0% found this document useful (0 votes)
16 views9 pages

Research Paper of Cryptography

The paper presents a solution for encrypting and decrypting text extracted from images using optical character recognition and QR codes. It uses a cipher matrix approach for encryption and decryption, implemented through a Python GUI. Evaluation shows it effectively encrypts text from varied images and QR codes while maintaining efficiency and usability.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views9 pages

Research Paper of Cryptography

The paper presents a solution for encrypting and decrypting text extracted from images using optical character recognition and QR codes. It uses a cipher matrix approach for encryption and decryption, implemented through a Python GUI. Evaluation shows it effectively encrypts text from varied images and QR codes while maintaining efficiency and usability.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

CRYPTOGRAPHY (IMAGE TO TEXT & QR READER)

Juilee Talekar , Ashish Khenat

Guide - Prof. Vidhya Gaikwad

Juilee Talekar , Vishwakarma institute of information Technology, Pune

Ashish Khenat , Vishwakarma institute of information Technology, Pune

Prof. Vidhya Gaikwad , Vishwakarma institute of information Technology, Pune

ABSTRACT

This paper presents a comprehensive solution for text encryption and


decryption by integrating image processing techniques with cipher matrix
methodology, implemented through Python. The system begins by converting
quoted images to text using optical character recognition (OCR) and
extracting pertinent information through QR code scanning. The extracted
text undergoes encryption via a cipher matrix approach, bolstering security
through matrix manipulation and permutation. The decryption process
employs inverse operations to seamlessly restore the original text.

Our Python-based implementation leverages libraries such as OpenCV for


image processing, Pytesseract for OCR, and cryptography modules for
encryption and decryption functionalities. To enhance user experience, we
have developed a user-friendly GUI using Tkinter, allowing users to easily
choose an image or QR code for processing. Through extensive
experimentation across varied quoted images and QR codes, we demonstrate
the efficacy and adaptability of our approach. Evaluation metrics encompass
encryption strength and computational efficiency, revealing the potential of
cipher matrix-based cryptography in image-based text encryption. This
solution offers a versatile and robust framework for secure communication in
diverse settings, ranging from personal correspondence to confidential data
exchange in enterprise environments.
1. Introduction :

In an era characterized by ubiquitous


digital communication, ensuring the
security and confidentiality of transmitted
information is paramount. Text
encryption serves as a cornerstone in
safeguarding sensitive data against
unauthorized access or interception. In addition to the cryptographic
Traditional encryption methods often rely functionality, we have prioritized user
solely on alphanumeric characters, experience by developing an intuitive
potentially limiting their applicability in GUI using Tkinter. This graphical
scenarios where information is embedded interface empowers users to seamlessly
within images or QR codes. Addressing select input images or QR codes, thereby
this limitation, we propose a novel streamlining the encryption and
approach to text encryption and decryption workflow. By prioritizing
decryption that harnesses the power of accessibility and ease of use, our GUI
image processing techniques alongside facilitates the adoption of our encryption
cipher matrix methodology, all solution across diverse user
encapsulated within a user-friendly demographics, from individual users
graphical interface (GUI) developed seeking personal privacy to enterprises
using Tkinter. safeguarding proprietary information.

Our approach begins by bridging the gap Through rigorous experimentation and
between visual and textual information evaluation, we demonstrate the
through the utilization of optical effectiveness and versatility of our
character recognition (OCR) to convert approach across a spectrum of quoted
quoted images into machine-readable images and QR codes. Evaluation metrics
text. Simultaneously, we extract relevant encompass encryption strength,
data from QR codes, providing a computational efficiency, and user
seamless integration of image-based data satisfaction, providing comprehensive
into the encryption workflow. This initial insights into the practical applicability of
step ensures the versatility of our system, our solution.
accommodating various sources of input
data without compromising on security or In summary, our proposed system
efficiency. represents a significant advancement in
text encryption and decryption, offering a
Central to our encryption process is the seamless integration of image processing,
utilization of a cipher matrix, a cipher matrix methodology, and user-
mathematical construct that enables friendly GUI design. By bridging the gap
robust encryption through matrix between visual and textual information,
manipulation and permutation. This our solution stands poised to enhance
method not only enhances the security of security and confidentiality in digital
the encrypted text but also allows for communication across various domains
efficient decryption using inverse and user scenarios.
operations, ensuring that the original
message can be retrieved accurately.
2 Mathematical Representation :

Let us assume some text which forms matrix of 2 x 2 as

A=
[ 23 71] …(Here matrix A is input matrix)
Now, consider key matrix as B

B=
[ 21 10] …(B is key matrix)
So when data is transferred from sender’s device ,it get encrypted as

B . A=
[21 10]x [ 23 71 ] …(pre-multiplication of matrix B with A)
BA=
[ 157 27 ] …(Encrypted matrix)
Now, data is being transferred ; at moment of receiving data ,it get decrypted as

B-1.(BA) ¿ −1[0 −1
2 ] [7 2
]
x 15 7 …(pre-multiplication with B-1 to encrypted matrix )

[2 7 ]
A = 3 1 …(we get original matrix of some text)

Finally original data is transmitted to receiver


3 Proposed Methodolgy :

Import Necessary Libraries: Import Return the string representation of


required libraries including cv2, encrypted numbers with "E" as a
pytesseract, shutil, os, random, and PIL (if separator.
not already installed).
Decryption Function:
Install Dependencies: Ensure that Convert the encrypted data string into a
required dependencies like Tesseract list of numerical values.
OCR and pytesseract are installed; if not, Create the encrypted matrix from the
install them. numerical values.
Define the inverse secret matrix for
Define Image Path or Upload: Define decryption.
the path of the image containing the text Multiply the inverse secret matrix and the
or provide functionality to upload an encrypted matrix to obtain the decrypted
image file. matrix.
Combine the numerical values from the
Open Image: Use the OpenCV library decrypted matrix into a final array.
(cv2) to open the image. Convert the numerical values in the final
array back to their corresponding
Extract Text: Utilize pytesseract to characters.
extract text from the image and store it in Return the decrypted data as a string.
a variable called "extractedInformation".
Encryption Call: Call the encryption
Print Extracted Text: Print the extracted function with the extracted text as input
text for verification. and store the encrypted result.

Encryption Function: Print Encrypted Text: Print the


Create a mapping of alphabets to encrypted form of the text for reference.
numerical values.
Convert each character in the extracted Decryption Call: Call the decryption
text to its numerical representation and function with the encrypted data as input
append it to a result string with "E" as a and store the decrypted result.
separator.
Split the result string into individual Print Decrypted Text: Print the
numerical values and store them in a list. decrypted text for verification and
Determine the dimensions of the matrix validation of the encryption-decryption
based on the count of numerical values. process.
Populate a matrix with the numerical
values. This methodology, integrated with a user-
Define a secret matrix for encryption. friendly GUI developed using Tkinter,
Multiply the secret matrix and the provides a seamless and intuitive
numerical matrix to obtain the encrypted approach to encrypting and decrypting
matrix. text from images while ensuring security
and ease of use.
4 Result & Snapshot Of GUI :
3 Futurescope :

Enhanced Security Features: Explore User Interface Enhancements:


and integrate additional encryption Continuously refine and improve the user
algorithms or cryptographic techniques to interface to make it more intuitive, user-
further enhance the security of the friendly, and visually appealing. This
system. This could involve implementing could involve incorporating user
more sophisticated encryption methods or feedback, conducting usability studies,
incorporating multi-factor authentication and adopting modern design principles.
mechanisms.
Integration with Blockchain
Optimization for Performance: Technology: Explore the integration of
Continuously improve the performance blockchain technology to provide
and efficiency of the system, especially in additional layers of security and
handling large volumes of data or high- transparency for encrypted data storage
resolution images. This could involve and transmission. This could involve
optimization of algorithms, parallel implementing decentralized encryption
processing techniques, or leveraging key management systems or leveraging
hardware acceleration. smart contracts for secure data
transactions.
Integration with Cloud Services:
Explore integration with cloud-based Collaborative Encryption
services to enable seamless and secure Frameworks: Develop frameworks or
storage, sharing, and collaboration of protocols that enable secure collaborative
encrypted data across multiple devices encryption and decryption of data among
and platforms. This could involve multiple parties. This could facilitate
integration with popular cloud storage encrypted communication and
providers and implementing secure collaboration in group settings while
communication protocols. maintaining privacy and security.

Support for Multimedia Encryption: Compliance with Data Privacy


Extend the system to support encryption Regulations: Ensure compliance with
and decryption of multimedia content relevant data privacy regulations and
such as audio and video files. This could standards, such as GDPR, HIPAA, or
involve developing specialized CCPA, by implementing robust data
algorithms or adapting existing encryption and protection measures. This
encryption techniques to accommodate could involve incorporating encryption
multimedia data formats. standards and best practices
recommended by regulatory authorities.
Cross-Platform Compatibility: Develop
versions of the system for different Research and Innovation: Continuously
operating systems and platforms, engage in research and innovation to
including mobile devices and web explore novel encryption techniques,
browsers. This would enhance algorithms, and applications in the field
accessibility and usability, allowing users of image-based text encryption and
to encrypt and decrypt text from any decryption. This could involve
device or platform. collaboration with academic institutions,
industry partners, and research
organizations to push the boundaries of encryption technology.

4 Conclusion :

In conclusion, the integration of image- healthcare organizations can enhance


based text encryption and decryption clinical decision-making, accelerate
presents a robust solution for securing research efforts, and ultimately improve
sensitive data across various domains, patient outcomes.
with healthcare being a prominent
example. By leveraging encryption Looking ahead, there are numerous
algorithms and image processing avenues for future enhancements that can
techniques, this proposed system ensures further augment the capabilities and
the confidentiality and privacy of usability of the system. Optimization for
information, even in scenarios involving performance, integration with cloud
raw medical data. services, and support for multimedia
encryption are just a few examples.
Through encryption, raw medical data Continued research and innovation in
can be transformed into encrypted encryption technologies will be vital in
images, adding an additional layer of addressing evolving security challenges
security during both transmission and and advancing secure communication
storage. This not only reduces the risk of practices across diverse industries.
unauthorized access or data breaches but
also ensures compliance with stringent In essence, the proposed image-based text
data privacy regulations such as HIPAA encryption and decryption system
and GDPR. signifies a significant advancement in
data security, offering a versatile and
Moreover, the system facilitates seamless scalable solution for safeguarding
collaboration and information exchange sensitive information in today's digital
among healthcare professionals while landscape. By prioritizing security,
maintaining data security and patient privacy, and usability, this system sets a
confidentiality. With the capability to new standard for secure communication
securely share encrypted images and collaboration, not only in healthcare
containing sensitive medical information, but also across various other sectors.

5 References :

1) https://www.bing.com/ck/a?!
&&p=4654ae4d2b444348JmltdHM9MTcxNTA0MDAwMCZpZ3VpZD0wNDlhNjM1NS
00MzFhLTZiZGUtMTAwZS03MTBiNDJlMjZhZDAmaW5zaWQ9NTMwNQ&ptn=3&v
er=2&hsh=3&fclid=049a6355-431a-6bde-100e-
710b42e26ad0&psq=cryptography+research+paper&u=a1aHR0cHM6Ly9pZWVleHBsb3J
lLmllZWUub3JnL2RvY3VtZW50Lzk3NTYwNzg&ntb=1
2) (PDF) A Secure and Fast Approach for Encryption and Decryption of Message
Communication (researchgate.net)
3) Cryptography: Recent research trends of encrypting mathematics - ScienceDirect

You might also like