Chapter Five Rep
Chapter Five Rep
5.1 Summary
The research on the Image File Encryption and Decryption System has explored current
methodologies and their limitations. The focus has been on using cryptographic
algorithms such as AES and RSA to secure image data during storage and transmission.
personalization, and outdated content were identified as key problems in the current
system. This research project examined a variety of image encryption methods and
concluded that the AES and RSA technique has the most uncertainty and delivers the
most security. Furthermore, the work reveals that NPCR (Number of Pixels Change Rate)
block values must be reliant upon values of the other cipher blocks in order to obtain
sufficient NPCR.
This research contributes to the field of cryptography and data security by providing a
comprehensive analysis of the current state of image file encryption and decryption
improve their efficiency and user experience. The introduction of user-friendly interfaces,
5.3 Conclusion
In conclusion, the Image File Encryption and Decryption System is crucial for securing
image data from unauthorized access. While current systems offer a certain level of
and satisfaction. With this regard, this project is believed to create a secure and encrypted
5.4 Recommendations.
The system user should have the best and most modern techniques
monitoring services.
made:
1. Develop user-friendly interfaces: Simplify the encryption and
technical expertise.
communication channels.
preferences.
the system.
1. Mauro Barni, Franco Bartolini, Enrico Magli and Gab-riella Olmo, “Watermarking
3. Klaus Holtz, “Advanced Data Compression promises the next big Leap in Network
May 2024.
5. Mohammad Zakir Hossain Sarker and Md. Shafiul Parvez, “A Cost Effective Symmetric
of the 9th IEEE International Multi topic Conference, pp. 1-6, December 2005
6. Xun Yi Chik How Tan Chee Kheong Slew Rahman Syed, M., "Fast encryption for
7. Yen J. C. and Guo J. I., “A new chaotic image encryp-tion algorithm,” Proceeding of
2022.
8. Jui-Cheng Yen and J. I. Guo, “A New Chaotic Mirror-Like Image Encryption Algorithm
Algorithm and Its VLSI Re-alization”. IEEE Proceeding Vis. Image Signal
11 Choo, K. K. R., Domingo-Ferrer, J., & Zhang, L. (2021). Cloud Cryptography: Theory,
Practice and Future Research Directions. Future Gener. Comput. Syst., 62 (C), 51-53.
12 Marwaha, M., & Bedi, R. (2023). Applying encryption algorithm for data security and
10 (1), 367.
13 Hou, J., Jiang, M., Guo, Y., & Song, W. (2022). Efficient identity-based multi-bit proxy
re encryption over lattice in the standard model. Journal of Information Security and