SlideShare une entreprise Scribd logo
1  sur  14
WHAT IS ENCRYPTION ?
Encryption is a process which uses a finite
set of instruction called an algorithm to
convert original message, known as
plaintext, into cipher text, its encrypted
form.
Cryptographic algorithms normally
require a set of characters called a key to
encrypt or decrypt data.
With the help of key and the algorithm we
can encrypt or Decrypt the plaintext into
cipher text and then cipher text back into
plaintext.
WHY ENCRYPTION AND WHY
IMAGE ENCRYPTION ?
Nowadays, information security is becoming more
important in data storage and transmission.
Images are widely used in different-different
processes. Therefore, the security of image data from
unauthorized uses is important.
Image encryption plays a important role in the field of
information hiding.
Image encryption method prepared information
unreadable. Therefore, no hacker or eavesdropper,
including server administrators and others, have access
to original message or any other type of transmitted
information through public networks such as internet
REQUIREMENTS OF IMAGE
ENCRYPTION
Ability to get the pixels of the original image.
Create a strong encryption image such that it cannot
be hacked easily.
Faster encryption time such that encrypted image is
transferred faster to the person.
Perfection in the original image we obtain after
decrypting it.
PROJECT DESIGN
The ALGORITHM which is used to design IMAGE ENCRYPTION is GAUSSIAN
ELIMINATION WITH PARTIAL PIVOTING AND ROW EXCHANGE.
Each image is actually a matrix consisting of RGB and alpha values.
The first step of the project involves extracting the matrix from the image
◦ The average of RGB values is then taken (which converts the color to
grayscale image) so as to get one image matrix.
◦ Gaussian Elimination (and row exchanges is necessary) is then applied on
the image matrix to get an upper-triangular matrix (U) which is the
encrypted image matrix and the decryption key (L) is generated. The
encrypted image matrix is converted back into the image, image is
executed and encryption process is completes. The program waits for
decryption signal.
◦ As soon as the user approves decryption ,the encrypted image matrix(U)
and the decryption key(L) are multiplied so as to get back the original
image matrix(A).The original image matrix(A) is converted back into
image(which is in grayscale),image is executed and decryption process
completes.
GAUSSIAN ELIMINATION
EXAMPLE
The goal of Forward Elimination is to
transform the coefficient matrix into an
Upper Triangular Matrix
7.000
56.18.40
1525





















112144
1864
1525
TEST CASES CONSIDERED
RESULTS AND SNAPSHOTS
CASE 1 :
BREADTH >HEIGHT
AFTER
ENCRYPTION
AFTER
DECRYPTION
CASE 2 :
BREADTH <HEIGHT
AFTER
ENCRYPTION
CASE 2 :
BREADTH <HEIGHT
AFTER
DECRYPTION
ADVANTAGES AND DISADVANTAGES
OF THIS ALGORITHM
ADVANTAGES :
 Simplicity: It’s simpler, cheaper.
 Ratio: Encryption takes ¼ th time the decryption process takes.
 Robust: The encrypted image is hard to hack to obtain the original image.
 Pixels obtained after Gaussian elimination is fully distorted, so the key is needed
to obtain original image because it’s hard to crack that encrypted form.
 We have reduced time taken by encryption by smartly by updating row
exchanges using another matrix. So basically it’s a Space for time tradeoff.
DISADVANTAGES
 Efficiency of our algorithm is 2/3 * O(n^3).
 Decryption takes 4 times larger the time taken by Encryption.
CONCLUSION
Thus, the project entitled “Image Encryption and Decryption’ was
successfully completed. A complex project involving the
conversion of image into matrix form, using a mathematical
concept to encrypt and decrypt it, was instrumental in giving us
a thorough understanding of how the concepts of ADA and
Linear Algebra together can actually be implemented in the real
world. By the end of the project, we have gained valuable skills
including a grounding of how to interact with the operating
system, file handling in java, optimizing algorithms, calculating
the efficiencies, and learning how to form and manipulate
images.
FUTURE SCOPE OF
IMPROVEMENT
We are very excited by the vast future possibilities that
our project has to offer. Possible improvements include
getting back the decrypted image in color. We are also
looking forward to encrypt videos by extracting each
frame and encrypting the images simultaneously. We
know that all the videos have sound. So we are planning
to encrypt frames and sound simultaneously. Finally after
achieving all of the above, we are planning to create an
app which will do all of the above. With two people
having the app, one will become the sender and other the
receiver at a time, based on the requirements of either of
the two. This is future of our project we are looking at and
looking forward to implementing all of the above
successfully.

Contenu connexe

Tendances

Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9
koolkampus
 

Tendances (20)

symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
Steganography
SteganographySteganography
Steganography
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
Message authentication
Message authenticationMessage authentication
Message authentication
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
Steganography
SteganographySteganography
Steganography
 
Image Security
Image SecurityImage Security
Image Security
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
 
Introduction of cryptography and network security
Introduction of cryptography and network securityIntroduction of cryptography and network security
Introduction of cryptography and network security
 
S/MIME
S/MIMES/MIME
S/MIME
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanisms
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Network security cryptographic hash function
Network security  cryptographic hash functionNetwork security  cryptographic hash function
Network security cryptographic hash function
 
Substitution techniques
Substitution techniquesSubstitution techniques
Substitution techniques
 
Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9
 
block ciphers
block ciphersblock ciphers
block ciphers
 
Idea(international data encryption algorithm)
Idea(international data encryption algorithm)Idea(international data encryption algorithm)
Idea(international data encryption algorithm)
 

Similaire à Image encryption and decryption

REAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUE
REAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUEREAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUE
REAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUE
International Journal of Technical Research & Application
 

Similaire à Image encryption and decryption (20)

IRJET- Low Band Width High Secured Image Transmission in Robust Channels
IRJET-  	  Low Band Width High Secured Image Transmission in Robust ChannelsIRJET-  	  Low Band Width High Secured Image Transmission in Robust Channels
IRJET- Low Band Width High Secured Image Transmission in Robust Channels
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Image Encryption Using Differential Evolution Approach in Frequency Domain
Image Encryption Using Differential Evolution Approach in Frequency DomainImage Encryption Using Differential Evolution Approach in Frequency Domain
Image Encryption Using Differential Evolution Approach in Frequency Domain
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
 
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
 
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
 
DCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video SequenceDCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video Sequence
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
 
Encryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix MultiplicationEncryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix Multiplication
 
Implementation of image steganography using lab view
Implementation of image steganography using lab viewImplementation of image steganography using lab view
Implementation of image steganography using lab view
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
 
IRJET- Homomorphic Image Encryption
IRJET-  	  Homomorphic Image EncryptionIRJET-  	  Homomorphic Image Encryption
IRJET- Homomorphic Image Encryption
 
IRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure TransmissionIRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure Transmission
 
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityGenetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
 
REAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUE
REAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUEREAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUE
REAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUE
 
F1803063236
F1803063236F1803063236
F1803063236
 
K041068072
K041068072K041068072
K041068072
 

Dernier

Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 

Dernier (20)

Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 

Image encryption and decryption

  • 1.
  • 2. WHAT IS ENCRYPTION ? Encryption is a process which uses a finite set of instruction called an algorithm to convert original message, known as plaintext, into cipher text, its encrypted form. Cryptographic algorithms normally require a set of characters called a key to encrypt or decrypt data. With the help of key and the algorithm we can encrypt or Decrypt the plaintext into cipher text and then cipher text back into plaintext.
  • 3. WHY ENCRYPTION AND WHY IMAGE ENCRYPTION ? Nowadays, information security is becoming more important in data storage and transmission. Images are widely used in different-different processes. Therefore, the security of image data from unauthorized uses is important. Image encryption plays a important role in the field of information hiding. Image encryption method prepared information unreadable. Therefore, no hacker or eavesdropper, including server administrators and others, have access to original message or any other type of transmitted information through public networks such as internet
  • 4. REQUIREMENTS OF IMAGE ENCRYPTION Ability to get the pixels of the original image. Create a strong encryption image such that it cannot be hacked easily. Faster encryption time such that encrypted image is transferred faster to the person. Perfection in the original image we obtain after decrypting it.
  • 5. PROJECT DESIGN The ALGORITHM which is used to design IMAGE ENCRYPTION is GAUSSIAN ELIMINATION WITH PARTIAL PIVOTING AND ROW EXCHANGE. Each image is actually a matrix consisting of RGB and alpha values. The first step of the project involves extracting the matrix from the image ◦ The average of RGB values is then taken (which converts the color to grayscale image) so as to get one image matrix. ◦ Gaussian Elimination (and row exchanges is necessary) is then applied on the image matrix to get an upper-triangular matrix (U) which is the encrypted image matrix and the decryption key (L) is generated. The encrypted image matrix is converted back into the image, image is executed and encryption process is completes. The program waits for decryption signal. ◦ As soon as the user approves decryption ,the encrypted image matrix(U) and the decryption key(L) are multiplied so as to get back the original image matrix(A).The original image matrix(A) is converted back into image(which is in grayscale),image is executed and decryption process completes.
  • 6. GAUSSIAN ELIMINATION EXAMPLE The goal of Forward Elimination is to transform the coefficient matrix into an Upper Triangular Matrix 7.000 56.18.40 1525                      112144 1864 1525
  • 8. RESULTS AND SNAPSHOTS CASE 1 : BREADTH >HEIGHT AFTER ENCRYPTION
  • 10. CASE 2 : BREADTH <HEIGHT AFTER ENCRYPTION
  • 11. CASE 2 : BREADTH <HEIGHT AFTER DECRYPTION
  • 12. ADVANTAGES AND DISADVANTAGES OF THIS ALGORITHM ADVANTAGES :  Simplicity: It’s simpler, cheaper.  Ratio: Encryption takes ¼ th time the decryption process takes.  Robust: The encrypted image is hard to hack to obtain the original image.  Pixels obtained after Gaussian elimination is fully distorted, so the key is needed to obtain original image because it’s hard to crack that encrypted form.  We have reduced time taken by encryption by smartly by updating row exchanges using another matrix. So basically it’s a Space for time tradeoff. DISADVANTAGES  Efficiency of our algorithm is 2/3 * O(n^3).  Decryption takes 4 times larger the time taken by Encryption.
  • 13. CONCLUSION Thus, the project entitled “Image Encryption and Decryption’ was successfully completed. A complex project involving the conversion of image into matrix form, using a mathematical concept to encrypt and decrypt it, was instrumental in giving us a thorough understanding of how the concepts of ADA and Linear Algebra together can actually be implemented in the real world. By the end of the project, we have gained valuable skills including a grounding of how to interact with the operating system, file handling in java, optimizing algorithms, calculating the efficiencies, and learning how to form and manipulate images.
  • 14. FUTURE SCOPE OF IMPROVEMENT We are very excited by the vast future possibilities that our project has to offer. Possible improvements include getting back the decrypted image in color. We are also looking forward to encrypt videos by extracting each frame and encrypting the images simultaneously. We know that all the videos have sound. So we are planning to encrypt frames and sound simultaneously. Finally after achieving all of the above, we are planning to create an app which will do all of the above. With two people having the app, one will become the sender and other the receiver at a time, based on the requirements of either of the two. This is future of our project we are looking at and looking forward to implementing all of the above successfully.