IRJET- Homomorphic Image Encryption
 
IRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure TransmissionIRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure Transmission
 
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityGenetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
 
REAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUE
REAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUEREAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUE
REAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUE
 
F1803063236
F1803063236F1803063236
F1803063236
 
K041068072
K041068072K041068072
K041068072
 

Kürzlich hochgeladen

Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 

Kürzlich hochgeladen (20)

Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 

Image encryption and decryption

  • 1.
  • 2. WHAT IS ENCRYPTION ? Encryption is a process which uses a finite set of instruction called an algorithm to convert original message, known as plaintext, into cipher text, its encrypted form. Cryptographic algorithms normally require a set of characters called a key to encrypt or decrypt data. With the help of key and the algorithm we can encrypt or Decrypt the plaintext into cipher text and then cipher text back into plaintext.
  • 3. WHY ENCRYPTION AND WHY IMAGE ENCRYPTION ? Nowadays, information security is becoming more important in data storage and transmission. Images are widely used in different-different processes. Therefore, the security of image data from unauthorized uses is important. Image encryption plays a important role in the field of information hiding. Image encryption method prepared information unreadable. Therefore, no hacker or eavesdropper, including server administrators and others, have access to original message or any other type of transmitted information through public networks such as internet
  • 4. REQUIREMENTS OF IMAGE ENCRYPTION Ability to get the pixels of the original image. Create a strong encryption image such that it cannot be hacked easily. Faster encryption time such that encrypted image is transferred faster to the person. Perfection in the original image we obtain after decrypting it.
  • 5. PROJECT DESIGN The ALGORITHM which is used to design IMAGE ENCRYPTION is GAUSSIAN ELIMINATION WITH PARTIAL PIVOTING AND ROW EXCHANGE. Each image is actually a matrix consisting of RGB and alpha values. The first step of the project involves extracting the matrix from the image ◦ The average of RGB values is then taken (which converts the color to grayscale image) so as to get one image matrix. ◦ Gaussian Elimination (and row exchanges is necessary) is then applied on the image matrix to get an upper-triangular matrix (U) which is the encrypted image matrix and the decryption key (L) is generated. The encrypted image matrix is converted back into the image, image is executed and encryption process is completes. The program waits for decryption signal. ◦ As soon as the user approves decryption ,the encrypted image matrix(U) and the decryption key(L) are multiplied so as to get back the original image matrix(A).The original image matrix(A) is converted back into image(which is in grayscale),image is executed and decryption process completes.
  • 6. GAUSSIAN ELIMINATION EXAMPLE The goal of Forward Elimination is to transform the coefficient matrix into an Upper Triangular Matrix 7.000 56.18.40 1525                      112144 1864 1525
  • 8. RESULTS AND SNAPSHOTS CASE 1 : BREADTH >HEIGHT AFTER ENCRYPTION
  • 10. CASE 2 : BREADTH <HEIGHT AFTER ENCRYPTION
  • 11. CASE 2 : BREADTH <HEIGHT AFTER DECRYPTION
  • 12. ADVANTAGES AND DISADVANTAGES OF THIS ALGORITHM ADVANTAGES :  Simplicity: It’s simpler, cheaper.  Ratio: Encryption takes ¼ th time the decryption process takes.  Robust: The encrypted image is hard to hack to obtain the original image.  Pixels obtained after Gaussian elimination is fully distorted, so the key is needed to obtain original image because it’s hard to crack that encrypted form.  We have reduced time taken by encryption by smartly by updating row exchanges using another matrix. So basically it’s a Space for time tradeoff. DISADVANTAGES  Efficiency of our algorithm is 2/3 * O(n^3).  Decryption takes 4 times larger the time taken by Encryption.
  • 13. CONCLUSION Thus, the project entitled “Image Encryption and Decryption’ was successfully completed. A complex project involving the conversion of image into matrix form, using a mathematical concept to encrypt and decrypt it, was instrumental in giving us a thorough understanding of how the concepts of ADA and Linear Algebra together can actually be implemented in the real world. By the end of the project, we have gained valuable skills including a grounding of how to interact with the operating system, file handling in java, optimizing algorithms, calculating the efficiencies, and learning how to form and manipulate images.
  • 14. FUTURE SCOPE OF IMPROVEMENT We are very excited by the vast future possibilities that our project has to offer. Possible improvements include getting back the decrypted image in color. We are also looking forward to encrypt videos by extracting each frame and encrypting the images simultaneously. We know that all the videos have sound. So we are planning to encrypt frames and sound simultaneously. Finally after achieving all of the above, we are planning to create an app which will do all of the above. With two people having the app, one will become the sender and other the receiver at a time, based on the requirements of either of the two. This is future of our project we are looking at and looking forward to implementing all of the above successfully.