SlideShare a Scribd company logo
4
Most read
Implementation of Encryption and Decryption
Process Using
OpenGL
PRESENTED BY
SUDHA M (4GW14ISO52)
NETHRAVATHI S(4GW15IS402)
Under the Guidance
Of
Amaresh A M,
Assistant professor,
Dept. of ISE,
GSSSIETW
DEPARTMENT OF INFORMATION SCIENCE & ENGINEERING
WHAT IS ENCRYPTION?
ENCRYPTION IS DEFINED AS MODIFIED INFORMATION
INTO A SPECIAL CODE, ESPECIALLY IN ORDER TO
PREVENT UNAUTHORIZED USERS TO HAVE ACCESS TO
THE INFORMATION.
WHAT IS DECRYPTION?
DECRYPTION IS THE PROCESS OF TAKING ENCODED OR
ENCRYPTED TEXT OR OTHER DATA AND CONVERTING IT
BACK INTO TEXT THAT YOU OR THE COMPUTER CAN
READ AND UNDERSTAND.
HOW IT WORKS?
Encryption and decryption
OBJECTIVES
1.THE FIRST IS TO STUDY THE ARCHITECTURE OF IMAGE FILE. THE
STUDY IS FOCUSED TO JPG FILE TYPE BECAUSE IT IS ONE OF THE
MOST POPULAR IMAGE FORMAT USED.
2.THE SECOND OBJECTIVE IS TO DEVELOP AN APPLICATION USING
OPENGL THAT CAN BE USED TO ENCRYPT AN IMAGE FILE. THIS
APPLICATION MUST BE SIMPLE, EASY TO USE, AND POWERFUL.
3.THE LAST OBJECTIVE OF THIS THESIS IS TO MAKE SURE THAT THE
PASSWORD HANDLING PROCESS IS NO CARELESSLY IMPLEMENTED.
4.THIS APPLICATION WILL AFFECT ITS INTEGRITY AND REPUTATION. ALL
OF THE OBJECTIVES ACHIEVED GIVE A GOOD OUTCOME IN PROJECT.
OUTCOMES
THE APPLICATION HAS THE CAPABILITY TO PROTECT
SENSITIVE IMAGE FILE FROM BEING EXPOSED TO THE
UNAUTHORIZED USERS WHILE BEING TRANSFERRED OR WHEN
IT REACHES ITS TARGET DESTINATION.
THE MODIFICATION PERFORMED BY THE APPLICATION
WHEREBY ONCE THE IMAGE FILE IS ENCRYPTED BY THE
APPLICATION, IT CAN ONLY BE RETRIEVED BACK OR
DECRYPTED BY ITSELF ONLY.
 THE PROJECT ALSO PROVIDES USER WITH THE EASE OF USE
CONCEPT AND FASTER PROCESSING TIME. IT ALSO
INTRODUCES SAFER AND POWERFUL DATA.
ADVANTAGES
PROTECT IMAGE COMPLETELY
ACHIEVE SECURITY ON ALL DEVICES
TRANSMIT SECURELY
REFERENCES
HTTP://REPOSITORY.UM.EDU.MY/304/2/CHAPTER%201.PDF
HTTP://WWW.IJSR.NET/ARCHIVE/V2I2/IJSROFF2013041.PDF
IEEE PAPER OF S ROHITH ON “IMAGE ENCRYPTION AND
DECRYPTION”
HTTP://WWW.OPENGLPROJECTS.IN/2014/03/ENCRYPTION-
DECRYPTION-COMPUTER-GRAPHICS.HTML#GSC.TAB=0
HTTPS://WWW.CS.COLUMBIA.EDU/~ANGELOS/PAPERS/2004/G
C_CTRSA.PDF
Encryption and decryption

More Related Content

PDF
Mini Project on Data Encryption & Decryption in JAVA
PDF
Steganography Project
PPT
Steganography
PPTX
AUDIO STEGANOGRAPHY PRESENTATION
PPTX
Steganography Project
PPTX
Network security and cryptography
PDF
Image Steganography Project Report
Mini Project on Data Encryption & Decryption in JAVA
Steganography Project
Steganography
AUDIO STEGANOGRAPHY PRESENTATION
Steganography Project
Network security and cryptography
Image Steganography Project Report

What's hot (20)

PPTX
Audio steganography project presentation
PPTX
3 public key cryptography
PDF
Web Security
PPTX
Image authentication techniques based on Image watermarking
PPT
Ch01
 
PDF
Elliptic curve cryptography
PDF
Prototyping Embedded Devices_Internet of Things
PPTX
IoT Security
PPTX
Cryptography
PPT
PPT
Key management.ppt
PPTX
Image Steganography
PPTX
Data security using rsa
PPTX
Steganography
PDF
Pervasive Web Application Architecture
PDF
LICENSE NUMBER PLATE RECOGNITION SYSTEM USING ANDROID APP
PPTX
Secure communication
PPTX
SHA512.pptx
PDF
Image encryption and decryption using aes algorithm
PDF
Unit 3_Private Key Management_Protection.pdf
Audio steganography project presentation
3 public key cryptography
Web Security
Image authentication techniques based on Image watermarking
Ch01
 
Elliptic curve cryptography
Prototyping Embedded Devices_Internet of Things
IoT Security
Cryptography
Key management.ppt
Image Steganography
Data security using rsa
Steganography
Pervasive Web Application Architecture
LICENSE NUMBER PLATE RECOGNITION SYSTEM USING ANDROID APP
Secure communication
SHA512.pptx
Image encryption and decryption using aes algorithm
Unit 3_Private Key Management_Protection.pdf
Ad

Similar to Encryption and decryption (20)

PDF
11.data security using cryptosteganography in web application
PDF
Cecimg an ste cryptographic approach for data security in image
PPTX
Image encryption and decryption
PDF
Steganography using visual cryptography
PDF
A novel method for digital data encoding-decoding
PDF
steganography using visual cryptography_report
PPTX
Steganography
PDF
hardware implementation of aes encryption and decryption for low area & low p...
PDF
Implementation of DES encryption and decryption Algorithm
PDF
Iaetsd implementation of lsb image steganography system using edge detection
PDF
File Encryption and Hiding Application Based on AES and Append Insertion Steg...
PDF
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
PDF
A Cryptographic Key Generation Using 2D Graphics pixel Shuffling
PDF
Triple Data Encryption Standard (t-DES)
PPTX
Cryptographic algorithms
PPTX
Cryptographic algorithms
PDF
International Journal of Computational Engineering Research(IJCER)
PDF
Let's play with crypto! v2
PDF
when AES(☢) = ☠ --- a crypto-binary magic trick
PPTX
NS UNIT 1 Advanced Encryption Standard& RSA
11.data security using cryptosteganography in web application
Cecimg an ste cryptographic approach for data security in image
Image encryption and decryption
Steganography using visual cryptography
A novel method for digital data encoding-decoding
steganography using visual cryptography_report
Steganography
hardware implementation of aes encryption and decryption for low area & low p...
Implementation of DES encryption and decryption Algorithm
Iaetsd implementation of lsb image steganography system using edge detection
File Encryption and Hiding Application Based on AES and Append Insertion Steg...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
A Cryptographic Key Generation Using 2D Graphics pixel Shuffling
Triple Data Encryption Standard (t-DES)
Cryptographic algorithms
Cryptographic algorithms
International Journal of Computational Engineering Research(IJCER)
Let's play with crypto! v2
when AES(☢) = ☠ --- a crypto-binary magic trick
NS UNIT 1 Advanced Encryption Standard& RSA
Ad

Recently uploaded (20)

PPTX
Presentation on HIE in infants and its manifestations
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
GDM (1) (1).pptx small presentation for students
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
RMMM.pdf make it easy to upload and study
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
Institutional Correction lecture only . . .
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
Classroom Observation Tools for Teachers
Presentation on HIE in infants and its manifestations
2.FourierTransform-ShortQuestionswithAnswers.pdf
GDM (1) (1).pptx small presentation for students
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
RMMM.pdf make it easy to upload and study
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Final Presentation General Medicine 03-08-2024.pptx
202450812 BayCHI UCSC-SV 20250812 v17.pptx
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Microbial disease of the cardiovascular and lymphatic systems
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Institutional Correction lecture only . . .
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
human mycosis Human fungal infections are called human mycosis..pptx
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
Classroom Observation Tools for Teachers

Encryption and decryption

  • 1. Implementation of Encryption and Decryption Process Using OpenGL PRESENTED BY SUDHA M (4GW14ISO52) NETHRAVATHI S(4GW15IS402) Under the Guidance Of Amaresh A M, Assistant professor, Dept. of ISE, GSSSIETW DEPARTMENT OF INFORMATION SCIENCE & ENGINEERING
  • 2. WHAT IS ENCRYPTION? ENCRYPTION IS DEFINED AS MODIFIED INFORMATION INTO A SPECIAL CODE, ESPECIALLY IN ORDER TO PREVENT UNAUTHORIZED USERS TO HAVE ACCESS TO THE INFORMATION.
  • 3. WHAT IS DECRYPTION? DECRYPTION IS THE PROCESS OF TAKING ENCODED OR ENCRYPTED TEXT OR OTHER DATA AND CONVERTING IT BACK INTO TEXT THAT YOU OR THE COMPUTER CAN READ AND UNDERSTAND.
  • 6. OBJECTIVES 1.THE FIRST IS TO STUDY THE ARCHITECTURE OF IMAGE FILE. THE STUDY IS FOCUSED TO JPG FILE TYPE BECAUSE IT IS ONE OF THE MOST POPULAR IMAGE FORMAT USED. 2.THE SECOND OBJECTIVE IS TO DEVELOP AN APPLICATION USING OPENGL THAT CAN BE USED TO ENCRYPT AN IMAGE FILE. THIS APPLICATION MUST BE SIMPLE, EASY TO USE, AND POWERFUL. 3.THE LAST OBJECTIVE OF THIS THESIS IS TO MAKE SURE THAT THE PASSWORD HANDLING PROCESS IS NO CARELESSLY IMPLEMENTED. 4.THIS APPLICATION WILL AFFECT ITS INTEGRITY AND REPUTATION. ALL OF THE OBJECTIVES ACHIEVED GIVE A GOOD OUTCOME IN PROJECT.
  • 7. OUTCOMES THE APPLICATION HAS THE CAPABILITY TO PROTECT SENSITIVE IMAGE FILE FROM BEING EXPOSED TO THE UNAUTHORIZED USERS WHILE BEING TRANSFERRED OR WHEN IT REACHES ITS TARGET DESTINATION. THE MODIFICATION PERFORMED BY THE APPLICATION WHEREBY ONCE THE IMAGE FILE IS ENCRYPTED BY THE APPLICATION, IT CAN ONLY BE RETRIEVED BACK OR DECRYPTED BY ITSELF ONLY.  THE PROJECT ALSO PROVIDES USER WITH THE EASE OF USE CONCEPT AND FASTER PROCESSING TIME. IT ALSO INTRODUCES SAFER AND POWERFUL DATA.
  • 8. ADVANTAGES PROTECT IMAGE COMPLETELY ACHIEVE SECURITY ON ALL DEVICES TRANSMIT SECURELY
  • 9. REFERENCES HTTP://REPOSITORY.UM.EDU.MY/304/2/CHAPTER%201.PDF HTTP://WWW.IJSR.NET/ARCHIVE/V2I2/IJSROFF2013041.PDF IEEE PAPER OF S ROHITH ON “IMAGE ENCRYPTION AND DECRYPTION” HTTP://WWW.OPENGLPROJECTS.IN/2014/03/ENCRYPTION- DECRYPTION-COMPUTER-GRAPHICS.HTML#GSC.TAB=0 HTTPS://WWW.CS.COLUMBIA.EDU/~ANGELOS/PAPERS/2004/G C_CTRSA.PDF