5
A Keyless Approach to Image Encryption Abstract Maintaining the secrecy and confidentiality of images is a vibrant area of research, with two different approaches being followed, the first being encrypting the images through encryption algorithms using keys, the other approach involves dividing the image into random shares to maintain the images secrecy. Unfortunately heavy computation cost and key management limit the employment of the first approach and the poor quality of the recovered image from the random shares limit the applications of the second approach. In this paper we propose a novel approach without the use of encryption keys. The approach employs Sieving, Division and Shuffling to generate random shares such that with minimal computation, the original secret image can be recovered from the random shares without any loss of image quality. EXISTING SYSTEM In Existing System, In the current scenario, when the end user wants to access his confidential information, logging into his account the person enters information like username, password, . etc. on the login page. But quite often, this information can be captured by attackers and

A Keyless Approach to Image Encryption

Embed Size (px)

DESCRIPTION

Project abstract

Citation preview

Page 1: A Keyless Approach to Image Encryption

A Keyless Approach to Image Encryption

Abstract

Maintaining the secrecy and confidentiality of images is a vibrant area of research,

with two different approaches being followed, the first being encrypting the images

through encryption algorithms using keys, the other approach involves dividing the image

into random shares to maintain the images secrecy. Unfortunately heavy computation

cost and key management limit the employment of the first approach and the poor quality

of the recovered image from the random shares limit the applications of the second

approach. In this paper we propose a novel approach without the use of encryption keys.

The approach employs Sieving, Division and Shuffling to generate random shares such

that with minimal computation, the original secret image can be recovered from the

random shares without any loss of image quality. 

EXISTING SYSTEM

In Existing System, In the current scenario, when the end user wants to access his

confidential information, logging into his account the person enters information like

username, password, . etc. on the login page. But quite often, this information can be

captured by attackers and they can collect the login information the user enters and

redirect him to the original page. There is no such information that cannot be directly

obtained from the user at the time of his login input. 

PROPOSED SYSTEM

In Proposed System, The main purpose of this research is to improve the and

avoid the attackers by using the visual cryptography. In this scheme we are going to

sieving and shuffling the images in to two types and we provide to the users and the user

when they are try to login they should enter the valid code then only it will allow the user

to the original page.

Page 2: A Keyless Approach to Image Encryption

Advantage

1.To avoid the attacker

2.Secrecy of the images should be maintained

3.Sieving and Shuffling of the images should be done.

IMPLEMENTATION

Implementation is the stage of the project when the theoretical design is turned out

into a working system. Thus it can be considered to be the most critical stage in achieving

a successful new system and in giving the user, confidence that the new system will work

and be effective.

The implementation stage involves careful planning, investigation of the existing

system and it’s constraints on implementation, designing of methods to achieve

changeover and evaluation of changeover methods.

Modules

1. User Registration

2.Sieving& Shuffling Technique

3.Split & Combine Technique

Modules Description

USER REGISTRATION

In this module, we are going to register the user details and give the information

which they ask. When we will register the sieving image and shuffling image will get

download. After save the Image .when you try to login to your account you have to

upload those sieving Image and Shuffling Image.

Page 3: A Keyless Approach to Image Encryption

SIEVING & SHUFFLING TECHNIQUE

In this module, the most important aspect of Sieving and shuffling the image going

to be done in this potion only. Here we are going to split the image into sieving and

shuffling there are the random image are made from the random characters. After the

image generated the image going to be split pixel by pixel using the two sieving and

shuffling types.

SPLIT & COMPINE TECHNIQUE

In this module, the operation of splitting the image into its constituent sieving and

shuffling. Pixels are digital numbers composed of bits. After the splitting the image with

these two types we are going to Combine when the user will login with his own sieving

and shuffling image. We are verifying the images are same or not then it will be allowed

to enter the secret code. After verification the secret code with database. It will allow the

user to download files.

Hardware Requirements:

Processor -Pentium –IV

RAM - 256 MB(min)

Hard Disk - 40 GB

Floppy Drive - 1.44 MB

Key Board - Standard Windows Keyboard

Mouse - Logitech

Monitor - 14 VGA Color

Page 4: A Keyless Approach to Image Encryption

SOFTWARE REQUIREMENTS:-

Operating System : Windows XP Professional

Coding Language : ASP.Net

Database :SQL