SlideShare a Scribd company logo
Image Encryption Using Jumbling Salting
Submitted in partial fulfillment of the requirements
Of the degree of
B. E. Computer Engineering
By
SUMEET S. VERMA PID:172115
SWAPNIL S. SONTAKKE PID:172117
YASH S. SOLANKI PID:172128
SURAJ R. MAURYA PID: 182262
Supervisor(s):
MS. PRADNYA RANE
Assistant Professor
Department of Computer Engineering
St. Francis Institute of Technology
(Engineering College)
University of Mumbai
2020-2021
Image Encryption Using Jumbling Salting
Submitted in partial fulfillment of the requirements
Of the degree of
B. E. Computer Engineering
By
SUMEET S. VERMA PID:172115
SWAPNIL S. SONTAKKE PID:172117
YASH S. SOLANKI PID:172128
SURAJ R. MAURYA PID: 182262
Supervisor(s):
MS. PRADNYA RANE
Assistant Professor
Department of Computer Engineering
St. Francis Institute of Technology
(Engineering College)
University of Mumbai
2020-2021
CERTIFICATE
This is to certify that the project entitled “Image Encryption Using Jumbling Salting” is a
bonafide work of “Sumeet Verma (172115), Yash Solanki (172128), Swapnil Sontakke
(172117), and Suraj Maurya (182262)” submitted to the University of Mumbai in partial
fulfillment of the requirement for the award of the degree of B.E. in Computer Engineering
Ms. Pradnya Rane
Guide
Dr. Kavita Sonawane Dr. Sincy George
Head of Department Principal
i
Project Report Approval for B.E.
This project report entitled Image Encryption Using Jumbling Salting by Sumeet
Verma, Yash Solanki, Swapnil Sontakke, Suraj Maurya is approved for the degree
of B.E. in Computer Engineering.
Examiners
1. Ms. Pradnya Rane
2 Mr. K. S. Sakure
Date: 29-05-2021
Place: Mumbai
ii
Declaration
I declare that this written submission represents my ideas in my own words
and where others' ideas or words have been included, I have adequately cited and
referenced the original sources. I also declare that I have adhered to all principles
of academic honesty and integrity and have not misrepresented or fabricated or
falsified any idea/data/fact/source in my submission. I understand that any
violation of the above will be cause for disciplinary action by the Institute and can
also evoke penal action from the sources which have thus not been properly cited
or from whom proper permission has not been taken when needed.
-----------------------------------------
(Sumeet Verma PID172115)
-----------------------------------------
(Yash Solanki PID 172128)
---------------------------------------
(Swapnil Sontakke PID172117)
---------------------------------------
(Suraj Maurya PID 182262)
Date: 29/05/2021
iii
Abstract
Today almost all digital services like internet communication, medical and
military imaging systems, multimedia system requires reliable security in storage
and transmission of digital images. Due to faster growth in multimedia technology,
internet and cell phones, there is a need for security in digital images.
Therefore, there is a need for image encryption techniques in order to hide
images from such attacks. In this system we use JS (Jumbling Salting) algorithm in
order to hide the original image. Such Encryption technique helps to avoid
intrusion attacks. In cryptanalysis, a dictionary attack or brute force attack are the
most common ways of guessing the key values. Then, we perform digital image
processing, obtain the date that can use the JS encryption algorithm, combine both
approaches. It provides a new access to satisfy high level security of interactive
information requirements in the fields of aerospace, military, confidential, financial
and economic, national security and so on.
In order to augment the security aspect regarding images, we are devising JS
algorithm which will be responsible for preventing intrusion or brute force attacks
on the images. As JS algorithm deals with randomization, the image encryption
technique forms a highly secured form of encrypted image.
iv
TABLE OF CONTENTS
Chapter
No.
Topic Page
No.
1. Introduction 1
1.1 Description 2
1.2 Problem Formulation 2
1.3 Motivation 3
1.4 Proposed Solution 3
1.5 Scope of the project 4
2. Review of Literature 5
3. System Analysis 7
3.1 Functional Requirements 9
3.2 Non-Functional Requirements 7
3.3 Specific Requirements 8
3.4 Use-Case Diagrams and Description 9
4. Analysis Modeling 10
4.1 Data Modeling 10
4.2 Activity Diagram 11
4.3 Functional Modeling 12
4.4 Time Line Chart 13
5. Design 15
5.1 Architecture Design 15
5.2 User interface Design 18
6. Implementation 24
v
6.1 Algorithms / Methods Used 24
6.2 Working of the project 26
7. Testing 28
7.1 Test cases 28
7.2 Type of Testing used 29
8. Results And Discussions 30
9. Conclusions & Future Scope 31
Appendix
Literature Cited
Acknowledgement
vi
LIST OF TABLES
Table No. Table Name Page No.
1 Hardware Requirements 7
2 Software Requirements 8
3 Time Line Chart 13
4 Test Case 28
vii
LIST OF FIGURES
Figure No. Figure Name. Page No.
1 Aadhaar UIDAI 1
2 Use Case Diagram for User 9
3 ER Diagram 10
4 Activity Diagram for Admin 11
5 DFD Diagram for User 12
6 System Block Diagram 15
7 Process array in JS algorithm 16
8 Character set of JS algorithm 17
9 Salt array format in JS algorithm 17
10 Sign up page 18
11 Login page 18
12 Main 19
13 Different algorithm 19
14
Encryption using JS
20
15 Encryption using DES 20
16
Encryption using AES
21
17
Encryption using MJS
21
18 Decryption using JS 22
19 Decryption using DES 22
20 Decryption using AES 23
21 Decryption using MJS 23
22 Final output 30
viii
1. Introduction
Information technology today, driven by technological development, the transfer of
image information security has become the most pressing concern. In the transfer process, the
contents of the information may be intercepted by others to attack; hence people's privacy
would be threatened. These are related to the computer network has a close relationship.
JS algorithm however takes a lot of space and time for both the encryption and
decryption which is due to the various randomization techniques but on the other hand this
makes the algorithm fully secured.
Jumbling Salting algorithm’s Encryption as well as the Decryption time is large. The
additional overhead of jumbling and salting process increases due to the value of processing
time. The encryption and decryption time rises due to the process of randomization.
However, The AES can be chosen as it is advanced encryption standard for any data
encryption technique. JS algorithm also encrypts large data string or a large file. The
encryption time of JS above algorithm is higher than existing algorithms due to the extra
overhead of characters which is added (in Jumbling and salting procedure). The size of cipher
generated in case of JS encryption is higher than existing algorithms.
Image Encryption Using Jumbling Salting 1
1.2 Description
1.2 Description
JS algorithm has two techniques namely jumbling, salting. In the jumbling part, the
image undergoes “addition” and “selection” sub- processes. Addition process is generating a
value required for determining the number of characters to be added to the original block.
Selection deals with selecting characters to be added to the binary matrix from predefined
character set. In general, there are N numbers of character set in the provided array. Reverse
process is reversing the output of selection process on some predefinedcondition.
The condition can be implemented by any mathematical techniques like even odd, prime
number or any divisibility condition etc. In salting part, random salt is added to the jumbled
block. Selection of salt is based on timestamp value of the uploading time.
1.2 Problem Formulation
Being an important aspect of security, image is an authentication[11][6]
technique which
provides the claimant access to system resources. The probability of attacking the image is
considerably high. Although image encryption provides solution to prevent many attack shave
proven this image encryption technique to be futile. To overcome the problem of securing
encrypted image, we are developing JS technique which will provide additional security to the
stored images.
1.3 Motivation
Images excessively contribute to communication in this era of multimedia. When a user
transfers images over an unsecured communication network, then the absolute protection is a
challenging issue to conserve the confidentiality of images. Encryption is a method of
retaining the secrecy of images. The Internet and information technology are sprouting swiftly.
As a result, people are widely using interactive media in communication. For instance; image,
audio, and video. Images occupy the copious fraction of multimedia. Images play a significant
role in communication, for example; military, national-security agencies and diplomatic
affairs. Since, these images may carry highly confidential information, so these images entail
extreme protection when users collect somewhere over an unreliable repository. Furthermore,
when people wish to transfer images over an insecure network, then it becomes crucial to
provide an absolute protection. In brief, an image requires protection against various security
attacks the primary intention of keeping images protected is to maintain.
2
Chapter 1 Introduction
Confidentiality, integrity and authenticity. Different techniques are available for making images
secure and one technique is encryption. Generally, Encryption is a procedure that transforms an
image into a cryptic image by using a key. Furthermore, a user can retrieve the initial image by
applying a decryption method on the cipher image, which is usually a reverse execution of the
encryption process.
1.4 Proposed Solution
To ensure secured transmission of image, by encrypting it with JS algorithm.
The model for encryption and decryption of an image is designed with the objectives to
have confidentiality and security in transmission of the image-based data, with the help of
suitable user- defined download key.
1.5 Scope of the Project
1.5.1 Application
There are a number of sectors with their own specific needs for image encryption and
specialist services are provided to these users.
Biometrics
Fig.1 Aadhaar UIDAI
Image encryption, indeed, is necessary for future multimedia [2]
Internet applications.
Password codes to identify individual users will likely be replaced with biometric images of
Fingerprints and retinal scans such as AADHAAR based applications. However, such
3
1.5.2 Multimedia application
information will likely be sent over a network. When such images are sent over a network, an
eavesdropper may duplicate or reroute the information. By encrypting these images, the
Content still has some degree of added security. Furthermore, by encrypting non-critical
images as well, an eavesdropper is less likely to be able to distinguish between important and
non-important information.
1.5.2 Multimedia applications:
Image encryption can be used to protect intellectual properties. One of concerns of the
entertainment industry is that movies and videos in digital format are vulnerable to
unauthorized access, theft, and replication. Entertainment industry has lost billion dollars due
to the illegal copies[6]
. Recently, new technologies have been developed which allows
multimedia can be delivered to millions of household very quickly. In the future,
entertainment industry will utilize Internet and satellites for multimedia distributions. The
threat of unauthorized access during transmission over networks and the threat of illegal copy
increase significantly. Image encryption, therefore, can be used to minimize these problems
1.5.3 Scope
There has been an explosive growth of using computers, networks, communications
and multimedia applications. Today, Internet users demand not only text but also audio,
images, and video. Recently, the convergence of computers, networks, communications, and
multimedia applications, have been took place[2][7].
The information revolution is entering a new
area where consumer products will combine the functions of telephone, personal computer,
and television. In order to satisfy users demands, future consumer electronics devices, such as
videophone, should be able to transmit images and video over wireless communications
networks. Besides bandwidth and error resiliency issues present in applications, the presence
of a network has prompted new problems with security and privacy. Having a secure and
reliable means for communicating with images is a necessity for many networks.
4
2. Review of Literature
1. Research of Image Encryption Algorithm Base on Chaos Theory[14]
.
Using Chaos Theory, chaotic sequence is generated by Logistics Chaos Mapping. Image
encryption is realized by gray value of substitutes and pixel position scrambling. The chaotic
system that constitutes the three distinct one dimensional chaotic maps. The suggested
technique applies the Logistic map as a controller to choose the Tent map or a Sine map to
generate random sequences[11]
. Thereafter, the imparted algorithm utilizes the substitution-
permutation network (SPN) structure to obtain the confusion and diffusion property. This
scheme uses 240 bit key for large key space. Mainly, this key contains all parameter settings
and the initial values of the new chaotic system, and excessive sensitivity in key changes for
encryption and decryption.
Advantages:
• Chaotic system provides an excellent security against the brute force attack.
• Extreme key sensitivity and chaotic behavior.
Disadvantages:
• Sensitive dependence on initial conditions.
• Choosing the input parameters is highly complex.
2. Image Encryption and Decryption using Blowfish algorithm[15]
The Blowfish algorithm is the 64-bit symmetric block cipher that repeats simple function 16
times and applies a variable key length range from 32 to 448 bits. The offered system follows
the two processes; the first is a key expansion, and the second is a data encryption.
Furthermore, the Blowfish algorithm includes two exclusive or operations that are performed
after 16 rounds and a swap operation. The aftermaths corroborate that blowfish technique is
fast and secure.
Advantages:
• Blowfish algorithm is fast and secure.
• Blowfish is not subject to any patents and is therefore freely available for anyone to use. This
has contributed to its popularity in cryptographic software.
Disadvantages:
• Blowfish can’t provide authentication and non-repudiation as two people have same key.
• It also has weakness in decryption process over other algorithms in terms of time
consumption and serially in throughput.
5
3. Digital Image Encryption based on Advanced Encryption Standard Usage Mining
Using Artificial[16]:
Using AES algorithm implemented on MATLAB, performing digital image processing,
obtaining the date that can use AES Encryption algorithm & combining both approaches.
Advantages:
• As the AES encryption algorithm is fast and has the advantages of strong ability to resist
attacks. So this kind of algorithm is widely used in data encryption
Disadvantages:
• AES algorithm takes more time to encrypt image as compared with the Jumbling Salting
Algorithm.
4. SD-EI: A cryptographic technique to encrypt images[17]
This approach depends on the three methods of cryptography: (1) Bits rotation and reversal,
(2) Extended Hill Cipher, (3) Modified MSA Randomization. Furthermore, the proposed
system utilizes four stages to encrypt an image. At first stage, the algorithm generates a
unique number from the symmetric key. In the second stage, bit’s rotation and reversal are
done, based on the length of a symmetric key[8][9].
Afterward, in the third stage, the system
applies Extended Hill Cipher technique for the encryption. Thereafter, in the fourth stage, the
scheme uses the modified MSA randomization approach for substitution. The empirical
results corroborate that SD-AEI encoding procedure is dominant on the SD-EI due to
additional randomization.
Advantages:
• SD-EI technique can be used to encrypt and secure images, which are to be kept secret or
where steganography have already been applied to hide data in it.
• SD-EI technique is less scrambled.
Disadvantages:
• It is very difficult to decode the image without knowing the algorithm of SD-EI and the
authorization password.
• This image encryption method consists of two stages, among which first stage is Bits Rotation
Reversal stage and second stage is Extended Hill Cipher stage. For both stages, only one
alphanumeric password is needed.
6
3.1 Functional Requirements
3. System Analysis
The system will have the ability to encrypt and decrypt the image securely using JS
technique and will be able to prevent from attacks with the help of this newly improvised
image encryption technique and algorithms like AES for encrypted image protection. While
transferring the image present in jumbled form reaches the user and using decryption key, he
will get the access to that image avoiding any of the attacker/hacker. The functionalities of the
application would be easier to understand for the user.
3.2 Non-Functional Requirements
It is efficient to transfer the image in a secured platform. The system is mainly
designed for the situations where the security matters. The user will get rid of attacks on the
image and issues related to transfer of images. The rest of the security concern will be done by
the system or application.
3.3 Specific Requirements
This section discusses the hardware and software requirements for the design and
development of Software for Image Encryption Using Jumbling Salting.
The hardware used for the development of the project is:
Table 1. Hardware Requirements
Components Specifications
Screen Resolution 640 X 480 display 5400 RPM hard disk
System/Processor Intel® Core ™ Duo or more than CPU
@ 2.20 GHz.
Memory 2 GB of RAM
Hard Disk 500 GB of HDD or higher recommended
Supported Arch X86 and x64
7
3.3 Specific Requirement
The software used for the development of the project is:
Table 2. Software Requirements
Components Specifications
Operating System Microsoft Windows XP Professional
Microsoft Windows Server 2003
Windows Vista
Windows 2010 (64-bit)
Database SQL Server 2008 R2 (64-bit)
Supported Browsers Microsoft Internet Explorer 8.0
Google chrome
Mozilla Firefox
8
Chapter 3 System Analysis
3.4 Use-Case Diagrams
Fig. 2. Use Case Diagram for User
Description:
User can login the system and upload the file that has to be encrypted. Receiverenters the
secret key also can download the file later.
Database stores the login details along with the user uploaded file.
9
4.1 ER Diagram
4. Analysis Modeling
The ER diagram represents domains or objects as entities and its further functions as
attributes. The ER diagram represents the relationship between the different objects or entities
through various conditions or actions. It has many relationships between entities i.e. one-to-
one, one-to-many and many-to-many.
Description:
Fig. 3. ER Diagram
User panel has the user profile which is associated with user and the file.
User profile has various attributes such as name, email-id, mobile no and address.
10
Chapter 4 Analysis Modeling
4.2 Activity Diagram:
Fig. 4. Activity Diagram for Admin (Sender)
Description: Admin has to login first to access all the features such as Add User, View User, Edit
User, and Select User to send the file.
11
4.3 DFD
4.3 DFD:
Fig. 5. DFD Diagram for User
Description:
The User has to login the system to view shared files and decrypt them using the aforementioned
secret key shared by the admin.
The user can also download the decrypted images from the system.
12
Chapter 4 Analysis Modeling
4.4 Time Line Chart
Months → AUGUST SEPTEMBER OCTOBER NOVEMBER
Particulars ↓
W
1
W
2
W
3
W
4
W
1
W
2
W
3
W
4
W
1
W
2
W
3
W
4
W
1
W
2
W
3
W
4
1)Gathering initial
requirements
Decide the project topic
Identify needs and
constraints
Determine goals and
scope
Establish
specification
Milestone : product specification complete
2) Feasibility
Technical
feasibility
Economic
feasibility
Application (code)
feasibility
Operational feasibility
Milestone : feasibility study complete
3)Requirement
Determination
Determine inputs
Determine outputs
Process control
Synopsis
13
Milestone : synopsis is ready
Months → DECEMBER
JANUARY
FEBRUARY
MARCH
APRIL MAY
Particulars ↓
W
1
W
2
W
3
W
4
W
1
W
2
W
3
W
4
W
1
W
2
W
3
W
4
W
1
W
2
4)Analysis and
Design
Phase 1
Phase 2
Phase 3
Milestone : Design specification complete
5) Development
Developing
Interface
Developing
Modules
Milestone : Development phases complete
6) Testing
Testing
Connectivity
System testing and load
testing
Milestone : Testing phase complete
7)Implementation
Building Prototype
Building Interface
8) Evaluation
Documentation and
recommendation
Milestone : Implementation and Evaluation phases complete
Description: We have now completed with gathering initial requirements, Feasibility analysis of the project and
Requirements determination.
14
5. Design
5.1 Architectural Design
Fig. 6 System Block Diagram
Image to Image Matrix Conversion
A color image with resolution N*M (where n = no of pixels in height and m = no of pixels in width)
is converted into an 3 dimensional image matrix of order (N, M, 3) where each column has grey
scaled values (i.e. 0-255) of RGB colors respectively.
Jumbling block:
Jumbling process includes sub- processes viz. addition and selection. Process array is given to
Jumbling block. Jumbling block pre-pends some characters from the character set and jumbling
them with the help modulus function. Modulus is the mathematical function which returns reminder
of a division operation. Jumbling block itself is a combination of sub-blocks:
15
5.1 Architecture Design
Addition Sub-block:
This block generates principle random value “l” and updating the size of a Process Array. The
original size of process array P [ ] is ‘x’ which is now updated to (x + l).
The Fig.7. illustrates the position of Process array P [ ]
Process Array [x + l]
Fig. 7. Process array in JS algorithm
16
Chapter 5 Design
Selection sub-block:
This block is about selecting pixels values from predefined set A. The size of pixel array is large
and the predefined set for a particular image. Selection is based on the random values which are
generated “l” times. Practically the size of Process array is large enough to select the different pixel
values.
The character set of general Process array is shown in Fig. 8. below:
Fig. 8. Character set of JS algorithm
Salting block
The objective of salting block is to add random pixel values along with jumbled version of the pixel
values. The criteria of selection of salt are user’s sign-up timestamp value along with the users
download key. The salt is added in order to make the encryption more complicated thereby making
it difficult for the attacker to obtain it. The timestamp value is chosen for adding salt in the jumbled
version of the image, as it is unique value. For every user, the timestamp value is different so is the
download key. We have chosen servers value as timestamp value.
The general form of salt array is shown in Fig. 9 below:
Y Y Y Y D D M M H H m m s s
Fig. 9. Salt array format in JS algorithm
Where:
Y = Year, M= Month
D = Date
h = Hours in 24 hours format
m = minutes
s= seconds
17
5.2 User Interface Design
5.2 User Interface Design
Fig. 10. Sign up page
Fig. 11. Login page
18
Chapter 5 Design
Fig. 12. Main
Fig. 13. Different algorithm
19
5.2 User Interface Design
Fig. 14. Encryption using js
Fig. 15. Encryption using DES
20
Chapter 5 Design
Fig.16. Encryption using AES
Fig.17. Encryption using MJS
21
5.2 User Interface Design
Fig.18. Decryption using JS
Fig.19 Decryption using DES
22
Chapter 5 Design
Fig.20 Decryption using AES
Fig.21 Decryption using MJS
23
6. Implementation
6.1 Algorithms Used
Input: Image in 1-dimension Image Matrix form. ==> (500*500)*3 == 7.5L elements where 500*500
is the resolution of the image and 3 grey scaled images each of RGB format.
Output: Image in Jumbled- salted form.
STEP 1:
INITIALIZE 'x' to 0;
STEP 2:
STORE the length of Image in 1-dimension matrix in variable “x”;
STEP 3:
CREATE an Process array P [ ] such that P [length =x];
STEP 4:
STORE each pixel value in an array block;
// P {0, 1, 2... x-1) = { pixels in process array with
index }
/* implementation of Jumbling Process */
Function jumbling (P [ ])
{
// implementation of jumbling technique: Addition
Process
STEP 5:
Label 1: CALL Random () function;
// Random function returns any random value from
predefined set of integers within the limit provided by
programmer.
SET ‘l’ as principle random value; (where l>x and l<limit, where limit is set by programmer)
If (l >= x)
STORE random number value in ‘l’ generated from
random () function;
Else
Goto Label 1;
Break;
End If
STEP 6:
UPDATE an array P [ ] of size (x + l)
STEP 7:
DEFINE the set of pixel values A.
//Size (A) = M;
// M = any large value;
24
Chapter 6 Implementation
//implementation of jumbling technique: Selection
Process
/* this process selects pixel Values from given pixel value set.
All these are added with process array. These process is also made randomized */
STEP 8:
CALL random ( ) function 'l' times;
// At each iteration, random value is generated by random
function which acts as an index of the pixel value in pixel value set.
STEP 9:
FILL the process array with Pixel values
STEP 10:
STORE the original length of an array in variable say
“FIX”
For i = 0 to (x+l-1)
While (l! =0)
SET j to 0;
j= (FIX modulus l);
Create 'temp' variable;
Swap (P[i], P[j]);
//output of above modulus function is an index integer
within the range 0 to (x + l - 1), Hence we must swap output
value with the same index integer with index 0th position
value.
l= l-1; // decrement l
End While
End For
}
// end of jumbling function
/* implementation of Salting Technique */
Function salting( P[ ] )
{
STEP 12:
STORE current Timestamp value of the server;
STEP 13:
OBTAIN the length of timestamp say ‘t’. (YYYYDDMMHHmmss)i.e.14
Append The download key provided by the user.len(16 char)
STEP 14:
CREATE Salt [size=t] array which stores random salt values;
Salt [ ] = {values obtained from Timestamp value};
STEP 15:
UPDATE an array P of size (x + l + t + 16)
FILL the process array with Jumbled pixel values of size
(x + l) and salt values of size t+16.
25
6.2 Working of the project
Return (P);
}
// end of salting function
6.2 Working of the project (code for mentioned algorithms)
public partial class Add_New_User : System.Web.UI.Page
{
protected void Page_Load(object sender, EventArgs e)
{
if (Session["a_id"] == "")
{
Response.Redirect("Login.aspx?msg=logout");
}
btnCancel.Visible = false;
if (Request.QueryString["action"] == "edit" &&this.IsPostBack == false)
{
btnCancel.Visible = true;
stringuser_id = Request.QueryString["user_id"];
string query1 = "select * from User_Master where user_id='" + user_id + "'";
DataTabledt = Database.Getdata(query1);
txtfull_name.Text = Convert.ToString(dt.Rows[0]["full_name"]);
txtcontact_no.Text = Convert.ToString(dt.Rows[0]["contact_no"]);
txtaddress.Text = Convert.ToString(dt.Rows[0]["address"]);
}
}
protected void btnSave_Click(object sender, EventArgs e)
{
if (Request.QueryString["action"] == "edit")
{
stringuser_id = Request.QueryString["user_id"];
string query2 = "update User_Master set full_name='" + txtfull_name.Text +
"',contact_no='" + txtcontact_no.Text + "',address='" +
txtaddress.Text + "' where user_id='" + user_id + "'";
Database.InsertData_direct(query2);
Response.Redirect("Manage_Users.aspx?msg=update")
}
else
{
stringselect_id = "select * from User_Master '"+txt.Text+"'";
DataTabledt = Database.Getdata(select_id);
if (dt.Rows.Count> 0)
{
Alert.Show("User Already Exists");
}
else {
26
Chapter 6 Implementation
var chars =
"QWERTYUIOPLKJHGFDSAZXCVBNMqwertyuioplkjhgfdsazxcvbnm0987654321";
varstringargs = new char[8];
var random = new Random();
for (inti = 0; i<stringargs.Length; i++)
{
stringargs[i] = chars[random.Next(chars.Length)];
}
string password = new String(stringargs);
string query = "Insert Into User_Master values('" + txtfull_name.Text + "','" +
txtcontact_no.Text + "','" + txt.Text + "','" + txtaddress.Text + "','" + password + "') ";
Database.InsertData_direct(query);
27
7. Testing
The aim of testing is to prove that the developed system addresses the pre-defined business
requirements and will perform reliably and efficiently when running live.
7.1 Test cases
Table 4. Test Cases
Sr.
No.
Case Pre-Condition Action
Taken
Expected
Output
Actual
Output
Pass
/
Fail
1 Admin/User
Login
Admin/User has
to start the
system to the
login page
Input is checked
with the present
credentials for
the user.
If data entered is
correct login will be
successful otherwise
error message is
displayed.
If data entered is
correct login will
be successful
otherwise error
message is
displayed.
Pass
2 Upload
Image
Select the
image from
the device
The image from
the computer
system gets
uploaded.
Image is
uploaded.
Image is
uploaded.
Pass
3 Encrypt
Image
Select the image
to encrypt
Image is
encrypted
within the
master file
Encrypted
image is formed.
Encrypted
image is
formed.
Pass
4 Decrypt
Image
User has to get
access to the
image by
providing the
secret key.
Secret key is
checked within
the database for
that particular
user
The image is
decrypted
successfully and is
downloaded in the
user’s system
The image is
decrypted
successfully and
is downloaded in
the user’s system
Pass
5 Exiting the
application
User has to click
on the Log Out
button from the
User panel
The web
application is
closed.
The user is logged
out successfully.
The user is logged
out successfully.
Pass
6 Other file
formats
Admin uploads
different format
file
File is
checked.
File is
successfully
uploaded
File cannot be
uploaded.
Pass
28
Chapter 7 Testing
7.2 Type of testing use:
Regression Testing: Regression testing focuses on finding defects after a major code change has
occurred. Specifically, it seeks to uncover software regression, or old bugs that have come back. Such
regressions occur whenever software functionality that was previously working correctly stops
working as intended.
Stability Testing:
Stability testing checks to see if the software can continuously function well in or above an
acceptable period. This activity of non-functional software.
Usability Testing:
Usability testing is needed to check if the user interface is easy to use and understand. It approaches
towards the use of the application.
Unit Testing
The minimal software components (module) are tested.
Each unit(basic component) of the software is tested to verify that the detailed design for the unit has
been correctly implemented.
Testing is done on the following levels:
• Testing is done at class level, and the minimal unit tests include the constructors and
destructors.
• In Black Box Testing specification based testing is done to find that each module gives
specific output for particular input integration testing.
• The interfaces and interaction between integrated components are tested.
• Progressively larger group of tested software components corresponding to elements of the
architectural design are integrated and tested until the software works as a system.
29
8. Results and Discussions
• In this system, we mainly concentrated on encrypting and decrypting the original image. This
system is designed as a web application which encrypts and decrypts the original image.
• Normally, after encrypting the image, the original image may lose its resolution. In the
implemented approach, the image remains unchanged in its resolution as well in size.
• The speed of encrypting the image is high such that the image’s visual quality is not changed and
the image is encrypted securely.
• For the encryption and decryption phase, JS algorithm is used and implemented in Java
programming language.
• The concatenation approach is used in this system in which the image is converted into bytes
format and this data is concatenated at the end of the master file. Since this approach is used, there
is no change in visual quality of the jumbled image.
Final Output:
Fig.22 Final output
In this project (fig.22) we have implemented the modified JS algorithm and later compared it with
other similar functioning algorithms such as AES, DES and Jumbling Salting Algorithm.
Also we have done this by using a throughput value that is considered as measure for comparing the
effectiveness of these algorithms. Basically the throughput value indicates the number of Megabytes of
image encrypted with respect to time taken to encrypt the image.
30
9. Conclusions
This system puts forward the method that uses the JS algorithm with the key control to encrypt
the image. This method incorporates a variety of characteristics, and with simple design. JS
algorithm reduces the probability of decrypting the image. Due to the various randomization
techniques, it builds an encrypted image which is almost difficult to decrypt. To decipher this
encrypted image is a difficult task.
JS algorithm however takes a lot of space and time for both the encryption and decryption which
is due to the various randomization techniques but on the other hand this makes the algorithm fully
secured.
Jumbling Salting algorithm’s Encryption as well as the Decryption time is large. The additional
overhead of jumbling and salting process increases due to the value of processing time. The
encryption and decryption time rises due to the process of randomization.
The existing system uses JS algorithm for text encryption technique. This developed system will
now be able to transfer images in a secured way so that the image cannot be intercepted by the
intruder. It is done by encrypting the image and obtaining a random length secret key and hence we
get a jumbled image. The decryption of the image from the jumbled form will be done using JS
technique because the encrypted image will not be altered visually even after the encryption process
is done. The final output image can be obtained by entering the secret key so that the intruder cannot
detect the presence of the secret image and thus confidentiality and privacy is assured and achieved.
In this way, we can securely transfer the jumbled image in a secret way, only the sender and receiver
will know that the jumbled image contains the original image which needs to be transferred to the
receiver.
31
Future Scope
1. Image Encryption for Defense
If the image is encrypted in a more efficient manner using jumbling salting algorithm, it can be used for
defence purpose. Various images captured by satellite for national security which is used by our defence
forces can use JS algorithm to provide better efficiency and security in the domain of image security.
2. Encryption in printed media
If the data is embedded in an image, the image printed, then scanned and stored in a file can the
embedded image be recovered? This would require a special form of an encryption- decryption
mechanism to which could allow for in accuracies in the printing and scanning equipment.
32
Appendix
using System;
usingSystem.Collections.Generic;
usingSystem.Linq;
usingSystem.Web;
usingSystem.Web.UI;
usingSystem.Web.UI.WebControls;
usingSystem.Data;
public partial class Add_New_User : System.Web.UI.Page
{
protected void Page_Load(object sender, EventArgs e)
{
if (Session["a_id"] == "")
{
Response.Redirect("Login.aspx?msg=logout");
}
btnCancel.Visible = false;
if (Request.QueryString["action"] == "edit" &&this.IsPostBack == false)
{
btnCancel.Visible = true;
stringuser_id = Request.QueryString["user_id"];
string query1 = "select * from User_Master where user_id='" + user_id + "'";
DataTabledt = Database.Getdata(query1);
txtfull_name.Text = Convert.ToString(dt.Rows[0]["full_name"]);
txtcontact_no.Text = Convert.ToString(dt.Rows[0]["contact_no"]);
txtemail_id.Text = Convert.ToString(dt.Rows[0]["email_id"]);
txtaddress.Text = Convert.ToString(dt.Rows[0]["address"]);
}
}
protected void btnSave_Click(object sender, EventArgs e)
{
if (Request.QueryString["action"] == "edit")
{
stringuser_id = Request.QueryString["user_id"];
string query2 = "update User_Master set full_name='" + txtfull_name.Text +
"',contact_no='" + txtcontact_no.Text + "',email_id='" + txtemail_id.Text + "',address='" +
txtaddress.Text + "' where user_id='" + user_id + "'";
Database.InsertData_direct(query2);
Response.Redirect("Manage_Users.aspx?msg=update")
}
else
{
string select_id = "select * from User_Master where email_id='"+txtemail_id.Text+"'";
DataTabledt = Database.Getdata(select_id);
if (dt.Rows.Count> 0)
{
33
Alert.Show("User Already Exists");
}
else {
var chars =
"QWERTYUIOPLKJHGFDSAZXCVBNMqwertyuioplkjhgfdsazxcvbnm0987654321";
varstringargs = new char[8];
var random = new Random();
for (inti = 0; i<stringargs.Length; i++)
{
stringargs[i] = chars[random.Next(chars.Length)];
}
string password = new String(stringargs);
string query = "Insert Into User_Master values('" + txtfull_name.Text + "','" +
txtcontact_no.Text + "','" + txtemail_id.Text + "','" + txtaddress.Text + "','" + password + "') ";
Database.InsertData_direct(query);
34
References
[1] Applied Cryptography-Protocols Algorithms and Source Code in C John Wiley
Publications,ISBN978-04711-17094
[2] M. Stamp. Information Security: Principles an practice, John Wiley publications, ISBN-
13978-0-471-73848-0.
[3] Ch. SanthoshReddy,Ch. Sowjanya ,Praveena,ProfShaliniL,“Poly-alphabetic Symmetric
Key Algorithm Using Randomized Prime Numbers” International Journal of Scientific and
Research Publications, Volume 2 ,Issue 9,September 2012,ISSN22503153
[4] William Stallings. Cryptography and Network Security: Principles and Practices, Fourth
Edition. Beijing: Electronic Industry Press.2007:229~250
[5] C. Pfleeger,S. Pfleeger, Security in Computing, Third Edition, Prentice Hall PTR, ISBN :
0-13-035548-8
[6] Kahate Atul,2003,"Cryptography and Network Security", Third Edition, TataMcGrawHill
India.
[7] Features of C# [Online], http:// www.tutorialspoint.com/csharp.[Accessed: June 25,
2015].
[8] Features an overview of C# [Online], http://www.slideshare.net.[Accessed: June 25
2015].
[9] C# and .net technology [Online] https://www.msdn.microsoft.com.[Accessed: June 25
2015].
[10] Daemen, J., and Rijmen, V. "Rijndael: The Advanced Encryption Standard r. Dobb's
Journal, March 2001,pp.137-139.
[11] "A Performance Comparison of Data Encryption Algorithms," IEEE Information and
Communication Technologies, 2005. ICICT 2005. First International Conference, 2006-02- 27,
PP.84-89
[12] TingyuanNie, ChuanwangSonga, XulongZhi (2010), “Performance Evaluation of DES
and Blowfish Algorithms”, Proceedings of 2010IEEE.
[13] The Pledge of Independence, Declaration of PurnaSwaraj, Lahore Congress, January
26, 1930 [Online], http://www.knowindia.gov.in, [Accessed: June 25,2015].
[14] Liu Bo, Liu Na, Li Jianxia and Liang Wei, "Research of image encryption algorithm base
on chaos theory," Proceedings of 2011 6th International Forum on Strategic Technology, Harbin,
Heilongjiang, 2018, pp. 1096-1098, doi: 10.1809/IFOST.2018.6021211.
35
[15]
Anjaneyulu, G.S.G.N. &Kurmi, P.K. & Jain, R..(2015). Image encryption and decryption using
blowfish algorithm with randomnumber generator. 6. 7164-7170.
[16] Gamido, Heidilyn&Sison, Ariel & Medina, Ruji. (2018). Implementation of Modified
AES as Image Encryption Scheme. 301-308. 10.11591/ijeei.v6i3.490.
[17] Dey, Somdip. (2012). SD-EI: A cryptographic technique to encrypt images. Proceedings
2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec
2012. 28-32. 10.1109/CyberSec.2012.6246123.
[18] MayureshVartak, Rishabh Reddy, PrathameshChuri, “Image Encryption using Jumbling-
Salting Algorithm” International Journal of Innovative Technology and Exploring Engineering
(IJITEE) ISSN: 2278-3075, Volume-8 Issue-12S, October 2019.
36
Acknowledgement
It gives us great pleasure in presenting this project report titled: “IMAGE ENCRYPTION
USING JUMBLING SALTING.
On this momentous occasion, we wish to express our immense gratitude to the range of
people who provided invaluable support in the completion of this project. Their guidance and
encouragement has helped in making this project a great success. We express our gratitude to our
project guide Prof. Pradnya Rane who provided us with all the guidance and encouragement
and making the lab available to us at any time. We also would like to deeply express our sincere
gratitude to Project coordinators.
We are eager and glad to express our gratitude to the Head of the Computer Engineering
Dept. Dr.Kavita Sonawane, for her approval of this project. We are also thankful to her for
providing us the needed assistance, detailed suggestions and also encouragement to do the
project. We would like to deeply express our sincere gratitude to our respected principal Dr.
Sincy George and the management of St. Francis Institute of Technology, Borivali for
providing such an ideal atmosphere to build up this project with well- equipped library with all
the utmost necessary reference materials and up to date IT Laboratories.
We are extremely thankful to all staff and the management of the college for providing us
all the facilities and resources required.
Submitted by:
“Sumeet Verma”
“Yash Solanki”
“Swapnil Sontak”
“Suraj Maurya”
37

More Related Content

What's hot

QOS (Quality of Services) - Computer Networks
 QOS (Quality of Services) - Computer Networks QOS (Quality of Services) - Computer Networks
QOS (Quality of Services) - Computer Networks
IIIT Manipur
 
Network layer
Network layerNetwork layer
Network layer
sbkbca
 
Unit 3 Network Layer PPT
Unit 3 Network Layer PPTUnit 3 Network Layer PPT
Unit 3 Network Layer PPT
KalpanaC14
 
B&W Image Coloring (1).pptx
B&W  Image Coloring (1).pptxB&W  Image Coloring (1).pptx
B&W Image Coloring (1).pptx
Vaibhav533087
 
Adaptive quantization methods
Adaptive quantization methodsAdaptive quantization methods
Adaptive quantization methods
Mahesh pawar
 
Case Study on GINA(Global Innovation Network and Analysis) based on Data Anal...
Case Study on GINA(Global Innovation Network and Analysis) based on Data Anal...Case Study on GINA(Global Innovation Network and Analysis) based on Data Anal...
Case Study on GINA(Global Innovation Network and Analysis) based on Data Anal...
divyawani2
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 
Bank Question Solution-ADBA Previous Year Question for AP, ANE, AME, ADA, AE
Bank Question Solution-ADBA Previous Year Question for AP, ANE, AME, ADA, AEBank Question Solution-ADBA Previous Year Question for AP, ANE, AME, ADA, AE
Bank Question Solution-ADBA Previous Year Question for AP, ANE, AME, ADA, AE
Engr. Md. Jamal Uddin Rayhan
 
IP Routing Tutorial
IP Routing TutorialIP Routing Tutorial
IP Routing Tutorial
ShortestPathFirst
 
Lec-03 Entropy Coding I: Hoffmann & Golomb Codes
Lec-03 Entropy Coding I: Hoffmann & Golomb CodesLec-03 Entropy Coding I: Hoffmann & Golomb Codes
Lec-03 Entropy Coding I: Hoffmann & Golomb Codes
United States Air Force Academy
 
Chapter 6 - Computer Networking a top-down Approach 7th
Chapter 6 - Computer Networking a top-down Approach 7thChapter 6 - Computer Networking a top-down Approach 7th
Chapter 6 - Computer Networking a top-down Approach 7th
Andy Juan Sarango Veliz
 
TRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTP
TRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTPTRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTP
TRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTP
Pankaj Debbarma
 
Streaming Stored Video- Computer Networking
Streaming Stored Video- Computer Networking  Streaming Stored Video- Computer Networking
Streaming Stored Video- Computer Networking
Mahbubur Rahman
 
MULTIMEDIA COMMUNICATION & NETWORKS
MULTIMEDIA COMMUNICATION & NETWORKSMULTIMEDIA COMMUNICATION & NETWORKS
MULTIMEDIA COMMUNICATION & NETWORKS
Kathirvel Ayyaswamy
 
Module 3
Module 3Module 3
Module 3
Gururaj H L
 
The Data Link Layer
The Data Link LayerThe Data Link Layer
The Data Link Layer
adil raja
 
Transfer Learning
Transfer LearningTransfer Learning
Transfer Learning
Hichem Felouat
 
Ph.D Dissertation Defense Slides on Efficient VLSI Architectures for Image En...
Ph.D Dissertation Defense Slides on Efficient VLSI Architectures for Image En...Ph.D Dissertation Defense Slides on Efficient VLSI Architectures for Image En...
Ph.D Dissertation Defense Slides on Efficient VLSI Architectures for Image En...
BMS Institute of Technology and Management
 
POP3 Post Office Protocol
POP3 Post Office ProtocolPOP3 Post Office Protocol
POP3 Post Office Protocol
Samreen Reyaz Ansari
 
student mangement
student mangementstudent mangement
student mangementAditya Gaud
 

What's hot (20)

QOS (Quality of Services) - Computer Networks
 QOS (Quality of Services) - Computer Networks QOS (Quality of Services) - Computer Networks
QOS (Quality of Services) - Computer Networks
 
Network layer
Network layerNetwork layer
Network layer
 
Unit 3 Network Layer PPT
Unit 3 Network Layer PPTUnit 3 Network Layer PPT
Unit 3 Network Layer PPT
 
B&W Image Coloring (1).pptx
B&W  Image Coloring (1).pptxB&W  Image Coloring (1).pptx
B&W Image Coloring (1).pptx
 
Adaptive quantization methods
Adaptive quantization methodsAdaptive quantization methods
Adaptive quantization methods
 
Case Study on GINA(Global Innovation Network and Analysis) based on Data Anal...
Case Study on GINA(Global Innovation Network and Analysis) based on Data Anal...Case Study on GINA(Global Innovation Network and Analysis) based on Data Anal...
Case Study on GINA(Global Innovation Network and Analysis) based on Data Anal...
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
Bank Question Solution-ADBA Previous Year Question for AP, ANE, AME, ADA, AE
Bank Question Solution-ADBA Previous Year Question for AP, ANE, AME, ADA, AEBank Question Solution-ADBA Previous Year Question for AP, ANE, AME, ADA, AE
Bank Question Solution-ADBA Previous Year Question for AP, ANE, AME, ADA, AE
 
IP Routing Tutorial
IP Routing TutorialIP Routing Tutorial
IP Routing Tutorial
 
Lec-03 Entropy Coding I: Hoffmann & Golomb Codes
Lec-03 Entropy Coding I: Hoffmann & Golomb CodesLec-03 Entropy Coding I: Hoffmann & Golomb Codes
Lec-03 Entropy Coding I: Hoffmann & Golomb Codes
 
Chapter 6 - Computer Networking a top-down Approach 7th
Chapter 6 - Computer Networking a top-down Approach 7thChapter 6 - Computer Networking a top-down Approach 7th
Chapter 6 - Computer Networking a top-down Approach 7th
 
TRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTP
TRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTPTRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTP
TRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTP
 
Streaming Stored Video- Computer Networking
Streaming Stored Video- Computer Networking  Streaming Stored Video- Computer Networking
Streaming Stored Video- Computer Networking
 
MULTIMEDIA COMMUNICATION & NETWORKS
MULTIMEDIA COMMUNICATION & NETWORKSMULTIMEDIA COMMUNICATION & NETWORKS
MULTIMEDIA COMMUNICATION & NETWORKS
 
Module 3
Module 3Module 3
Module 3
 
The Data Link Layer
The Data Link LayerThe Data Link Layer
The Data Link Layer
 
Transfer Learning
Transfer LearningTransfer Learning
Transfer Learning
 
Ph.D Dissertation Defense Slides on Efficient VLSI Architectures for Image En...
Ph.D Dissertation Defense Slides on Efficient VLSI Architectures for Image En...Ph.D Dissertation Defense Slides on Efficient VLSI Architectures for Image En...
Ph.D Dissertation Defense Slides on Efficient VLSI Architectures for Image En...
 
POP3 Post Office Protocol
POP3 Post Office ProtocolPOP3 Post Office Protocol
POP3 Post Office Protocol
 
student mangement
student mangementstudent mangement
student mangement
 

Similar to Image encryption using jumbling salting

Extended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using WatermarkingExtended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using Watermarking
Shivam Singh
 
IRJET- Low Band Width High Secured Image Transmission in Robust Channels
IRJET-  	  Low Band Width High Secured Image Transmission in Robust ChannelsIRJET-  	  Low Band Width High Secured Image Transmission in Robust Channels
IRJET- Low Band Width High Secured Image Transmission in Robust Channels
IRJET Journal
 
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
IRJET Journal
 
IRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure TransmissionIRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET Journal
 
Visual Cryptography Industrial Training Report
Visual Cryptography Industrial Training ReportVisual Cryptography Industrial Training Report
Visual Cryptography Industrial Training Report
Mohit Kumar
 
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingReview On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image Slicing
IRJET Journal
 
An improved color image encryption algorithm with
An improved color image encryption algorithm withAn improved color image encryption algorithm with
An improved color image encryption algorithm with
eSAT Publishing House
 
An improved color image encryption algorithm with pixel permutation and bit s...
An improved color image encryption algorithm with pixel permutation and bit s...An improved color image encryption algorithm with pixel permutation and bit s...
An improved color image encryption algorithm with pixel permutation and bit s...
eSAT Journals
 
Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...
CSCJournals
 
G1803063741
G1803063741G1803063741
G1803063741
IOSR Journals
 
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming MachineIRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET Journal
 
User centric machine learning for cyber security operation center
User centric machine learning for cyber security operation centerUser centric machine learning for cyber security operation center
User centric machine learning for cyber security operation center
Sai Chandra Chittuluri
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ijistjournal
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ijistjournal
 
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IJCSEA Journal
 
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IJCSEA Journal
 
Secure video transmission using steganography and cryptography
Secure video transmission using steganography and cryptographySecure video transmission using steganography and cryptography
Secure video transmission using steganography and cryptography
Maizatul Auni Bt Mazhar
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
IRJET Journal
 
Enhancing Social Network Security through Smart Credentials
Enhancing Social Network Security through Smart CredentialsEnhancing Social Network Security through Smart Credentials
Enhancing Social Network Security through Smart Credentials
IJCSIS Research Publications
 
Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.
IRJET Journal
 

Similar to Image encryption using jumbling salting (20)

Extended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using WatermarkingExtended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using Watermarking
 
IRJET- Low Band Width High Secured Image Transmission in Robust Channels
IRJET-  	  Low Band Width High Secured Image Transmission in Robust ChannelsIRJET-  	  Low Band Width High Secured Image Transmission in Robust Channels
IRJET- Low Band Width High Secured Image Transmission in Robust Channels
 
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
 
IRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure TransmissionIRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure Transmission
 
Visual Cryptography Industrial Training Report
Visual Cryptography Industrial Training ReportVisual Cryptography Industrial Training Report
Visual Cryptography Industrial Training Report
 
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingReview On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image Slicing
 
An improved color image encryption algorithm with
An improved color image encryption algorithm withAn improved color image encryption algorithm with
An improved color image encryption algorithm with
 
An improved color image encryption algorithm with pixel permutation and bit s...
An improved color image encryption algorithm with pixel permutation and bit s...An improved color image encryption algorithm with pixel permutation and bit s...
An improved color image encryption algorithm with pixel permutation and bit s...
 
Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...
 
G1803063741
G1803063741G1803063741
G1803063741
 
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming MachineIRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
 
User centric machine learning for cyber security operation center
User centric machine learning for cyber security operation centerUser centric machine learning for cyber security operation center
User centric machine learning for cyber security operation center
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
 
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
 
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
 
Secure video transmission using steganography and cryptography
Secure video transmission using steganography and cryptographySecure video transmission using steganography and cryptography
Secure video transmission using steganography and cryptography
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
Enhancing Social Network Security through Smart Credentials
Enhancing Social Network Security through Smart CredentialsEnhancing Social Network Security through Smart Credentials
Enhancing Social Network Security through Smart Credentials
 
Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.
 

More from Mauryasuraj98

Movie recommendation system using collaborative filtering system
Movie recommendation system using collaborative filtering system Movie recommendation system using collaborative filtering system
Movie recommendation system using collaborative filtering system
Mauryasuraj98
 
Movies recommendation system in R Studio, Machine learning
Movies recommendation system in  R Studio, Machine learning Movies recommendation system in  R Studio, Machine learning
Movies recommendation system in R Studio, Machine learning
Mauryasuraj98
 
Evolution of computer generation.
Evolution of computer generation. Evolution of computer generation.
Evolution of computer generation.
Mauryasuraj98
 
Case study on Intel core i3 processor.
Case study on Intel core i3 processor. Case study on Intel core i3 processor.
Case study on Intel core i3 processor.
Mauryasuraj98
 
Atm simulation mini project using Python programming language
Atm simulation  mini project using Python programming language Atm simulation  mini project using Python programming language
Atm simulation mini project using Python programming language
Mauryasuraj98
 
CAR PARKING SYSTEM USING VISUAL STUDIO C++ (OPERATING SYSTEM MINI PROJECT )
CAR PARKING SYSTEM USING VISUAL STUDIO C++ (OPERATING SYSTEM MINI PROJECT ) CAR PARKING SYSTEM USING VISUAL STUDIO C++ (OPERATING SYSTEM MINI PROJECT )
CAR PARKING SYSTEM USING VISUAL STUDIO C++ (OPERATING SYSTEM MINI PROJECT )
Mauryasuraj98
 
Ludo game using c++ with documentation
Ludo game using c++ with documentation Ludo game using c++ with documentation
Ludo game using c++ with documentation
Mauryasuraj98
 
Ludo mini project in c++
Ludo mini project in c++Ludo mini project in c++
Ludo mini project in c++
Mauryasuraj98
 
Telephone directory using c language
Telephone directory using c languageTelephone directory using c language
Telephone directory using c language
Mauryasuraj98
 
Mini cnc plotter or printer
Mini cnc plotter or printer Mini cnc plotter or printer
Mini cnc plotter or printer
Mauryasuraj98
 
Mini Cnc Printer
Mini Cnc PrinterMini Cnc Printer
Mini Cnc Printer
Mauryasuraj98
 
E wallet
E wallet E wallet
E wallet
Mauryasuraj98
 
Pointer in C++
Pointer in C++Pointer in C++
Pointer in C++
Mauryasuraj98
 

More from Mauryasuraj98 (13)

Movie recommendation system using collaborative filtering system
Movie recommendation system using collaborative filtering system Movie recommendation system using collaborative filtering system
Movie recommendation system using collaborative filtering system
 
Movies recommendation system in R Studio, Machine learning
Movies recommendation system in  R Studio, Machine learning Movies recommendation system in  R Studio, Machine learning
Movies recommendation system in R Studio, Machine learning
 
Evolution of computer generation.
Evolution of computer generation. Evolution of computer generation.
Evolution of computer generation.
 
Case study on Intel core i3 processor.
Case study on Intel core i3 processor. Case study on Intel core i3 processor.
Case study on Intel core i3 processor.
 
Atm simulation mini project using Python programming language
Atm simulation  mini project using Python programming language Atm simulation  mini project using Python programming language
Atm simulation mini project using Python programming language
 
CAR PARKING SYSTEM USING VISUAL STUDIO C++ (OPERATING SYSTEM MINI PROJECT )
CAR PARKING SYSTEM USING VISUAL STUDIO C++ (OPERATING SYSTEM MINI PROJECT ) CAR PARKING SYSTEM USING VISUAL STUDIO C++ (OPERATING SYSTEM MINI PROJECT )
CAR PARKING SYSTEM USING VISUAL STUDIO C++ (OPERATING SYSTEM MINI PROJECT )
 
Ludo game using c++ with documentation
Ludo game using c++ with documentation Ludo game using c++ with documentation
Ludo game using c++ with documentation
 
Ludo mini project in c++
Ludo mini project in c++Ludo mini project in c++
Ludo mini project in c++
 
Telephone directory using c language
Telephone directory using c languageTelephone directory using c language
Telephone directory using c language
 
Mini cnc plotter or printer
Mini cnc plotter or printer Mini cnc plotter or printer
Mini cnc plotter or printer
 
Mini Cnc Printer
Mini Cnc PrinterMini Cnc Printer
Mini Cnc Printer
 
E wallet
E wallet E wallet
E wallet
 
Pointer in C++
Pointer in C++Pointer in C++
Pointer in C++
 

Recently uploaded

Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 

Recently uploaded (20)

Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 

Image encryption using jumbling salting

  • 1. Image Encryption Using Jumbling Salting Submitted in partial fulfillment of the requirements Of the degree of B. E. Computer Engineering By SUMEET S. VERMA PID:172115 SWAPNIL S. SONTAKKE PID:172117 YASH S. SOLANKI PID:172128 SURAJ R. MAURYA PID: 182262 Supervisor(s): MS. PRADNYA RANE Assistant Professor Department of Computer Engineering St. Francis Institute of Technology (Engineering College) University of Mumbai 2020-2021
  • 2.
  • 3. Image Encryption Using Jumbling Salting Submitted in partial fulfillment of the requirements Of the degree of B. E. Computer Engineering By SUMEET S. VERMA PID:172115 SWAPNIL S. SONTAKKE PID:172117 YASH S. SOLANKI PID:172128 SURAJ R. MAURYA PID: 182262 Supervisor(s): MS. PRADNYA RANE Assistant Professor Department of Computer Engineering St. Francis Institute of Technology (Engineering College) University of Mumbai 2020-2021
  • 4. CERTIFICATE This is to certify that the project entitled “Image Encryption Using Jumbling Salting” is a bonafide work of “Sumeet Verma (172115), Yash Solanki (172128), Swapnil Sontakke (172117), and Suraj Maurya (182262)” submitted to the University of Mumbai in partial fulfillment of the requirement for the award of the degree of B.E. in Computer Engineering Ms. Pradnya Rane Guide Dr. Kavita Sonawane Dr. Sincy George Head of Department Principal i
  • 5. Project Report Approval for B.E. This project report entitled Image Encryption Using Jumbling Salting by Sumeet Verma, Yash Solanki, Swapnil Sontakke, Suraj Maurya is approved for the degree of B.E. in Computer Engineering. Examiners 1. Ms. Pradnya Rane 2 Mr. K. S. Sakure Date: 29-05-2021 Place: Mumbai ii
  • 6. Declaration I declare that this written submission represents my ideas in my own words and where others' ideas or words have been included, I have adequately cited and referenced the original sources. I also declare that I have adhered to all principles of academic honesty and integrity and have not misrepresented or fabricated or falsified any idea/data/fact/source in my submission. I understand that any violation of the above will be cause for disciplinary action by the Institute and can also evoke penal action from the sources which have thus not been properly cited or from whom proper permission has not been taken when needed. ----------------------------------------- (Sumeet Verma PID172115) ----------------------------------------- (Yash Solanki PID 172128) --------------------------------------- (Swapnil Sontakke PID172117) --------------------------------------- (Suraj Maurya PID 182262) Date: 29/05/2021 iii
  • 7. Abstract Today almost all digital services like internet communication, medical and military imaging systems, multimedia system requires reliable security in storage and transmission of digital images. Due to faster growth in multimedia technology, internet and cell phones, there is a need for security in digital images. Therefore, there is a need for image encryption techniques in order to hide images from such attacks. In this system we use JS (Jumbling Salting) algorithm in order to hide the original image. Such Encryption technique helps to avoid intrusion attacks. In cryptanalysis, a dictionary attack or brute force attack are the most common ways of guessing the key values. Then, we perform digital image processing, obtain the date that can use the JS encryption algorithm, combine both approaches. It provides a new access to satisfy high level security of interactive information requirements in the fields of aerospace, military, confidential, financial and economic, national security and so on. In order to augment the security aspect regarding images, we are devising JS algorithm which will be responsible for preventing intrusion or brute force attacks on the images. As JS algorithm deals with randomization, the image encryption technique forms a highly secured form of encrypted image. iv
  • 8. TABLE OF CONTENTS Chapter No. Topic Page No. 1. Introduction 1 1.1 Description 2 1.2 Problem Formulation 2 1.3 Motivation 3 1.4 Proposed Solution 3 1.5 Scope of the project 4 2. Review of Literature 5 3. System Analysis 7 3.1 Functional Requirements 9 3.2 Non-Functional Requirements 7 3.3 Specific Requirements 8 3.4 Use-Case Diagrams and Description 9 4. Analysis Modeling 10 4.1 Data Modeling 10 4.2 Activity Diagram 11 4.3 Functional Modeling 12 4.4 Time Line Chart 13 5. Design 15 5.1 Architecture Design 15 5.2 User interface Design 18 6. Implementation 24 v
  • 9. 6.1 Algorithms / Methods Used 24 6.2 Working of the project 26 7. Testing 28 7.1 Test cases 28 7.2 Type of Testing used 29 8. Results And Discussions 30 9. Conclusions & Future Scope 31 Appendix Literature Cited Acknowledgement vi
  • 10. LIST OF TABLES Table No. Table Name Page No. 1 Hardware Requirements 7 2 Software Requirements 8 3 Time Line Chart 13 4 Test Case 28 vii
  • 11. LIST OF FIGURES Figure No. Figure Name. Page No. 1 Aadhaar UIDAI 1 2 Use Case Diagram for User 9 3 ER Diagram 10 4 Activity Diagram for Admin 11 5 DFD Diagram for User 12 6 System Block Diagram 15 7 Process array in JS algorithm 16 8 Character set of JS algorithm 17 9 Salt array format in JS algorithm 17 10 Sign up page 18 11 Login page 18 12 Main 19 13 Different algorithm 19 14 Encryption using JS 20 15 Encryption using DES 20 16 Encryption using AES 21 17 Encryption using MJS 21 18 Decryption using JS 22 19 Decryption using DES 22 20 Decryption using AES 23 21 Decryption using MJS 23 22 Final output 30 viii
  • 12. 1. Introduction Information technology today, driven by technological development, the transfer of image information security has become the most pressing concern. In the transfer process, the contents of the information may be intercepted by others to attack; hence people's privacy would be threatened. These are related to the computer network has a close relationship. JS algorithm however takes a lot of space and time for both the encryption and decryption which is due to the various randomization techniques but on the other hand this makes the algorithm fully secured. Jumbling Salting algorithm’s Encryption as well as the Decryption time is large. The additional overhead of jumbling and salting process increases due to the value of processing time. The encryption and decryption time rises due to the process of randomization. However, The AES can be chosen as it is advanced encryption standard for any data encryption technique. JS algorithm also encrypts large data string or a large file. The encryption time of JS above algorithm is higher than existing algorithms due to the extra overhead of characters which is added (in Jumbling and salting procedure). The size of cipher generated in case of JS encryption is higher than existing algorithms. Image Encryption Using Jumbling Salting 1
  • 13. 1.2 Description 1.2 Description JS algorithm has two techniques namely jumbling, salting. In the jumbling part, the image undergoes “addition” and “selection” sub- processes. Addition process is generating a value required for determining the number of characters to be added to the original block. Selection deals with selecting characters to be added to the binary matrix from predefined character set. In general, there are N numbers of character set in the provided array. Reverse process is reversing the output of selection process on some predefinedcondition. The condition can be implemented by any mathematical techniques like even odd, prime number or any divisibility condition etc. In salting part, random salt is added to the jumbled block. Selection of salt is based on timestamp value of the uploading time. 1.2 Problem Formulation Being an important aspect of security, image is an authentication[11][6] technique which provides the claimant access to system resources. The probability of attacking the image is considerably high. Although image encryption provides solution to prevent many attack shave proven this image encryption technique to be futile. To overcome the problem of securing encrypted image, we are developing JS technique which will provide additional security to the stored images. 1.3 Motivation Images excessively contribute to communication in this era of multimedia. When a user transfers images over an unsecured communication network, then the absolute protection is a challenging issue to conserve the confidentiality of images. Encryption is a method of retaining the secrecy of images. The Internet and information technology are sprouting swiftly. As a result, people are widely using interactive media in communication. For instance; image, audio, and video. Images occupy the copious fraction of multimedia. Images play a significant role in communication, for example; military, national-security agencies and diplomatic affairs. Since, these images may carry highly confidential information, so these images entail extreme protection when users collect somewhere over an unreliable repository. Furthermore, when people wish to transfer images over an insecure network, then it becomes crucial to provide an absolute protection. In brief, an image requires protection against various security attacks the primary intention of keeping images protected is to maintain. 2
  • 14. Chapter 1 Introduction Confidentiality, integrity and authenticity. Different techniques are available for making images secure and one technique is encryption. Generally, Encryption is a procedure that transforms an image into a cryptic image by using a key. Furthermore, a user can retrieve the initial image by applying a decryption method on the cipher image, which is usually a reverse execution of the encryption process. 1.4 Proposed Solution To ensure secured transmission of image, by encrypting it with JS algorithm. The model for encryption and decryption of an image is designed with the objectives to have confidentiality and security in transmission of the image-based data, with the help of suitable user- defined download key. 1.5 Scope of the Project 1.5.1 Application There are a number of sectors with their own specific needs for image encryption and specialist services are provided to these users. Biometrics Fig.1 Aadhaar UIDAI Image encryption, indeed, is necessary for future multimedia [2] Internet applications. Password codes to identify individual users will likely be replaced with biometric images of Fingerprints and retinal scans such as AADHAAR based applications. However, such 3
  • 15. 1.5.2 Multimedia application information will likely be sent over a network. When such images are sent over a network, an eavesdropper may duplicate or reroute the information. By encrypting these images, the Content still has some degree of added security. Furthermore, by encrypting non-critical images as well, an eavesdropper is less likely to be able to distinguish between important and non-important information. 1.5.2 Multimedia applications: Image encryption can be used to protect intellectual properties. One of concerns of the entertainment industry is that movies and videos in digital format are vulnerable to unauthorized access, theft, and replication. Entertainment industry has lost billion dollars due to the illegal copies[6] . Recently, new technologies have been developed which allows multimedia can be delivered to millions of household very quickly. In the future, entertainment industry will utilize Internet and satellites for multimedia distributions. The threat of unauthorized access during transmission over networks and the threat of illegal copy increase significantly. Image encryption, therefore, can be used to minimize these problems 1.5.3 Scope There has been an explosive growth of using computers, networks, communications and multimedia applications. Today, Internet users demand not only text but also audio, images, and video. Recently, the convergence of computers, networks, communications, and multimedia applications, have been took place[2][7]. The information revolution is entering a new area where consumer products will combine the functions of telephone, personal computer, and television. In order to satisfy users demands, future consumer electronics devices, such as videophone, should be able to transmit images and video over wireless communications networks. Besides bandwidth and error resiliency issues present in applications, the presence of a network has prompted new problems with security and privacy. Having a secure and reliable means for communicating with images is a necessity for many networks. 4
  • 16. 2. Review of Literature 1. Research of Image Encryption Algorithm Base on Chaos Theory[14] . Using Chaos Theory, chaotic sequence is generated by Logistics Chaos Mapping. Image encryption is realized by gray value of substitutes and pixel position scrambling. The chaotic system that constitutes the three distinct one dimensional chaotic maps. The suggested technique applies the Logistic map as a controller to choose the Tent map or a Sine map to generate random sequences[11] . Thereafter, the imparted algorithm utilizes the substitution- permutation network (SPN) structure to obtain the confusion and diffusion property. This scheme uses 240 bit key for large key space. Mainly, this key contains all parameter settings and the initial values of the new chaotic system, and excessive sensitivity in key changes for encryption and decryption. Advantages: • Chaotic system provides an excellent security against the brute force attack. • Extreme key sensitivity and chaotic behavior. Disadvantages: • Sensitive dependence on initial conditions. • Choosing the input parameters is highly complex. 2. Image Encryption and Decryption using Blowfish algorithm[15] The Blowfish algorithm is the 64-bit symmetric block cipher that repeats simple function 16 times and applies a variable key length range from 32 to 448 bits. The offered system follows the two processes; the first is a key expansion, and the second is a data encryption. Furthermore, the Blowfish algorithm includes two exclusive or operations that are performed after 16 rounds and a swap operation. The aftermaths corroborate that blowfish technique is fast and secure. Advantages: • Blowfish algorithm is fast and secure. • Blowfish is not subject to any patents and is therefore freely available for anyone to use. This has contributed to its popularity in cryptographic software. Disadvantages: • Blowfish can’t provide authentication and non-repudiation as two people have same key. • It also has weakness in decryption process over other algorithms in terms of time consumption and serially in throughput. 5
  • 17. 3. Digital Image Encryption based on Advanced Encryption Standard Usage Mining Using Artificial[16]: Using AES algorithm implemented on MATLAB, performing digital image processing, obtaining the date that can use AES Encryption algorithm & combining both approaches. Advantages: • As the AES encryption algorithm is fast and has the advantages of strong ability to resist attacks. So this kind of algorithm is widely used in data encryption Disadvantages: • AES algorithm takes more time to encrypt image as compared with the Jumbling Salting Algorithm. 4. SD-EI: A cryptographic technique to encrypt images[17] This approach depends on the three methods of cryptography: (1) Bits rotation and reversal, (2) Extended Hill Cipher, (3) Modified MSA Randomization. Furthermore, the proposed system utilizes four stages to encrypt an image. At first stage, the algorithm generates a unique number from the symmetric key. In the second stage, bit’s rotation and reversal are done, based on the length of a symmetric key[8][9]. Afterward, in the third stage, the system applies Extended Hill Cipher technique for the encryption. Thereafter, in the fourth stage, the scheme uses the modified MSA randomization approach for substitution. The empirical results corroborate that SD-AEI encoding procedure is dominant on the SD-EI due to additional randomization. Advantages: • SD-EI technique can be used to encrypt and secure images, which are to be kept secret or where steganography have already been applied to hide data in it. • SD-EI technique is less scrambled. Disadvantages: • It is very difficult to decode the image without knowing the algorithm of SD-EI and the authorization password. • This image encryption method consists of two stages, among which first stage is Bits Rotation Reversal stage and second stage is Extended Hill Cipher stage. For both stages, only one alphanumeric password is needed. 6
  • 18. 3.1 Functional Requirements 3. System Analysis The system will have the ability to encrypt and decrypt the image securely using JS technique and will be able to prevent from attacks with the help of this newly improvised image encryption technique and algorithms like AES for encrypted image protection. While transferring the image present in jumbled form reaches the user and using decryption key, he will get the access to that image avoiding any of the attacker/hacker. The functionalities of the application would be easier to understand for the user. 3.2 Non-Functional Requirements It is efficient to transfer the image in a secured platform. The system is mainly designed for the situations where the security matters. The user will get rid of attacks on the image and issues related to transfer of images. The rest of the security concern will be done by the system or application. 3.3 Specific Requirements This section discusses the hardware and software requirements for the design and development of Software for Image Encryption Using Jumbling Salting. The hardware used for the development of the project is: Table 1. Hardware Requirements Components Specifications Screen Resolution 640 X 480 display 5400 RPM hard disk System/Processor Intel® Core ™ Duo or more than CPU @ 2.20 GHz. Memory 2 GB of RAM Hard Disk 500 GB of HDD or higher recommended Supported Arch X86 and x64 7
  • 19. 3.3 Specific Requirement The software used for the development of the project is: Table 2. Software Requirements Components Specifications Operating System Microsoft Windows XP Professional Microsoft Windows Server 2003 Windows Vista Windows 2010 (64-bit) Database SQL Server 2008 R2 (64-bit) Supported Browsers Microsoft Internet Explorer 8.0 Google chrome Mozilla Firefox 8
  • 20. Chapter 3 System Analysis 3.4 Use-Case Diagrams Fig. 2. Use Case Diagram for User Description: User can login the system and upload the file that has to be encrypted. Receiverenters the secret key also can download the file later. Database stores the login details along with the user uploaded file. 9
  • 21. 4.1 ER Diagram 4. Analysis Modeling The ER diagram represents domains or objects as entities and its further functions as attributes. The ER diagram represents the relationship between the different objects or entities through various conditions or actions. It has many relationships between entities i.e. one-to- one, one-to-many and many-to-many. Description: Fig. 3. ER Diagram User panel has the user profile which is associated with user and the file. User profile has various attributes such as name, email-id, mobile no and address. 10
  • 22. Chapter 4 Analysis Modeling 4.2 Activity Diagram: Fig. 4. Activity Diagram for Admin (Sender) Description: Admin has to login first to access all the features such as Add User, View User, Edit User, and Select User to send the file. 11
  • 23. 4.3 DFD 4.3 DFD: Fig. 5. DFD Diagram for User Description: The User has to login the system to view shared files and decrypt them using the aforementioned secret key shared by the admin. The user can also download the decrypted images from the system. 12
  • 24. Chapter 4 Analysis Modeling 4.4 Time Line Chart Months → AUGUST SEPTEMBER OCTOBER NOVEMBER Particulars ↓ W 1 W 2 W 3 W 4 W 1 W 2 W 3 W 4 W 1 W 2 W 3 W 4 W 1 W 2 W 3 W 4 1)Gathering initial requirements Decide the project topic Identify needs and constraints Determine goals and scope Establish specification Milestone : product specification complete 2) Feasibility Technical feasibility Economic feasibility Application (code) feasibility Operational feasibility Milestone : feasibility study complete 3)Requirement Determination Determine inputs Determine outputs Process control Synopsis 13
  • 25. Milestone : synopsis is ready Months → DECEMBER JANUARY FEBRUARY MARCH APRIL MAY Particulars ↓ W 1 W 2 W 3 W 4 W 1 W 2 W 3 W 4 W 1 W 2 W 3 W 4 W 1 W 2 4)Analysis and Design Phase 1 Phase 2 Phase 3 Milestone : Design specification complete 5) Development Developing Interface Developing Modules Milestone : Development phases complete 6) Testing Testing Connectivity System testing and load testing Milestone : Testing phase complete 7)Implementation Building Prototype Building Interface 8) Evaluation Documentation and recommendation Milestone : Implementation and Evaluation phases complete Description: We have now completed with gathering initial requirements, Feasibility analysis of the project and Requirements determination. 14
  • 26. 5. Design 5.1 Architectural Design Fig. 6 System Block Diagram Image to Image Matrix Conversion A color image with resolution N*M (where n = no of pixels in height and m = no of pixels in width) is converted into an 3 dimensional image matrix of order (N, M, 3) where each column has grey scaled values (i.e. 0-255) of RGB colors respectively. Jumbling block: Jumbling process includes sub- processes viz. addition and selection. Process array is given to Jumbling block. Jumbling block pre-pends some characters from the character set and jumbling them with the help modulus function. Modulus is the mathematical function which returns reminder of a division operation. Jumbling block itself is a combination of sub-blocks: 15
  • 27. 5.1 Architecture Design Addition Sub-block: This block generates principle random value “l” and updating the size of a Process Array. The original size of process array P [ ] is ‘x’ which is now updated to (x + l). The Fig.7. illustrates the position of Process array P [ ] Process Array [x + l] Fig. 7. Process array in JS algorithm 16
  • 28. Chapter 5 Design Selection sub-block: This block is about selecting pixels values from predefined set A. The size of pixel array is large and the predefined set for a particular image. Selection is based on the random values which are generated “l” times. Practically the size of Process array is large enough to select the different pixel values. The character set of general Process array is shown in Fig. 8. below: Fig. 8. Character set of JS algorithm Salting block The objective of salting block is to add random pixel values along with jumbled version of the pixel values. The criteria of selection of salt are user’s sign-up timestamp value along with the users download key. The salt is added in order to make the encryption more complicated thereby making it difficult for the attacker to obtain it. The timestamp value is chosen for adding salt in the jumbled version of the image, as it is unique value. For every user, the timestamp value is different so is the download key. We have chosen servers value as timestamp value. The general form of salt array is shown in Fig. 9 below: Y Y Y Y D D M M H H m m s s Fig. 9. Salt array format in JS algorithm Where: Y = Year, M= Month D = Date h = Hours in 24 hours format m = minutes s= seconds 17
  • 29. 5.2 User Interface Design 5.2 User Interface Design Fig. 10. Sign up page Fig. 11. Login page 18
  • 30. Chapter 5 Design Fig. 12. Main Fig. 13. Different algorithm 19
  • 31. 5.2 User Interface Design Fig. 14. Encryption using js Fig. 15. Encryption using DES 20
  • 32. Chapter 5 Design Fig.16. Encryption using AES Fig.17. Encryption using MJS 21
  • 33. 5.2 User Interface Design Fig.18. Decryption using JS Fig.19 Decryption using DES 22
  • 34. Chapter 5 Design Fig.20 Decryption using AES Fig.21 Decryption using MJS 23
  • 35. 6. Implementation 6.1 Algorithms Used Input: Image in 1-dimension Image Matrix form. ==> (500*500)*3 == 7.5L elements where 500*500 is the resolution of the image and 3 grey scaled images each of RGB format. Output: Image in Jumbled- salted form. STEP 1: INITIALIZE 'x' to 0; STEP 2: STORE the length of Image in 1-dimension matrix in variable “x”; STEP 3: CREATE an Process array P [ ] such that P [length =x]; STEP 4: STORE each pixel value in an array block; // P {0, 1, 2... x-1) = { pixels in process array with index } /* implementation of Jumbling Process */ Function jumbling (P [ ]) { // implementation of jumbling technique: Addition Process STEP 5: Label 1: CALL Random () function; // Random function returns any random value from predefined set of integers within the limit provided by programmer. SET ‘l’ as principle random value; (where l>x and l<limit, where limit is set by programmer) If (l >= x) STORE random number value in ‘l’ generated from random () function; Else Goto Label 1; Break; End If STEP 6: UPDATE an array P [ ] of size (x + l) STEP 7: DEFINE the set of pixel values A. //Size (A) = M; // M = any large value; 24
  • 36. Chapter 6 Implementation //implementation of jumbling technique: Selection Process /* this process selects pixel Values from given pixel value set. All these are added with process array. These process is also made randomized */ STEP 8: CALL random ( ) function 'l' times; // At each iteration, random value is generated by random function which acts as an index of the pixel value in pixel value set. STEP 9: FILL the process array with Pixel values STEP 10: STORE the original length of an array in variable say “FIX” For i = 0 to (x+l-1) While (l! =0) SET j to 0; j= (FIX modulus l); Create 'temp' variable; Swap (P[i], P[j]); //output of above modulus function is an index integer within the range 0 to (x + l - 1), Hence we must swap output value with the same index integer with index 0th position value. l= l-1; // decrement l End While End For } // end of jumbling function /* implementation of Salting Technique */ Function salting( P[ ] ) { STEP 12: STORE current Timestamp value of the server; STEP 13: OBTAIN the length of timestamp say ‘t’. (YYYYDDMMHHmmss)i.e.14 Append The download key provided by the user.len(16 char) STEP 14: CREATE Salt [size=t] array which stores random salt values; Salt [ ] = {values obtained from Timestamp value}; STEP 15: UPDATE an array P of size (x + l + t + 16) FILL the process array with Jumbled pixel values of size (x + l) and salt values of size t+16. 25
  • 37. 6.2 Working of the project Return (P); } // end of salting function 6.2 Working of the project (code for mentioned algorithms) public partial class Add_New_User : System.Web.UI.Page { protected void Page_Load(object sender, EventArgs e) { if (Session["a_id"] == "") { Response.Redirect("Login.aspx?msg=logout"); } btnCancel.Visible = false; if (Request.QueryString["action"] == "edit" &&this.IsPostBack == false) { btnCancel.Visible = true; stringuser_id = Request.QueryString["user_id"]; string query1 = "select * from User_Master where user_id='" + user_id + "'"; DataTabledt = Database.Getdata(query1); txtfull_name.Text = Convert.ToString(dt.Rows[0]["full_name"]); txtcontact_no.Text = Convert.ToString(dt.Rows[0]["contact_no"]); txtaddress.Text = Convert.ToString(dt.Rows[0]["address"]); } } protected void btnSave_Click(object sender, EventArgs e) { if (Request.QueryString["action"] == "edit") { stringuser_id = Request.QueryString["user_id"]; string query2 = "update User_Master set full_name='" + txtfull_name.Text + "',contact_no='" + txtcontact_no.Text + "',address='" + txtaddress.Text + "' where user_id='" + user_id + "'"; Database.InsertData_direct(query2); Response.Redirect("Manage_Users.aspx?msg=update") } else { stringselect_id = "select * from User_Master '"+txt.Text+"'"; DataTabledt = Database.Getdata(select_id); if (dt.Rows.Count> 0) { Alert.Show("User Already Exists"); } else { 26
  • 38. Chapter 6 Implementation var chars = "QWERTYUIOPLKJHGFDSAZXCVBNMqwertyuioplkjhgfdsazxcvbnm0987654321"; varstringargs = new char[8]; var random = new Random(); for (inti = 0; i<stringargs.Length; i++) { stringargs[i] = chars[random.Next(chars.Length)]; } string password = new String(stringargs); string query = "Insert Into User_Master values('" + txtfull_name.Text + "','" + txtcontact_no.Text + "','" + txt.Text + "','" + txtaddress.Text + "','" + password + "') "; Database.InsertData_direct(query); 27
  • 39. 7. Testing The aim of testing is to prove that the developed system addresses the pre-defined business requirements and will perform reliably and efficiently when running live. 7.1 Test cases Table 4. Test Cases Sr. No. Case Pre-Condition Action Taken Expected Output Actual Output Pass / Fail 1 Admin/User Login Admin/User has to start the system to the login page Input is checked with the present credentials for the user. If data entered is correct login will be successful otherwise error message is displayed. If data entered is correct login will be successful otherwise error message is displayed. Pass 2 Upload Image Select the image from the device The image from the computer system gets uploaded. Image is uploaded. Image is uploaded. Pass 3 Encrypt Image Select the image to encrypt Image is encrypted within the master file Encrypted image is formed. Encrypted image is formed. Pass 4 Decrypt Image User has to get access to the image by providing the secret key. Secret key is checked within the database for that particular user The image is decrypted successfully and is downloaded in the user’s system The image is decrypted successfully and is downloaded in the user’s system Pass 5 Exiting the application User has to click on the Log Out button from the User panel The web application is closed. The user is logged out successfully. The user is logged out successfully. Pass 6 Other file formats Admin uploads different format file File is checked. File is successfully uploaded File cannot be uploaded. Pass 28
  • 40. Chapter 7 Testing 7.2 Type of testing use: Regression Testing: Regression testing focuses on finding defects after a major code change has occurred. Specifically, it seeks to uncover software regression, or old bugs that have come back. Such regressions occur whenever software functionality that was previously working correctly stops working as intended. Stability Testing: Stability testing checks to see if the software can continuously function well in or above an acceptable period. This activity of non-functional software. Usability Testing: Usability testing is needed to check if the user interface is easy to use and understand. It approaches towards the use of the application. Unit Testing The minimal software components (module) are tested. Each unit(basic component) of the software is tested to verify that the detailed design for the unit has been correctly implemented. Testing is done on the following levels: • Testing is done at class level, and the minimal unit tests include the constructors and destructors. • In Black Box Testing specification based testing is done to find that each module gives specific output for particular input integration testing. • The interfaces and interaction between integrated components are tested. • Progressively larger group of tested software components corresponding to elements of the architectural design are integrated and tested until the software works as a system. 29
  • 41. 8. Results and Discussions • In this system, we mainly concentrated on encrypting and decrypting the original image. This system is designed as a web application which encrypts and decrypts the original image. • Normally, after encrypting the image, the original image may lose its resolution. In the implemented approach, the image remains unchanged in its resolution as well in size. • The speed of encrypting the image is high such that the image’s visual quality is not changed and the image is encrypted securely. • For the encryption and decryption phase, JS algorithm is used and implemented in Java programming language. • The concatenation approach is used in this system in which the image is converted into bytes format and this data is concatenated at the end of the master file. Since this approach is used, there is no change in visual quality of the jumbled image. Final Output: Fig.22 Final output In this project (fig.22) we have implemented the modified JS algorithm and later compared it with other similar functioning algorithms such as AES, DES and Jumbling Salting Algorithm. Also we have done this by using a throughput value that is considered as measure for comparing the effectiveness of these algorithms. Basically the throughput value indicates the number of Megabytes of image encrypted with respect to time taken to encrypt the image. 30
  • 42. 9. Conclusions This system puts forward the method that uses the JS algorithm with the key control to encrypt the image. This method incorporates a variety of characteristics, and with simple design. JS algorithm reduces the probability of decrypting the image. Due to the various randomization techniques, it builds an encrypted image which is almost difficult to decrypt. To decipher this encrypted image is a difficult task. JS algorithm however takes a lot of space and time for both the encryption and decryption which is due to the various randomization techniques but on the other hand this makes the algorithm fully secured. Jumbling Salting algorithm’s Encryption as well as the Decryption time is large. The additional overhead of jumbling and salting process increases due to the value of processing time. The encryption and decryption time rises due to the process of randomization. The existing system uses JS algorithm for text encryption technique. This developed system will now be able to transfer images in a secured way so that the image cannot be intercepted by the intruder. It is done by encrypting the image and obtaining a random length secret key and hence we get a jumbled image. The decryption of the image from the jumbled form will be done using JS technique because the encrypted image will not be altered visually even after the encryption process is done. The final output image can be obtained by entering the secret key so that the intruder cannot detect the presence of the secret image and thus confidentiality and privacy is assured and achieved. In this way, we can securely transfer the jumbled image in a secret way, only the sender and receiver will know that the jumbled image contains the original image which needs to be transferred to the receiver. 31
  • 43. Future Scope 1. Image Encryption for Defense If the image is encrypted in a more efficient manner using jumbling salting algorithm, it can be used for defence purpose. Various images captured by satellite for national security which is used by our defence forces can use JS algorithm to provide better efficiency and security in the domain of image security. 2. Encryption in printed media If the data is embedded in an image, the image printed, then scanned and stored in a file can the embedded image be recovered? This would require a special form of an encryption- decryption mechanism to which could allow for in accuracies in the printing and scanning equipment. 32
  • 44. Appendix using System; usingSystem.Collections.Generic; usingSystem.Linq; usingSystem.Web; usingSystem.Web.UI; usingSystem.Web.UI.WebControls; usingSystem.Data; public partial class Add_New_User : System.Web.UI.Page { protected void Page_Load(object sender, EventArgs e) { if (Session["a_id"] == "") { Response.Redirect("Login.aspx?msg=logout"); } btnCancel.Visible = false; if (Request.QueryString["action"] == "edit" &&this.IsPostBack == false) { btnCancel.Visible = true; stringuser_id = Request.QueryString["user_id"]; string query1 = "select * from User_Master where user_id='" + user_id + "'"; DataTabledt = Database.Getdata(query1); txtfull_name.Text = Convert.ToString(dt.Rows[0]["full_name"]); txtcontact_no.Text = Convert.ToString(dt.Rows[0]["contact_no"]); txtemail_id.Text = Convert.ToString(dt.Rows[0]["email_id"]); txtaddress.Text = Convert.ToString(dt.Rows[0]["address"]); } } protected void btnSave_Click(object sender, EventArgs e) { if (Request.QueryString["action"] == "edit") { stringuser_id = Request.QueryString["user_id"]; string query2 = "update User_Master set full_name='" + txtfull_name.Text + "',contact_no='" + txtcontact_no.Text + "',email_id='" + txtemail_id.Text + "',address='" + txtaddress.Text + "' where user_id='" + user_id + "'"; Database.InsertData_direct(query2); Response.Redirect("Manage_Users.aspx?msg=update") } else { string select_id = "select * from User_Master where email_id='"+txtemail_id.Text+"'"; DataTabledt = Database.Getdata(select_id); if (dt.Rows.Count> 0) { 33
  • 45. Alert.Show("User Already Exists"); } else { var chars = "QWERTYUIOPLKJHGFDSAZXCVBNMqwertyuioplkjhgfdsazxcvbnm0987654321"; varstringargs = new char[8]; var random = new Random(); for (inti = 0; i<stringargs.Length; i++) { stringargs[i] = chars[random.Next(chars.Length)]; } string password = new String(stringargs); string query = "Insert Into User_Master values('" + txtfull_name.Text + "','" + txtcontact_no.Text + "','" + txtemail_id.Text + "','" + txtaddress.Text + "','" + password + "') "; Database.InsertData_direct(query); 34
  • 46. References [1] Applied Cryptography-Protocols Algorithms and Source Code in C John Wiley Publications,ISBN978-04711-17094 [2] M. Stamp. Information Security: Principles an practice, John Wiley publications, ISBN- 13978-0-471-73848-0. [3] Ch. SanthoshReddy,Ch. Sowjanya ,Praveena,ProfShaliniL,“Poly-alphabetic Symmetric Key Algorithm Using Randomized Prime Numbers” International Journal of Scientific and Research Publications, Volume 2 ,Issue 9,September 2012,ISSN22503153 [4] William Stallings. Cryptography and Network Security: Principles and Practices, Fourth Edition. Beijing: Electronic Industry Press.2007:229~250 [5] C. Pfleeger,S. Pfleeger, Security in Computing, Third Edition, Prentice Hall PTR, ISBN : 0-13-035548-8 [6] Kahate Atul,2003,"Cryptography and Network Security", Third Edition, TataMcGrawHill India. [7] Features of C# [Online], http:// www.tutorialspoint.com/csharp.[Accessed: June 25, 2015]. [8] Features an overview of C# [Online], http://www.slideshare.net.[Accessed: June 25 2015]. [9] C# and .net technology [Online] https://www.msdn.microsoft.com.[Accessed: June 25 2015]. [10] Daemen, J., and Rijmen, V. "Rijndael: The Advanced Encryption Standard r. Dobb's Journal, March 2001,pp.137-139. [11] "A Performance Comparison of Data Encryption Algorithms," IEEE Information and Communication Technologies, 2005. ICICT 2005. First International Conference, 2006-02- 27, PP.84-89 [12] TingyuanNie, ChuanwangSonga, XulongZhi (2010), “Performance Evaluation of DES and Blowfish Algorithms”, Proceedings of 2010IEEE. [13] The Pledge of Independence, Declaration of PurnaSwaraj, Lahore Congress, January 26, 1930 [Online], http://www.knowindia.gov.in, [Accessed: June 25,2015]. [14] Liu Bo, Liu Na, Li Jianxia and Liang Wei, "Research of image encryption algorithm base on chaos theory," Proceedings of 2011 6th International Forum on Strategic Technology, Harbin, Heilongjiang, 2018, pp. 1096-1098, doi: 10.1809/IFOST.2018.6021211. 35
  • 47. [15] Anjaneyulu, G.S.G.N. &Kurmi, P.K. & Jain, R..(2015). Image encryption and decryption using blowfish algorithm with randomnumber generator. 6. 7164-7170. [16] Gamido, Heidilyn&Sison, Ariel & Medina, Ruji. (2018). Implementation of Modified AES as Image Encryption Scheme. 301-308. 10.11591/ijeei.v6i3.490. [17] Dey, Somdip. (2012). SD-EI: A cryptographic technique to encrypt images. Proceedings 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012. 28-32. 10.1109/CyberSec.2012.6246123. [18] MayureshVartak, Rishabh Reddy, PrathameshChuri, “Image Encryption using Jumbling- Salting Algorithm” International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8 Issue-12S, October 2019. 36
  • 48. Acknowledgement It gives us great pleasure in presenting this project report titled: “IMAGE ENCRYPTION USING JUMBLING SALTING. On this momentous occasion, we wish to express our immense gratitude to the range of people who provided invaluable support in the completion of this project. Their guidance and encouragement has helped in making this project a great success. We express our gratitude to our project guide Prof. Pradnya Rane who provided us with all the guidance and encouragement and making the lab available to us at any time. We also would like to deeply express our sincere gratitude to Project coordinators. We are eager and glad to express our gratitude to the Head of the Computer Engineering Dept. Dr.Kavita Sonawane, for her approval of this project. We are also thankful to her for providing us the needed assistance, detailed suggestions and also encouragement to do the project. We would like to deeply express our sincere gratitude to our respected principal Dr. Sincy George and the management of St. Francis Institute of Technology, Borivali for providing such an ideal atmosphere to build up this project with well- equipped library with all the utmost necessary reference materials and up to date IT Laboratories. We are extremely thankful to all staff and the management of the college for providing us all the facilities and resources required. Submitted by: “Sumeet Verma” “Yash Solanki” “Swapnil Sontak” “Suraj Maurya” 37