Upload
kenbobalaji
View
163
Download
0
Embed Size (px)
DESCRIPTION
Project abstract
Citation preview
A Keyless Approach to Image Encryption
Abstract
Maintaining the secrecy and confidentiality of images is a vibrant area of research,
with two different approaches being followed, the first being encrypting the images
through encryption algorithms using keys, the other approach involves dividing the image
into random shares to maintain the images secrecy. Unfortunately heavy computation
cost and key management limit the employment of the first approach and the poor quality
of the recovered image from the random shares limit the applications of the second
approach. In this paper we propose a novel approach without the use of encryption keys.
The approach employs Sieving, Division and Shuffling to generate random shares such
that with minimal computation, the original secret image can be recovered from the
random shares without any loss of image quality.
EXISTING SYSTEM
In Existing System, In the current scenario, when the end user wants to access his
confidential information, logging into his account the person enters information like
username, password, . etc. on the login page. But quite often, this information can be
captured by attackers and they can collect the login information the user enters and
redirect him to the original page. There is no such information that cannot be directly
obtained from the user at the time of his login input.
PROPOSED SYSTEM
In Proposed System, The main purpose of this research is to improve the and
avoid the attackers by using the visual cryptography. In this scheme we are going to
sieving and shuffling the images in to two types and we provide to the users and the user
when they are try to login they should enter the valid code then only it will allow the user
to the original page.
Advantage
1.To avoid the attacker
2.Secrecy of the images should be maintained
3.Sieving and Shuffling of the images should be done.
IMPLEMENTATION
Implementation is the stage of the project when the theoretical design is turned out
into a working system. Thus it can be considered to be the most critical stage in achieving
a successful new system and in giving the user, confidence that the new system will work
and be effective.
The implementation stage involves careful planning, investigation of the existing
system and it’s constraints on implementation, designing of methods to achieve
changeover and evaluation of changeover methods.
Modules
1. User Registration
2.Sieving& Shuffling Technique
3.Split & Combine Technique
Modules Description
USER REGISTRATION
In this module, we are going to register the user details and give the information
which they ask. When we will register the sieving image and shuffling image will get
download. After save the Image .when you try to login to your account you have to
upload those sieving Image and Shuffling Image.
SIEVING & SHUFFLING TECHNIQUE
In this module, the most important aspect of Sieving and shuffling the image going
to be done in this potion only. Here we are going to split the image into sieving and
shuffling there are the random image are made from the random characters. After the
image generated the image going to be split pixel by pixel using the two sieving and
shuffling types.
SPLIT & COMPINE TECHNIQUE
In this module, the operation of splitting the image into its constituent sieving and
shuffling. Pixels are digital numbers composed of bits. After the splitting the image with
these two types we are going to Combine when the user will login with his own sieving
and shuffling image. We are verifying the images are same or not then it will be allowed
to enter the secret code. After verification the secret code with database. It will allow the
user to download files.
Hardware Requirements:
Processor -Pentium –IV
RAM - 256 MB(min)
Hard Disk - 40 GB
Floppy Drive - 1.44 MB
Key Board - Standard Windows Keyboard
Mouse - Logitech
Monitor - 14 VGA Color
SOFTWARE REQUIREMENTS:-
Operating System : Windows XP Professional
Coding Language : ASP.Net
Database :SQL