Image Encryption and Decryption Using XOR operator

Main Article Content

G. Rajasekher Reddy, P. Lakshmi Vradhan Reddy, S. Vishnu Priya, P. Anusha Reddy, K. Srinivas

Abstract

Images can be encrypted and contain critical information, just like text. You can employ encryption algorithms such as logistic chaotic maps, RSA (Rivest-Shamir-Adleman), DES (Data Encryption Standard), AES (Advanced Encryption Standard), or even basic scan and XOR-based algorithms. Here is a brief explanation of how XORbased image encryption works and how to scan. The original image is divided into a particular number of blocks. shuffled using scan patterns to generate a new image. Each block’s pixels are moved once more. The freshly created image is encrypted using XOR algorithms. Two random blocks from the rearranged image are XORed with each block. A single 128-bit secure key is produced. The designated receiver receives this key, and decryption is carried out. The photos must be encrypted such that they cannot be decrypted without a secure key, even if they are accessed arbitrarily online. You would learn the fundamentals of cybersecurity and hone your cryptography abilities with this assignment.

Article Details

Section
Articles