International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 85 - Number 11 |
Year of Publication: 2014 |
Authors: Harinandan Tunga, Akash Ghosh, Arnab Saha, Swashata Ghosh |
10.5120/14887-3322 |
Harinandan Tunga, Akash Ghosh, Arnab Saha, Swashata Ghosh . Design and Implementation of a Lock-Key Image Encryption and Decryption, based on a User Provided Password. International Journal of Computer Applications. 85, 11 ( January 2014), 28-32. DOI=10.5120/14887-3322
This paper is about encryption and decryption of images using a secret password provided by the user. The encryption machine takes the password and the source image as input and generates a key pattern image by using Secure Hash Algorithm (SHA) and a lock image by using Mcrypt algorithm. It provides additional security using Image scrambling. The decryption machine takes the lock image, key image and the password as input to generate the original image. It also checks if the input is valid and blocks the user when an invalid input is provided. In this paper the results are obtained by simulating the entire algorithm in PHP. You can check out the project by visiting www. imglockkey. com.