Professional Documents
Culture Documents
RBL Set 2
RBL Set 2
Problem statement
Outline of the proposed solution/model with a neat block diagram
Brief description of the modules of the proposed solution/model
Problem Statement
With the advancement in technology, threats has increased. Image is an important data type
which is often used in banking system, protection and security system.
Image need to be secured due to the confidential data they contain from numerous threats
and attacks.
As information technology becomes more widespread, security has become much more
important.
Since, Digital images have become an foremost medium for communications, researchers
have developed a variety of technologies to keep images safe.
Image Encryption and Decryption
Image encryption and decryption is a technique which help to provide security to our digital or visual
informal.
It is a process to encrypt the image by converting into bits and then decrypt the bits into visual image
by public or private key.
It helps to block the holes and provide security from third party to read the data.
Proposed Model
Chaos behaviours
Determinism- A system that predetermined by the initial values
Long Term Prediction
Hash Function
A hash function takes a group of characters (called a key) and maps it to a value of a certain length
(called a hash value or hash).
Efficience of Opération
Hash Function used:
MD5
SHA256
Library Used