0% found this document useful (0 votes)
7 views5 pages

Chapter Five Rep

The research investigates the limitations of current image file encryption and decryption systems, focusing on cryptographic algorithms like AES and RSA. It highlights the need for user-friendly interfaces, optimized algorithms, and integrated communication channels to enhance accessibility and effectiveness. Recommendations include improving user experience and maintaining up-to-date content to ensure user engagement and satisfaction.

Uploaded by

mrkeem4real
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views5 pages

Chapter Five Rep

The research investigates the limitations of current image file encryption and decryption systems, focusing on cryptographic algorithms like AES and RSA. It highlights the need for user-friendly interfaces, optimized algorithms, and integrated communication channels to enhance accessibility and effectiveness. Recommendations include improving user experience and maintaining up-to-date content to ensure user engagement and satisfaction.

Uploaded by

mrkeem4real
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

CHAPTER FIVE

SUMMARY, RECOMMENDATIONS AND CONCLUSION

5.1 Summary

The research on the Image File Encryption and Decryption System has explored current

methodologies and their limitations. The focus has been on using cryptographic

algorithms such as AES and RSA to secure image data during storage and transmission.

Issues such as limited accessibility, fragmented communication channels, lack of

personalization, and outdated content were identified as key problems in the current

system. This research project examined a variety of image encryption methods and

concluded that the AES and RSA technique has the most uncertainty and delivers the

most security. Furthermore, the work reveals that NPCR (Number of Pixels Change Rate)

is independent of key sensitivity; thus, in block-based encryption systems, the encrypted

block values must be reliant upon values of the other cipher blocks in order to obtain

sufficient NPCR.

5.2 Contribution to Knowledge

This research contributes to the field of cryptography and data security by providing a

comprehensive analysis of the current state of image file encryption and decryption

systems. It highlights the limitations of existing methods and proposes solutions to

improve their efficiency and user experience. The introduction of user-friendly interfaces,

optimized algorithms, and integrated communication channels can significantly enhance

the accessibility and effectiveness of these systems. Additionally, the research


emphasizes the importance of personalization and up-to-date content in maintaining user

engagement and satisfaction.

5.3 Conclusion

In conclusion, the Image File Encryption and Decryption System is crucial for securing

image data from unauthorized access. While current systems offer a certain level of

protection, they are often hindered by limited accessibility, fragmented communication,

and lack of personalization. The introduction of user-friendly interfaces, optimized

algorithms, and integrated communication channels can significantly enhance the

accessibility and effectiveness of these systems. Additionally, the research emphasizes

the importance of personalization and up-to-date content in maintaining user engagement

and satisfaction. With this regard, this project is believed to create a secure and encrypted

means of image files encryption and decryption method.

5.4 Recommendations.

After carrying out this project research, it is recommended that the

System be adapted as soon as possible in order to enhance efficiency.

The system user should have the best and most modern techniques

knowledge and practices to provide a professional support and

monitoring services.

Based on the findings of this research, the following recommendations are

made:
1. Develop user-friendly interfaces: Simplify the encryption and

decryption process to make it accessible to users with varying levels of

technical expertise.

2. Optimize algorithms: Enhance the efficiency of cryptographic

algorithms to reduce the computational resources required for

encryption and decryption.

3. Integrate communication channels: Ensure that encryption keys

and encrypted images are shared through secure and unified

communication channels.

4. Offer personalization options: Allow users to customize the

encryption and decryption process based on their specific needs and

preferences.

5. Regularly update content: Maintain up-to-date user manuals and

tutorials to provide accurate information and best practices for using

the system.

6. Conduct continuous UX evaluations: Regularly assess user

experience to identify areas for improvement and ensure that the

system remains user-friendly and efficient.


REFERENCE

1. Mauro Barni, Franco Bartolini, Enrico Magli and Gab-riella Olmo, “Watermarking

techniques for electronic delivery of remote sensing images”, Optical

Engineer- ing, 41,No. 9, pp. 2111-2119, September 2022.

2. Ray A. Williamson, “REMOTE SENSING AND TRANSPORTATION SECURITY”,

Pecora 15/Land Satellite Information IV/ISPRS Commission I/FIEOS

Conference Proceedings, 2022

3. Klaus Holtz, “Advanced Data Compression promises the next big Leap in Network

Performance”, IS&T / SPIE EUROPTO Conference, Zurich, Switzerland,

May 2024.

4. R. J. Anderson and F. A. P. Petitcolas, "On the limits of steganography," IEEE Journal

on Selected Areas in Communications, vol. 16, no. 4, pp. 474-481, 2021

5. Mohammad Zakir Hossain Sarker and Md. Shafiul Parvez, “A Cost Effective Symmetric

Key Crypto-graphic Algorithm for Small Amount of Data”, Proceedings

of the 9th IEEE International Multi topic Conference, pp. 1-6, December 2005

6. Xun Yi Chik How Tan Chee Kheong Slew Rahman Syed, M., "Fast encryption for

multimedia," IEEE Transactions on Consumer Electronics, vol. 47, no. 1,

pp. 101-107, 2021.

7. Yen J. C. and Guo J. I., “A new chaotic image encryp-tion algorithm,” Proceeding of

National Symposium on Telecommunications, pp. 358-362, December

2022.
8. Jui-Cheng Yen and J. I. Guo, “A New Chaotic Mirror-Like Image Encryption Algorithm

and its VLSI Archi-tecture”, Pattern Recognition and Image Analysis,

vol.10, no.2, pp.236-247, 2020.

9. Jui-Cheng Yen and J. I. Guo, “Efficient Hierarchical Chaotic Image Encryption

Algorithm and Its VLSI Re-alization”. IEEE Proceeding Vis. Image Signal

Process, vol. 147, no. 2, pp. 167-175,2020

10 Stinson, D. R. (2025). Cryptography: theory and practice. Chapman and Hall/CRC.

11 Choo, K. K. R., Domingo-Ferrer, J., & Zhang, L. (2021). Cloud Cryptography: Theory,

Practice and Future Research Directions. Future Gener. Comput. Syst., 62 (C), 51-53.

12 Marwaha, M., & Bedi, R. (2023). Applying encryption algorithm for data security and

privacy in cloud computing. International Journal of Computer Science Issues (IJCSI),

10 (1), 367.

13 Hou, J., Jiang, M., Guo, Y., & Song, W. (2022). Efficient identity-based multi-bit proxy

re encryption over lattice in the standard model. Journal of Information Security and

Applications, 47, 329 334.

You might also like