0% found this document useful (0 votes)
151 views13 pages

Encryption and Decryption of Data Images App

This document describes an Android app that encrypts text data within images for secure transmission. The sender selects text and an image, encrypts the text into the image using a key, and sends it to the receiver. Only the receiver with the same key can decrypt and view the text. The encryption uses techniques like LSB steganography and cryptography to hide the text within pixel values. The app provides a more secure alternative to prior encryption methods that were vulnerable to hackers aware of binary text formats.

Uploaded by

PlayIt All
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
151 views13 pages

Encryption and Decryption of Data Images App

This document describes an Android app that encrypts text data within images for secure transmission. The sender selects text and an image, encrypts the text into the image using a key, and sends it to the receiver. Only the receiver with the same key can decrypt and view the text. The encryption uses techniques like LSB steganography and cryptography to hide the text within pixel values. The app provides a more secure alternative to prior encryption methods that were vulnerable to hackers aware of binary text formats.

Uploaded by

PlayIt All
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 13

Encryption And Decryption of

Data Images App


Introduction
Android is a software platform and operating system
for mobile devices. This is a project that is used to
perform secret data transmission by performing
encryption of text on images. The sender uses a key to
perform encryption and the same key is given to the
receiver to decrypt an obtain the data.
Abstract
This decryption process can only be performed by an
authenticated receiver using Encryption of data on images
provides a safe and secure transmission of data between the
sending and receiving party. The data/text which the sender
wants to transmit is selected first and then an image is chosen
from the current mobile device. The chosen text is then
encrypted in the image such that the data is not visible to any
third party. After encryption is performed, the image is sent to
receiving party and the receiver decrypts the data using the key
given by the sender this application.
Proposed System
 In this project we used many techniques to encrypt and make the data
invisible to anyone (not even to the receiver). We used LSB (Least
Significant Bit) format, stenography and cryptographic techniques to
encrypt the data and the data/text being encrypted on an image will
not be visible .
 The sender will use a key for security reasons and the same key should
be used by receiving party to decrypt the image and obtain the text
written on it. The image on which data encryption is being performed
can be chosen from the existing device and after all the process
completes, that image can be sent through E-Mail or Google drive.
Existing System
 The perspective of data security, which has always been an
important aspect of quality of service, Cloud Computing inevitably,
poses new challenging security threats for number of reasons.
 Encryption of data/text was previously done using hash and
cryptographic algorithms, which is written in binary form. Such as
encryption techniques are visible in a specific from and the intruder
who is aware of binary text formats can easily read the text. In those
times it provided a lot of security but as technology progressed
many hackers also came into existence and it could not provide
security up to that extent.
Functionality
Start

Login

Registration

Add Image Encryption Data.


Register New User
Chose text/ retrieved data from Current device.
Browse images from the device.
Encrypt the chose text on to the image.
Receiver now decrypts the data.

Encrypted image with text will be saving.


Send encrypted image by E-mail.
Change user name and password
Enter Security Key with text.
Enter Question and answer.
Show Menu as:-
Settings

Feedback

Rating

About us
Logout.
Advantage
 Simplicity: - It’s simpler, cheaper.
 Ratio:- Encryption takes 1/4th time the decryption process take.
 Robust: - The encrypted image is hard to hack to obtain the original
image.
 Pixels obtained after Gaussian elimination is fully distorted, so the
key is needed to obtain original image because it’s hard to crack
that encrypted form.
 We have reduced time taken by encryption by smartly by updating
row exchanges using another matrix. So basically it’s space for time
trade off.
Disadvantage

 Efficiency of our algorithm is 2/3*0(n^3).


 Decryption takes 4 times larger the time taken by
Encryption.
Hardware recruitment
 Android mobile with a minimum version 3.2
 Processor is not less than 500MHZ.
 RAM is not less than 170MB.
 SD card with minimum of 512MB.
 Resolution is not less than 480*800pixs.
Software Recruitment
 Mobile Operating System: Android 2.3 or Later
 Server Operating System: Windows XP or Later
 Tools (IDE): Eclipse or Android Studio
 User Interface: XML
 Code Behind: JAVA and XML
 Internet: Yes
Conclusion
Thus, the project entitled” Encryption and Decryption of text image
data” was successfully completed. A complex project involving the
conversion of image into matrix form, using a mathematical
concept to encrypt and decrypt it, was instrumental in giving us a
thorough understanding of how the concepts of ADA and Linear
Algebra together can actually be implemented in the real world. By
the end of the project, we have gained valuable skills including a
grounding of how to interact with the operating system. Files
handling in Android, optimizing algorithms, calculating the
efficiencies, and learning how to form and manipulate images.

You might also like