A Keyless Approach to Image Encryption
Abstract
Maintaining the secrecy and confidentiality of images is a vibrant area of research, with two different approaches being followed, the first being encrypting the images through encryption algorithms using keys, the other approach involves dividing the image into random shares to maintain the images secrecy. Unfortunately heavy computation cost and key management limit the employment of the first approach and the poor quality of the recovered image from the random shares limit the applications of the second approach. In this paper we propose a novel approach without the use of encryption keys. The approach employs Sieving, Division and Shuffling to generate random shares such that with minimal computation, the original secret image can be recovered from the random shares without any loss of image quality.
EXISTING SYSTEM
In Existing System, In the current scenario, when the end user wants to access his confidential information, logging into his account the person enters information like username, password, . etc. on the login page. But quite often, this information can be captured by attackers and they can collect the login information the user enters and redirect him to the original page. There is no such information that cannot be directly obtained from the user at the time of his login input.
PROPOSED SYSTEM
In Proposed System, The main purpose of this research is to improve the and avoid the attackers by using the visual cryptography. In this scheme we are going to sieving and shuffling the images in to two types and we provide to the users and the user when they are try to login they should enter the valid code then only it will allow the user to the original page.
Advantage
- To avoid the attacker
- Secrecy of the images should be maintained
- Sieving and Shuffling of the images should be done.
IMPLEMENTATION
Implementation is the stage of the project when the theoretical design is turned out into a working system. Thus it can be considered to be the most critical stage in achieving a successful new system and in giving the user, confidence that the new system will work and be effective.
The implementation stage involves careful planning, investigation of the existing system and it’s constraints on implementation, designing of methods to achieve changeover and evaluation of changeover methods.
Modules
- User Registration
- Sieving& Shuffling Technique
- Split & Combine Technique
Modules Description
USERREGISTRATION
In this module, we are going to register the user details and give the information which they ask. When we will register the sieving image and shuffling image will get download. After save the Image .when you try to login to your account you have to upload those sieving Image and Shuffling Image.
SIEVING & SHUFFLING TECHNIQUE
In this module, the most important aspect of Sieving and shuffling the image going to be done in this potion only. Here we are going to split the image into sieving and shuffling there are the random image are made from the random characters. After the image generated the image going to be split pixel by pixel using the two sieving and shuffling types.
SPLIT & COMPINE TECHNIQUE
In this module, the operation of splitting theimage into its constituent sieving and shuffling. Pixels are digital numbers composedof bits. After the splitting the image with these two types we are going to Combine when the user will login with his own sieving and shuffling image. We are verifying the images are same or not then it will be allowed to enter the secret code. After verification the secret code with database. It will allow the user to download files.
Hardware Requirements:
•System: Pentium IV 2.4 GHz.
•Hard Disk: 40 GB.
•Floppy Drive: 1.44 Mb.
•Monitor: 15 VGA Colour.
•Mouse: Logitech.
•Ram: 256 Mb.
Software Requirements:
•Operating system : - Windows XP Professional.
•Front End : - Visual Studio.Net 2008sp1
•Coding Language: - Asp .Net.