Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 12

GAYATRI VIDYA PARISHAD 

COLLEGE FOR DEGREE AND PG COURSES(A)


(Affiliated to Andhra University | Accredited by NAAC with "  B++" Grade | ISO 9001: 2015)
Visakhapatnam-530045.

Image Encryption Algorithm Through Hill Cipher, and Logistic


Map

Project By MCA 4th semester Project Guide By:


Name : Y.SAI SRINIVASA REDDY Mr. B. DIVAKAR
Rollno : PG212202066 ASSISTANT PROFESSOR
CONTENTS

 Abstract

 Functional Requirements

 Non-Functional Requirements

 Use-case diagram for User and Image Encryptior

 Sequence diagram for User

 Sequence diagram for Image Encryptior

 State chart diagram for User

 State chart diagram for Image Encryptior

 Conclusion
ABSTRACT

One of the cryptographic approaches is the Hill Cipher. A square key matrix must have an
inverse modulo in the Hill Cipher algorithm. The unimodular matrix is one of the special matrices
that has an inverse. In the encryption process, a unimodular matrix can be utilized as a key
matrix. The goal of this study is to demonstrate a safe digital image data alternative. Symmetric
cryptography is the type of encryption utilized. The described approach uses a Logistic Map to
construct a unimodular matrix. The encryption mechanism in this is modulo matrix
multiplication. Because an incomplete partition may arise as a result of a file . Especially if the size
is a large prime integer. The results that the photo are well encrypted and difficult for third parties
to decrypt. This encryption methods also assures that the encrypted and decrypted file sizes are
identical to the original file sizes. As a result, the Hill cipher works well with the combination of
these techniques for encrypting digital images.

.
Functional Requirements

Encryption
Input : Image Pixels,

Keys(s) : Random Key value.

Output : Encrypt Image.

Decryption
Input : Encrypt Image,

Key(s) : Get Key.

Output : Oraginal Image.


Functional Requirements

Hardware Requirements
Processor : Intel i3 & Above
RAM : 4 GB
Hard disk : 500 GB
Keyboard : Standard 102 Keys
Mouse : Standard

Software Requirements:
Operating system : Windows 7 & Above
Front-end/GUI tool : Python IDLE 3.10.4.
Programming language : Python Programming
Non-Functional Requirements

● Usability: The GUI of this system provides easy access to the user and user can get best results for the given
input.

● Supportability: System is implemented using Python 3.8.3 IDLE

● Performance: It display the correct result based on the output for all possible correct inputs at all times when
the computer is in proper condition.

● Reliability: This system will perform its intended function adequately for a specific period of time.
● Maintainability: This system can adapt any technology and can detect errors.

● Portability: This system can work on windows operating system environment with minimal changes.
Use-case diagram for User and Image Encryptior
Sequence diagram for User
Sequence diagram for Image Encryptior
State chart diagram for User
State chart diagram for Image Encryptior
CONCLUSION
The conclusion is that, The standard hill cipher usually uses a small K_n, n≤4 key matrices

because of the difficulty of finding a reversible matrix. Furthermore, if n>4 uses the

standard Hill cipher, it takes the entire K_ n matrix as the key. In this paper, we create a

Unimodular matrix using a custom logistic function as a key that can solve this problem.

That is n>4 but only takes 2 parameters password 1 and password. The combination of Hill

Cipher makes encrypted files more secure. The capacity does not affect the length of

encryption time, which affects password1, because it is related to the key matrix size of

the hill cipher .

You might also like