- Visual Crypto Coding is a cryptographic technique that involves encrypting an input image using a randomly generated key.
- The encrypted image can then be decrypted using either the same key (in symmetric encryption) or different keys (in asymmetric encryption methods).
- This technique is particularly useful for ensuring the secure transmission and storage of sensitive images.
- In addition to generating encrypted images, this process also yields decrypted images to verify data integrity.
- This involves ensuring that the decrypted images obtained from all cryptographic algorithms match the original input image, thereby confirming the accuracy of the encryption and decryption processes.
- Further improvements can be done to improve data confidentiality, efficiency of the codes. Please feel free to submit a pull request.
![vcc(1)](https://private-user-images.githubusercontent.com/85508314/310442425-2f4900f4-5cef-4080-875f-d8f40546ed15.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.A5L3cga9RN4UTmk01loS01pP6yQ5qSQGk2PXtPW1v90)
![vcc(2)](https://private-user-images.githubusercontent.com/85508314/310456428-f521c559-8037-4221-b08a-b88180c90ec1.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.mbwG4IqYSvxuIBYxunHqmcNk577C-a0REvDOLcP7t_w)
![vcc(3)](https://private-user-images.githubusercontent.com/85508314/310456489-76410325-ce7c-475b-9497-95ae15100e04.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.7jikaff4jkTG8ovpSLQqYABX7uhrMUls1rhzL6Ny0qI)
-
The encryption time of all the four algorithms are obtained as follows in EncryptTime.txt file
Algo Time DES 4939747699 ns 3DES 4500023999 ns AES 4476420593 ns RSA 5360362883 ns
- Conducted thorough performance analysis, revealing the AES algorithm with an encryption time of 4.47 secs, outperforming other algorithms by 10.02% on average.
- This highlights the superior efficiency and security of AES compared to the other algorithms.