I want a working model. Please check the project description. It should run on kali using any virtual machine preferable VMware
Implementation Of Image Encryption CSCI 5742: Cyber Programming and Analysis – Project Proposal Spring 2023 Introduction :Comment by Jafarian, Haadi: Remove these in your final document. The need to protect the privacy and security of photographs in the modern digital era is what motivates the development of image encryption. Image encryption is more crucial than ever for protecting sensitive data and preserving secrecy in view of the increasing importance of digital privacy. Although there has been a lot of study done on image encryption, there is still a gap in the literature. Specifically, there is a need for more advanced encryption methods that are capable of handling the expanding size and complexity of image data as well as the rising need for real-time image encryption. To overcome this gap, our proposed approach aims to design a novel image encryption technique that combines the strengths of existing systems while eliminating their limitations. As part of our strategy, we'll employ symmetric, asymmetric, and homomorphic encryption. ways to preserve efficiency and real-time capabilities while offering a high level of security. Cybersecurity practitioners and researchers could benefit from our proposed work by having access to a more efficient and effective picture encryption technique that can handle the rising complexity of images and the demand for real-time encryption. Our method might be applied to a number of situations, including safeguarding private images, private business information, or intellectual property rights. Our research may progress image encryption and improve online privacy and security by filling a knowledge gap in the literature. Related Works: The preceding studies in our literature review offer insightful information and expertise about the state of picture encryption algorithms today. The research and methods covered in these papers can be used to guide the creation of our telemedicine project for picture encryption. For instance, the study by Kaur and Kumar (2018) offers a thorough analysis of different image encryption algorithms and their advantages and disadvantages. This can assist us in deciding which encryption algorithm is best for our project. An image encryption method based on the Arnold transform is presented in the publication by Alsaffar et al. (2020), which can be utilized as a reference implementation for our research. Insights into homomorphic encryption are provided in the Munjal and Bhatia work (2022), which can be utilized to build secure data communication methods for images used in medicine. Lastly, the quantum logistic image encryption algorithm based on SHA-3 and RSA is suggested in the study by Ye et al. (2021) and can offer a greater level of security for picture encryption. Although if quantum computing is not a part of our project, the approaches and insights presented in this work can help us better comprehend more complex encryption strategies and even spur the creation of brand-new encryption algorithms. Overall, the articles referenced in our literature research offer insightful information and wisdom that we may use to guide the design and advancement of our telemedicine image encryption project. References: M.Kaur & V. Kumar . 24th November 2018. A Comprehensive Review on Image Encryptions Techniques. Publisher: Springer Retrieved from URL: https://link.springer.com/article/10.1007/s11831-018-9298-8 DM. Alsaffar, AS.Almutiri , B. Aqahtani, RM. Alamri, HF. Alqahtani, NN. Alqahtani, GM. Alshammari, AA.Ali. 21st March 2020. Publisher: IEEE Retrieved from URL: https://ieeexplore.ieee.org/abstract/document/9096809/authors#authors K.Munjal & R.Bhatia. A systematic review of homomorphic encryption and its contribution in healthcare industry. 03rd May 2022. Publisher: Springer Retrieved for URL: https://link.springer.com/article/10.1007/s40747-022-00756-z Project Description – Goals, Methods, Platforms : Our image encryption project's goal is to create an encryption method that strengthens existing methods while fixing their flaws. To provide a high level of security while preserving effectiveness and real-time performance, our method will specifically combine symmetric, asymmetric, and homomorphic encryption algorithms. We shall use the following strategies to accomplish this objective: 1. Data Preprocessing: Any metadata or identifying information that could jeopardize the security of the image will be removed from the photographs through preprocessing. This will be accomplished by converting the image to a raw format and eliminating any extraneous data. 2. Symmetric Encryption: To encrypt the image, we'll use a symmetric encryption algorithm, like the Advanced Encryption Standard (AES). This method will offer a high level of efficiency and security. 3. Asymmetric Encryption: The symmetric key used in step 2 will be encrypted using an asymmetric encryption algorithm, such as the RSA algorithm. To use this method will add an extra layer of safety. 4. Homomorphic Encryption: To enable real-time encryption and decryption of the image, we will use a homomorphic encryption algorithm. This approach removes the need to fully decrypt the image in order to allow authorized persons to access it. We shall use the following platforms forproject's development: · Python will be used as the primary programming language for creating the encryption system. The popular and flexible programming language Python offers a wide range of frameworks and tools for encryption and image processing. · Running program: We'll use a Linux-based operating system to construct the system as it provides a high degree of security and adaptability. · Frameworks & Libraries: We'll use a range of libraries and frameworks for image processing and encryption, including PyCryptodome for encryption and OpenCV for image processing. As a result, the objective of our Image Encryption project is to combine symmetric, asymmetric, and homomorphic techniques to develop a novel encryption method. The project will be created using Python, a Linux-based operating system, and a number of image processing and encryption modules and frameworks. Our expected outputs include a workable prototype, a technical report, and a research article. Story Board : By adding an additional degree of security for sensitive patient data, such as medical images, image encryption can be helpful in the medical industry. Medical photos contain sensitive and private information that must be kept private and are frequently used to diagnose and treat patients. Doctors can secure patient data from illegal access, hacking, and other security flaws by encrypting medical images. Patient data is kept private because encrypted photos can only be seen by authorized individuals who have the right decryption key. Image encryption can increase the speed and accuracy of medical diagnostics in addition to supplying security. Medical practitioners and institutions can securely send encrypted photos, enabling collaborative diagnosis and treatment plans without compromising patient confidentiality. Patients who need to consult with specialists or receive care at various facilities may find this to be of particular benefit. Overall, picture encryption can benefit both patients and medical professionals by protecting the confidentiality of patient information, enhancing the effectiveness and precision of medical diagnosis, and offering a high level of protection for sensitive patient data. Project Timeline: February 24th March 24th April 24th May 1st Research & Planning Implementation System Development Testing & Debugging Feedback, Update & Submission References : G.Ye , K.Jiao & X.Huang. 09th April 2021 . Quantum Logistic image encryption algorithm based on SHA-3 and RSA. Publisher: Springer Retrieved from URL: https://link.springer.com/article/10.1007/s11071-021-06422-2 The authors suggest a brand-new RSA and SHA-3 combined quantum logistic picture encryption scheme. In contrast to the conventional picture encryption methods' shortcomings, quantum computing may offer a more secure option, according to the article. The suggested approach creates a logistic map from a chaotic map, then further encrypts the picture data using an S-box. In order to increase the encryption process' security, the authors also make use of the Grover search technique and quantum key distribution. M.Kaur & V. Kumar . 24th November 2018. A Comprehensive Review on Image Encryptions Techniques. Publisher: Springer Retrieved from URL: https://link.springer.com/article/10.1007/s11831-018-9298-8 The authors give a summary of numerous image encryption methods, including both traditional and contemporary techniques. The paper analyzes the benefits and drawbacks of each strategy and emphasizes the need of picking the right encryption technique based on the particular requirements of the application. DM. Alsaffar, AS.Almutiri , B. Aqahtani, RM. Alamri, HF. Alqahtani, NN. Alqahtani, GM. Alshammari, AA.Ali. 21st March 2020. Publisher: IEEE Retrieved from URL: https://ieeexplore.ieee.org/abstract/document/9096809/authors#authors The authors evaluate various picture encryption strategies, including conventional and cutting-edge ones, and compare their advantages and disadvantages. The obstacles and potential paths for future study in the area of picture encryption are also covered in the paper. K.Munjal & R.Bhatia. A systematic review of homomorphic encryption and its contribution in healthcare industry. 03rd May 2022. Publisher: Springer Retrieved for URL: https://link.springer.com/article/10.1007/s40747-022-00756-z The authors concentrate on the use of homomorphic encryption in the medical field. The use of homomorphic encryption in healthcare is discussed in the study along with its potential advantages, including maintaining data confidentiality and privacy while yet enabling data analysis. The constraints and difficulties of adopting homomorphic encryption in the healthcare industry are highlighted by the authors as they assess the state of the research in the area. Compared to our proposed project, Ye et alwork .'s focuses on quantum logistic picture encryption, whereas our proposal aims to build a secure and efficient image encryption algorithm for use in telemedicine. Instead of using quantum computing concepts, our study focuses on improving conventional encryption techniques to meet the demands of the medical industry. Moreover, Ye et alapproach .'s does not directly address the difficulties of securely and promptly delivering huge medical image files, which are addressed in our proposed work. Overall, both papers expand picture encryption methods, although they take distinct approaches to the issue and have different objectives in mind. Final Project - Description: Cybersecurity Programming and Analysis 2/20/23, 11:20 PMFinal Project - Description: Cybersecurity Programming and Analysis Page 1 of 3https://ucdenver.instructure.com/courses/511396/pages/final-project-description?wrap=1 Final Project - Description Final Project Description Project Goal: The goal is to create a tool for cybersecurity operations, analysis, or security awareness training. Cybersecurity professionals should be able to use this tool, and as such, must be fully professional, with appropriate help screens. If mirroring a tool that already exists, you must add some significant value to some portion of the tool. You can use C, C++, Java, python, ruby, bash, PowerShell, etc. or any other languages should be documented and then approved in your proposal. This tool must be specifically developed for this course, and submitting a project used for other courses is considered plagiarism. The tool must have significant novel contributions that differentiate it from any other existing tool. Submitting somebody else's work or submitting a project with minor modifications to an existing code is not acceptable as a final project. Tool Operations: The tool must work on either (or at least) Kali Linux 2020.2 or higher or Windows 10 or higher. It must have a setup file that requires only a single command or double click. All required libraries or dependencies must be included in the installation folder (not requiring an internet connection). It may be a command-line interface tool or a graphical tool. If a command-line tool, you should document the switches in a standard way (like –help or -? etc.) Both source code and executable object code must be submitted. It may be a front end to an existing tool but it must add something valuable to the operations. You may use hardware like raspberry pi, but forewarning: Hardware often depends on drivers, which are not always available on all mobile platforms. If you are trying to capture wireless data, you must have a network card that can be put in “promiscuous” mode. If you put in a full effort and have a roadblock like a network card or a configuration that is “broken” by patches, of a website that stops letting you scrape it, etc., all is not lost! Turn your presentation into a detailed lesson learned…sometimes failure after a lot of effort is worth more than success. Refer to the [*] Choosing Potential Final Project Topic: Start here (https://ucdenver.instructure.com/courses/511396/discussion_topics/1719632?wrap=1) for some project directions and ideas. What you need to deliver: First, a Proposal: Your proposal must describe the goal of the project, the gap that it addresses, https://ucdenver.instructure.com/courses/511396/discussion_topics/1719632?wrap=1 2/20/23, 11:20 PMFinal Project - Description: Cybersecurity Programming and Analysis Page 2 of 3https://ucdenver.instructure.com/courses/511396/pages/final-project-description?wrap=1 First, a Proposal: Your proposal must describe the goal of the project, the gap that it addresses, specifications (programming language, OS, other parameters), milestones, and timelines. It should also provide a basic "storyboard" of at least one use case. (Python, Ruby, C++, C, Java, bash script, web server, mysql database…others require approval). Use this template (https://ucdenver.instructure.com/courses/511396/files/18739248?wrap=1) (https://ucdenver.instructure.com/courses/511396/files/18739248/download?download_frd=1) for your proposal. For the Final Project Submission, you need to deliver the following items: Video: You must take a 5-minute video demonstrating cool parts of your project working, demonstrating menus and help etc. Upload to youtube or any other video platform for viewing. Add the link to your Readme.txt and also submit it using the given submission link on Canvas. Just an amateur phone video is probably ok if you can see the product. Readme.txt: You will have a readme.txt file that clearly gives a program description, setup directions, usage, and appropriate examples. Also, document major components/ideas from other sources' e.g, this project