0% found this document useful (0 votes)
458 views4 pages

Keyless Image Encryption Techniques

The document proposes a novel keyless approach to image encryption using sieving, division, and shuffling techniques to generate random shares of an image such that the original image can be recovered from the shares without any loss of quality and with minimal computation. It aims to address the limitations of traditional encryption approaches related to key management and heavy computation costs as well as limitations of existing random share approaches related to poor recovered image quality. The proposed system involves registering users and sieving and shuffling images during the login process to verify users and maintain image secrecy without directly obtaining login information from users.

Uploaded by

kenbobalaji
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
458 views4 pages

Keyless Image Encryption Techniques

The document proposes a novel keyless approach to image encryption using sieving, division, and shuffling techniques to generate random shares of an image such that the original image can be recovered from the shares without any loss of quality and with minimal computation. It aims to address the limitations of traditional encryption approaches related to key management and heavy computation costs as well as limitations of existing random share approaches related to poor recovered image quality. The proposed system involves registering users and sieving and shuffling images during the login process to verify users and maintain image secrecy without directly obtaining login information from users.

Uploaded by

kenbobalaji
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

A Keyless Approach to Image Encryption Abstract Maintaining the secrecy and confidentiality of images is a vibrant area of research, with

two different approaches being followed, the first being encrypting the images through encryption algorithms using keys, the other approach involves dividing the image into random shares to maintain the images secrecy. Unfortunately heavy computation cost and key management limit the employment of the first approach and the poor quality of the recovered image from the random shares limit the applications of the second approach. In this paper we propose a novel approach without the use of encryption keys. The approach employs Sieving, Division and Shuffling to generate random shares such that with minimal computation, the original secret image can be recovered from the random shares without any loss of image quality. EXISTING SYSTEM In Existing System, In the current scenario, when the end user wants to access his confidential information, logging into his account the person enters information like username, password, . etc. on the login page. But quite often, this information can be captured by attackers and they can collect the login information the user enters and redirect him to the original page. There is no such information that cannot be directly obtained from the user at the time of his login input. PROPOSED SYSTEM In Proposed System, The main purpose of this research is to improve the and avoid the attackers by using the visual cryptography. In this scheme we are going to sieving and shuffling the images in to two types and we provide to the users and the user when they are try to login they should enter the valid code then only it will allow the user to the original page.

Advantage 1.To avoid the attacker 2.Secrecy of the images should be maintained 3.Sieving and Shuffling of the images should be done. IMPLEMENTATION

Implementation is the stage of the project when the theoretical design is turned out into a working system. Thus it can be considered to be the most critical stage in achieving a successful new system and in giving the user, confidence that the new system will work and be effective. The implementation stage involves careful planning, investigation of the existing system and its constraints on implementation, designing of methods to achieve changeover and evaluation of changeover methods. Modules 1. User Registration 2.Sieving& Shuffling Technique 3.Split & Combine Technique Modules Description USER REGISTRATION In this module, we are going to register the user details and give the information which they ask. When we will register the sieving image and shuffling image will get download. After save the Image .when you try to login to your account you have to upload those sieving Image and Shuffling Image.

SIEVING & SHUFFLING TECHNIQUE In this module, the most important aspect of Sieving and shuffling the image going to be done in this potion only. Here we are going to split the image into sieving and shuffling there are the random image are made from the random characters. After the image generated the image going to be split pixel by pixel using the two sieving and shuffling types.

SPLIT & COMPINE TECHNIQUE In this module, the operation of splitting the image into its constituent sieving and shuffling. Pixels are digital numbers composed of bits. After the splitting the image with these two types we are going to Combine when the user will login with his own sieving and shuffling image. We are verifying the images are same or not then it will be allowed to enter the secret code. After verification the secret code with database. It will allow the user to download files. Hardware Requirements: Processor RAM Hard Disk Floppy Drive Key Board Mouse Monitor -Pentium IV 256 MB(min)

- 40 GB 1.44 MB Standard Windows Keyboard

- Logitech 14 VGA Color

SOFTWARE REQUIREMENTS:-

Operating System Coding Language Database

: Windows XP Professional : ASP.Net :SQL

You might also like