Design and Implementation of a Lock-Key Image Encryption and Decryption, Based on a User Provided Password

Download Now
Provided by: International Journal of Computer Applications
Topic: Security
Format: PDF
In this paper the authors explains about encryption and decryption of images using a secret password provided by the user. The encryption machine takes the password and the source image as input and generates a key pattern image by using Secure Hash Algorithm (SHA) and a lock image by using Mcrypt algorithm. It provides additional security using Image scrambling. The decryption machine takes the lock image, key image and the password as input to generate the original image. It also checks if the input is valid and blocks the user when an invalid input is provided.
Download Now

Find By Topic