Dissertation
Dissertation > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > General issues > Security and confidentiality > Encryption and decryption

Realization of Image Encryption Using DES and MD5

Author WISAM HAMIDAH
Tutor ChenHao
School Hunan University
Course Computer Science and Technology
Keywords Image Encryption DES MD5 Internet security
CLC TP309.7
Type Master's thesis
Year 2012
Downloads 2
Quotes 0
Download Dissertation

A method of image encryption and decryption is proposed for optical security systems. A phase-coded image to be encrypted together with a random phase pattern is Fourier transformed and the result of the complex-valued data is used as an encrypted pattern. The decryption is simply performed by an inverse-Fourier transform for the addition of the encrypted pattern and the Fourier transform of the random phase. The intensity of the inverse-Fourier transformed image gives the exact result for the decryption. Further, The binarization of the encrypted pattern is performed for the easiness of the optical and electronic readout of the images, And it also gives rise to the enhancement of the degree of security for the encryption. The binary pattern is optimized by a statistical iteration technique and an excellent decryption image is obtained by the optimization.The selective application of technological and related procedural safeguards is an important responsibility of every Federal organization in providing adequate security to its electronic data systems. Protection of data during transmission or while in storage may be necessary to maintain the confidentiality and integrity of the information represented by the data. The algorithm uniquely defines the mathematical steps required to transform data into a cryptographic cipher and also to transform the cipher back to the original form. The Data Encryption Standard (DES) is being made available for use by Federal agencies within the context of a total security program consisting of physical security procedures.With the development of computer technology, Networking has become the work, Connection with friends, Learning and a major form of entertainment of people’s lives, Which have been unable to leave the network. With the sophisticated network technology, Information people received is not just characters, But much more like:Pictures, Sounds and other forms of information. Some of transmission information among people is required to be kept secret, or have the appropriate permissions for the user to use. Because the shortcomings and unreasonable design of the elements of Network, These factors will cause useful information illegally to be accessed and used, Which would bring loss the reputation or economic of users. This kind of information will be encrypted transmission undoubtedly, Which gives users the protection of confidential information. Because picture information represents a significant proportion of information in the network,The design included in this Thesis and a project designed under the development of (VC++6.0). The graduation Thesis researches the algorithm steps of using the (Message Digest) MD5and DES encryption image. Firstly transform the size of the image without losing any important information/data of the picture, And then use the key to transform the image pixels, Allowing that the user who does not have the correct password should not view the picture content to ensure the maximum security at time of transmission. The (VC++6.0) project is designed to make the implementation of Encryption on BMP images format JPEG, PCX and other five formats Images conversion to BMP, Then increasing the variety of formats on the scope of application of image. However, Because the image has a larger volume of data, How to design effective algorithms express high-speed encryption and decryption is the focus of the study in the future.

Related Dissertations
More Dissertations