Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/imsatyasaiteja/visual-crypto-coding
Encrypts & Decrypts an Image based on four most important encryption methods
https://github.com/imsatyasaiteja/visual-crypto-coding
aes-encryption assymetric-key-cryptography data-integrity des-encryption encryption-decryption java rsa-encryption symmetric-key-cryptography triple-des visual-cryptographic-schemes
Last synced: about 1 month ago
JSON representation
Encrypts & Decrypts an Image based on four most important encryption methods
- Host: GitHub
- URL: https://github.com/imsatyasaiteja/visual-crypto-coding
- Owner: imsatyasaiteja
- License: mit
- Created: 2024-03-06T05:45:48.000Z (10 months ago)
- Default Branch: main
- Last Pushed: 2024-05-02T06:47:06.000Z (8 months ago)
- Last Synced: 2024-05-02T19:31:16.977Z (8 months ago)
- Topics: aes-encryption, assymetric-key-cryptography, data-integrity, des-encryption, encryption-decryption, java, rsa-encryption, symmetric-key-cryptography, triple-des, visual-cryptographic-schemes
- Language: Java
- Homepage:
- Size: 15.8 MB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Visual Crypto Coding
- Visual Crypto Coding is a cryptographic technique that involves encrypting an input image using a randomly generated key.
- The encrypted image can then be decrypted using either the same key (in symmetric encryption) or different keys (in asymmetric encryption methods).
- This technique is particularly useful for ensuring the secure transmission and storage of sensitive images.
- In addition to generating encrypted images, this process also yields decrypted images to verify data integrity.
- This involves ensuring that the decrypted images obtained from all cryptographic algorithms match the original input image, thereby confirming the accuracy of the encryption and decryption processes.
- Further improvements can be done to improve data confidentiality, efficiency of the codes. Please feel free to submit a pull request.## Preview
## Encryption Time
- The encryption time of all the four algorithms are obtained as follows in EncryptTime.txt file| Algo | Time |
|------|--------------|
| DES | 4939747699 ns|
| 3DES | 4500023999 ns|
| AES | 4476420593 ns|
| RSA | 5360362883 ns|## Key Takeaways
- Conducted thorough performance analysis, revealing the AES algorithm with an encryption time of 4.47 secs, outperforming other algorithms by 10.02% on average.
- This highlights the superior efficiency and security of AES compared to the other algorithms.## References
- [Java Cryptography Architecture - Reference Guide](https://docs.oracle.com/en/java/javase/11/security/java-cryptography-architecture-jca-reference-guide.html)
- [Data Encryption Methods & Types](https://www.splunk.com/en_us/blog/learn/data-encryption-methods-types.html)