Show simple item record

dc.contributor.authorAmit Yadav, 21SCSE1470010
dc.date.accessioned2024-09-17T08:29:16Z
dc.date.available2024-09-17T08:29:16Z
dc.date.issued2024-05
dc.identifier.urihttp://10.10.11.6/handle/1/18042
dc.descriptionBCA.SCHOOL OF COMPUTER APPLICATION AND TECHNOLOGY GALGOTIAS UNIVERSITY, GREATER NOIDAen_US
dc.description.abstractIn today's digital era, Digital image security is an ongoing concern as the digital landscape expands. The widespread sharing of images online makes them vulnerable to privacy breaches and unauthorized access. Traditional image formats are often not protected adequately, leaving them vulnerable to cyber threats and data breaches. Traditional image storage and transmission methods are vulnerable to unauthorized access and cyberattacks, which makes it important to develop robust image encryption solutions. This project introduces an intuitive software application that empowers users to encrypt and decrypt images effortlessly. It offers a method to transform images into ciphertext, rendering them unreadable to unauthorized individuals. The decryption process, using the corresponding technique, allows the restoration of the original image, ensuring data privacy and integrity. Through the application of advanced cryptographic techniques, to realize this solution, we used symmetric-key cryptography technique in programming language Java to implement the project. The project utilizes a simple cryptographic technique, to ensure the security of the encryption process. Our project has yielded promising results, with successful encryption and decryption of various digital images. the encryption process provides robust protection against unauthorized access, and the decryption process reliably restores images to their original form. Furthermore, our methods demonstrate efficiency in terms of execution time and image quality preservation. The Image Encryption and Decryption project addresses a critical need for data security in the digital age, particularly in the context of visual data. As an area of constant evolution, the future scope of this project includes enhancements to existing methods, exploration of new encryption techniques, and adaptation for emerging technologies.en_US
dc.language.isoen_USen_US
dc.publisherGalgotias Universityen_US
dc.subjectVisual Cryptographyen_US
dc.subjectImage Encryptionen_US
dc.subjectDecryptionen_US
dc.title“Visual Cryptography (Image Encryption and Decryption)”en_US
dc.typeTechnical Reporten_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record