- Visual Crypto Coding is a cryptographic technique that involves encrypting an input image using a randomly generated key.
- The encrypted image can then be decrypted using either the same key (in symmetric encryption) or different keys (in asymmetric encryption methods).
- This technique is particularly useful for ensuring the secure transmission and storage of sensitive images.
- In addition to generating encrypted images, this process also yields decrypted images to verify data integrity.
- This involves ensuring that the decrypted images obtained from all cryptographic algorithms match the original input image, thereby confirming the accuracy of the encryption and decryption processes.
- Further improvements can be done to improve data confidentiality, efficiency of the codes. Please feel free to submit a pull request.
![vcc(1)](https://private-user-images.githubusercontent.com/85508314/310442425-2f4900f4-5cef-4080-875f-d8f40546ed15.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.q2Kr3FVbpH6cEvgP0xxk1I0TPma8gj_MaybvKlwl8rs)
![vcc(2)](https://private-user-images.githubusercontent.com/85508314/310456428-f521c559-8037-4221-b08a-b88180c90ec1.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.xafbqNTA8RRuwANR5uJG0eBibAiVCd9j-srNZo9y-0U)
![vcc(3)](https://private-user-images.githubusercontent.com/85508314/310456489-76410325-ce7c-475b-9497-95ae15100e04.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.BSpET3dZb3wBDjGJMerUjXHQPocrdkpfqvGpHoyuKdc)
-
The encryption time of all the four algorithms are obtained as follows in EncryptTime.txt file
Algo Time DES 4939747699 ns 3DES 4500023999 ns AES 4476420593 ns RSA 5360362883 ns
- Conducted thorough performance analysis, revealing the AES algorithm with an encryption time of 4.47 secs, outperforming other algorithms by 10.02% on average.
- This highlights the superior efficiency and security of AES compared to the other algorithms.