- Visual Crypto Coding is a cryptographic technique that involves encrypting an input image using a randomly generated key.
- The encrypted image can then be decrypted using either the same key (in symmetric encryption) or different keys (in asymmetric encryption methods).
- This technique is particularly useful for ensuring the secure transmission and storage of sensitive images.
- In addition to generating encrypted images, this process also yields decrypted images to verify data integrity.
- This involves ensuring that the decrypted images obtained from all cryptographic algorithms match the original input image, thereby confirming the accuracy of the encryption and decryption processes.
- Further improvements can be done to improve data confidentiality, efficiency of the codes. Please feel free to submit a pull request.
![vcc(1)](https://private-user-images.githubusercontent.com/85508314/310442425-2f4900f4-5cef-4080-875f-d8f40546ed15.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.PIXFwB_KyrxR9RVoo9YIIGJwWjeX7GLjy_--gAROBOc)
![vcc(2)](https://private-user-images.githubusercontent.com/85508314/310456428-f521c559-8037-4221-b08a-b88180c90ec1.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.0-6CO9_IpI7-shNMAm_xS9lTYhDeCrrQlegA0eav6wo)
![vcc(3)](https://private-user-images.githubusercontent.com/85508314/310456489-76410325-ce7c-475b-9497-95ae15100e04.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.f68v9DoVEQtkGa9cK2BmaDxJEpkh15U12CgdKABWoVA)
-
The encryption time of all the four algorithms are obtained as follows in EncryptTime.txt file
Algo Time DES 4939747699 ns 3DES 4500023999 ns AES 4476420593 ns RSA 5360362883 ns
- Conducted thorough performance analysis, revealing the AES algorithm with an encryption time of 4.47 secs, outperforming other algorithms by 10.02% on average.
- This highlights the superior efficiency and security of AES compared to the other algorithms.