27-08-2014, 11:39 AM
A Keyless Approach to Image Encryption
A Keyless.pdf (Size: 33.75 KB / Downloads: 18)
Abstract
Maintaining the secrecy and confidentiality of images is a vibrant area of
research, with two different approaches being followed, the first being encrypting the
images through encryption algorithms using keys, the other approach involves dividing
the image into random shares to maintain the images secrecy. Unfortunately heavy
computation cost and key management limit the employment of the first approach and
the poor quality of the recovered image from the random shares limit the applications
of the second approach. In this paper we propose a novel approach without the use of
encryption keys. The approach employs Sieving, Division and Shuffling to generate
random shares such that with minimal computation, the original secret image can be
recovered from the random shares without any loss of image quality.
EXISTING SYSTEM
In Existing System, In the current scenario, when the end user wants to access his
confidential information, logging into his account the person enters information like username,
password, . etc. on the login page. But quite often, this information can be captured by attackers
and they can collect the login information the user enters and redirect him to the original page.
There is no such information that cannot be directly obtained from the user at the time of his
login input.
PROPOSED SYSTEM
In Proposed System, The main purpose of this research is to improve the and avoid the
attackers by using the visual cryptography. In this scheme we are going to sieving and shuffling
the images in to two types and we provide to the users and the user when they are try to login
they should enter the valid code then only it will allow the user to the original page.
Advantage
1. To avoid the attacker
2. Secrecy of the images should be maintained
3. Sieving and Shuffling of the images should be don
IMPLEMENTATION
Implementation is the stage of the project when the theoretical design is turned out
into a working system. Thus it can be considered to be the most critical stage in achieving a
successful new system and in giving the user, confidence that the new system will work and be
effective.
The implementation stage involves careful planning, investigation of the existing system
and it’s constraints on implementation, designing of methods to achieve changeover and
evaluation of changeover methods.
SPLIT & COMPINE TECHNIQUE
In this module, the operation of splitting the image into its constituent sieving and
shuffling. Pixels are digital numbers composed of bits. After the splitting the image with these
two types we are going to Combine when the user will login with his own sieving and shuffling
image. We are verifying the images are same or not then it will be allowed to enter the secret
code. After verification the secret code with database. It will allow the user to download files.