Image Encryption and Decryption
Image Encryption and Decryption
U S I N G M U LT I - L AY E R E D
C RY P T O G RA P H I C T E C H N I Q U E S
AGENDA
• Abstract
• Existing Systems
• Proposed System
• Flow Chart of Proposed Method
• Results
• Technology Used
• Test Analysis
• References
ABSTRACT
• Encryption and decryption play a crucial role in protecting digital images
by transforming them into an unreadable format, preventing unauthorized
access while allowing only authorized users to restore them securely.
• Secure image encryption and decryption are vital in fields like military,
healthcare, and digital forensics, where protecting sensitive data from
breaches and unauthorized access is a top priority.
EXISTING SYSTEMS
1 . Static or Hardcoded Key Usage:-
Many existing systems use fixed or manually set keys, making them
predictable
and more vulnerable to brute-force or known-plaintext attacks due to
reduced
randomness.
Steps:
• Load the Image – The image is processed and retrieves its RGB pixel data.
• Get Image Dimensions – The width and height are determined to ensure the key
block fits within the image.
• Extract the 10×10 Block – A section of 100 pixels is extracted from the chosen
coordinates.
• Store and Use the Key – The key is securely saved as an image, matrix, or binary
data. It must be protected since it is essential for decryption.
Layer 1: Pixel Scrambling
• The original image is read and converted into a NumPy array (3D for RGB).
• A key (seed here is the block 10×10) is used to generate a deterministic
random seed.
• The pixel array is flattened and reordered according to the shuffled indices.
• The scrambled image is reshaped back into the original image shape.
• The shuffled indices are saved to reverse the process during decryption.
Layer 2: AES Encryption
• The scrambled image array is converted to raw byte data.
• A secure 256-bit AES key is generated using randomly divided by 16, the image byte
• An AES cipher object is created in GCM mode (ensures integrity and confidentiality).
• The cipher encrypts the padded data and generates a tag for verification.
• The encrypted output is a combination of the cipher’s nonce, tag, and ciphertext
• This byte stream becomes the AES-encrypted image data passed to the next layer.
Layer 3: XOR
Encryption
• The AES-encrypted byte stream is converted into a NumPy array of type
uint8.
• A key (read from a file or generated) is repeated to match the length of the
data.
• A bitwise XOR operation is applied between the AES-encrypted data and the
repeated XOR key.
• Binary sequences are then mapped to DNA sequences using substitution rules.
("00" = A, "01" = T, "10"=C,"1"=G).
Pre processing
Descramble Pixels
AES Decryption
AES Encryption Encrypted Image
S O F T WA R E T O O L S U S E D :
• VS code
T E S T A N A LY S I S
• Histogram Analysis
2. Wang, X. et al. (2016). A novel image encryption scheme based on DNA encoding and
discrete wavelet transform. Signal Processing, 123, 145–161.
4. Arun, C. & Manjunath, T.M. (2020). A secure and efficient color image encryption using pixel
value transformation and permutation. Procedia Computer Science, 167, 2588–2596.
5. Suryavanshi, R. & Dhanajayan, M. (2023). An efficient color image encryption using modified
AES with key image-based permutation. Journal of King Saud University – Computer and
THANK YOU