Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/imsatyasaiteja/visual-crypto-coding

Encrypts & Decrypts an Image based on four most important encryption methods
https://github.com/imsatyasaiteja/visual-crypto-coding

aes-encryption assymetric-key-cryptography data-integrity des-encryption encryption-decryption java rsa-encryption symmetric-key-cryptography triple-des visual-cryptographic-schemes

Last synced: about 1 month ago
JSON representation

Encrypts & Decrypts an Image based on four most important encryption methods

Awesome Lists containing this project

README

        

# Visual Crypto Coding
- Visual Crypto Coding is a cryptographic technique that involves encrypting an input image using a randomly generated key.
- The encrypted image can then be decrypted using either the same key (in symmetric encryption) or different keys (in asymmetric encryption methods).
- This technique is particularly useful for ensuring the secure transmission and storage of sensitive images.
- In addition to generating encrypted images, this process also yields decrypted images to verify data integrity.
- This involves ensuring that the decrypted images obtained from all cryptographic algorithms match the original input image, thereby confirming the accuracy of the encryption and decryption processes.
- Further improvements can be done to improve data confidentiality, efficiency of the codes. Please feel free to submit a pull request.

## Preview
vcc(1)
vcc(2)
vcc(3)

## Encryption Time
- The encryption time of all the four algorithms are obtained as follows in EncryptTime.txt file

| Algo | Time |
|------|--------------|
| DES | 4939747699 ns|
| 3DES | 4500023999 ns|
| AES | 4476420593 ns|
| RSA | 5360362883 ns|

## Key Takeaways
- Conducted thorough performance analysis, revealing the AES algorithm with an encryption time of 4.47 secs, outperforming other algorithms by 10.02% on average.
- This highlights the superior efficiency and security of AES compared to the other algorithms.

## References
- [Java Cryptography Architecture - Reference Guide](https://docs.oracle.com/en/java/javase/11/security/java-cryptography-architecture-jca-reference-guide.html)
- [Data Encryption Methods & Types](https://www.splunk.com/en_us/blog/learn/data-encryption-methods-types.html)