Implementation of Encryption and Decryption
Process Using
OpenGL
PRESENTED BY
SUDHA M (4GW14ISO52)
NETHRAVATHI S(4GW15IS402)
Under the Guidance
Of
Amaresh A M,
Assistant professor,
Dept. of ISE,
GSSSIETW
DEPARTMENT OF INFORMATION SCIENCE & ENGINEERING
WHAT IS ENCRYPTION?
ENCRYPTION IS DEFINED AS MODIFIED INFORMATION
INTO A SPECIAL CODE, ESPECIALLY IN ORDER TO
PREVENT UNAUTHORIZED USERS TO HAVE ACCESS TO
THE INFORMATION.
WHAT IS DECRYPTION?
DECRYPTION IS THE PROCESS OF TAKING ENCODED OR
ENCRYPTED TEXT OR OTHER DATA AND CONVERTING IT
BACK INTO TEXT THAT YOU OR THE COMPUTER CAN
READ AND UNDERSTAND.
HOW IT WORKS?
OBJECTIVES
1.THE FIRST IS TO STUDY THE ARCHITECTURE OF IMAGE FILE. THE
STUDY IS FOCUSED TO JPG FILE TYPE BECAUSE IT IS ONE OF THE
MOST POPULAR IMAGE FORMAT USED.
2.THE SECOND OBJECTIVE IS TO DEVELOP AN APPLICATION USING
OPENGL THAT CAN BE USED TO ENCRYPT AN IMAGE FILE. THIS
APPLICATION MUST BE SIMPLE, EASY TO USE, AND POWERFUL.
3.THE LAST OBJECTIVE OF THIS THESIS IS TO MAKE SURE THAT THE
PASSWORD HANDLING PROCESS IS NO CARELESSLY IMPLEMENTED.
4.THIS APPLICATION WILL AFFECT ITS INTEGRITY AND REPUTATION. ALL
OF THE OBJECTIVES ACHIEVED GIVE A GOOD OUTCOME IN PROJECT.
OUTCOMES
THE APPLICATION HAS THE CAPABILITY TO PROTECT
SENSITIVE IMAGE FILE FROM BEING EXPOSED TO THE
UNAUTHORIZED USERS WHILE BEING TRANSFERRED OR WHEN
IT REACHES ITS TARGET DESTINATION.
THE MODIFICATION PERFORMED BY THE APPLICATION
WHEREBY ONCE THE IMAGE FILE IS ENCRYPTED BY THE
APPLICATION, IT CAN ONLY BE RETRIEVED BACK OR
DECRYPTED BY ITSELF ONLY.
 THE PROJECT ALSO PROVIDES USER WITH THE EASE OF USE
CONCEPT AND FASTER PROCESSING TIME. IT ALSO
INTRODUCES SAFER AND POWERFUL DATA.
ADVANTAGES
PROTECT IMAGE COMPLETELY
ACHIEVE SECURITY ON ALL DEVICES
TRANSMIT SECURELY
REFERENCES
HTTP://REPOSITORY.UM.EDU.MY/304/2/CHAPTER%201.PDF
HTTP://WWW.IJSR.NET/ARCHIVE/V2I2/IJSROFF2013041.PDF
IEEE PAPER OF S ROHITH ON “IMAGE ENCRYPTION AND
DECRYPTION”
HTTP://WWW.OPENGLPROJECTS.IN/2014/03/ENCRYPTION-
DECRYPTION-COMPUTER-GRAPHICS.HTML#GSC.TAB=0
HTTPS://WWW.CS.COLUMBIA.EDU/~ANGELOS/PAPERS/2004/G
C_CTRSA.PDF
Encryption and decryption

Encryption and decryption

  • 1.
    Implementation of Encryptionand Decryption Process Using OpenGL PRESENTED BY SUDHA M (4GW14ISO52) NETHRAVATHI S(4GW15IS402) Under the Guidance Of Amaresh A M, Assistant professor, Dept. of ISE, GSSSIETW DEPARTMENT OF INFORMATION SCIENCE & ENGINEERING
  • 2.
    WHAT IS ENCRYPTION? ENCRYPTIONIS DEFINED AS MODIFIED INFORMATION INTO A SPECIAL CODE, ESPECIALLY IN ORDER TO PREVENT UNAUTHORIZED USERS TO HAVE ACCESS TO THE INFORMATION.
  • 3.
    WHAT IS DECRYPTION? DECRYPTIONIS THE PROCESS OF TAKING ENCODED OR ENCRYPTED TEXT OR OTHER DATA AND CONVERTING IT BACK INTO TEXT THAT YOU OR THE COMPUTER CAN READ AND UNDERSTAND.
  • 4.
  • 6.
    OBJECTIVES 1.THE FIRST ISTO STUDY THE ARCHITECTURE OF IMAGE FILE. THE STUDY IS FOCUSED TO JPG FILE TYPE BECAUSE IT IS ONE OF THE MOST POPULAR IMAGE FORMAT USED. 2.THE SECOND OBJECTIVE IS TO DEVELOP AN APPLICATION USING OPENGL THAT CAN BE USED TO ENCRYPT AN IMAGE FILE. THIS APPLICATION MUST BE SIMPLE, EASY TO USE, AND POWERFUL. 3.THE LAST OBJECTIVE OF THIS THESIS IS TO MAKE SURE THAT THE PASSWORD HANDLING PROCESS IS NO CARELESSLY IMPLEMENTED. 4.THIS APPLICATION WILL AFFECT ITS INTEGRITY AND REPUTATION. ALL OF THE OBJECTIVES ACHIEVED GIVE A GOOD OUTCOME IN PROJECT.
  • 7.
    OUTCOMES THE APPLICATION HASTHE CAPABILITY TO PROTECT SENSITIVE IMAGE FILE FROM BEING EXPOSED TO THE UNAUTHORIZED USERS WHILE BEING TRANSFERRED OR WHEN IT REACHES ITS TARGET DESTINATION. THE MODIFICATION PERFORMED BY THE APPLICATION WHEREBY ONCE THE IMAGE FILE IS ENCRYPTED BY THE APPLICATION, IT CAN ONLY BE RETRIEVED BACK OR DECRYPTED BY ITSELF ONLY.  THE PROJECT ALSO PROVIDES USER WITH THE EASE OF USE CONCEPT AND FASTER PROCESSING TIME. IT ALSO INTRODUCES SAFER AND POWERFUL DATA.
  • 8.
    ADVANTAGES PROTECT IMAGE COMPLETELY ACHIEVESECURITY ON ALL DEVICES TRANSMIT SECURELY
  • 9.
    REFERENCES HTTP://REPOSITORY.UM.EDU.MY/304/2/CHAPTER%201.PDF HTTP://WWW.IJSR.NET/ARCHIVE/V2I2/IJSROFF2013041.PDF IEEE PAPER OFS ROHITH ON “IMAGE ENCRYPTION AND DECRYPTION” HTTP://WWW.OPENGLPROJECTS.IN/2014/03/ENCRYPTION- DECRYPTION-COMPUTER-GRAPHICS.HTML#GSC.TAB=0 HTTPS://WWW.CS.COLUMBIA.EDU/~ANGELOS/PAPERS/2004/G C_CTRSA.PDF