- Visual Crypto Coding is a cryptographic technique that involves encrypting an input image using a randomly generated key.
- The encrypted image can then be decrypted using either the same key (in symmetric encryption) or different keys (in asymmetric encryption methods).
- This technique is particularly useful for ensuring the secure transmission and storage of sensitive images.
- In addition to generating encrypted images, this process also yields decrypted images to verify data integrity.
- This involves ensuring that the decrypted images obtained from all cryptographic algorithms match the original input image, thereby confirming the accuracy of the encryption and decryption processes.
- Further improvements can be done to improve data confidentiality, efficiency of the codes. Please feel free to submit a pull request.
![vcc(1)](https://private-user-images.githubusercontent.com/85508314/310442425-2f4900f4-5cef-4080-875f-d8f40546ed15.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.JJGL8yO1TmDbO3DvQacW5ZL_lQ-rFYRaGmeRvlnox5k)
![vcc(2)](https://private-user-images.githubusercontent.com/85508314/310456428-f521c559-8037-4221-b08a-b88180c90ec1.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.djD6S1yHyMn__IyvEz3ole6i4ba8dBupHSWNdpU9vMY)
![vcc(3)](https://private-user-images.githubusercontent.com/85508314/310456489-76410325-ce7c-475b-9497-95ae15100e04.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.Q6GRIcYVOHzADEg75Ez--_W0ifyPxhh4L8nw8-P4nDw)
-
The encryption time of all the four algorithms are obtained as follows in EncryptTime.txt file
Algo Time DES 4939747699 ns 3DES 4500023999 ns AES 4476420593 ns RSA 5360362883 ns
- Conducted thorough performance analysis, revealing the AES algorithm with an encryption time of 4.47 secs, outperforming other algorithms by 10.02% on average.
- This highlights the superior efficiency and security of AES compared to the other algorithms.