images carry sensitive information and can be encrypted. You can use encryption algorithms like AES (Advanced Encryption Standard), DES (Data Encryption Standard), RSA (Rivest-Shamir-Adleman), logistic chaotic maps, or even simple scan and XOR-based algorithms. Here’s a quick overview of how to scan and XOR-based image encryption takes place:
The original image is divided into a specific number of blocks shuffled by scan patterns to build a new image.
Pixels of each block are repositioned again.
The newly generated image uses XOR functions for encryption. All the blocks are XORed with two arbitrary blocks from the re-arranged image.
A single, secure key of 128 bits is generated. This key is shared with the intended recipient and decryption is performed.
The images must be encrypted in such a way that even with arbitrary access to them via the internet, the image must not be decryptable without a secure key.
solving errors and make it more user friendly..
Discussion