Abstract: A multi-layered encryption security system (100) incorporating AES-256, RSA-2048, ECC, and XOR-based key splitting to enhance data security is provided. A Fourier Transform-based watermarking mechanism ensures data integrity, while an unauthorized access detection system prevents breaches in real-time. The multi-language key encoding technique improves compatibility, and the automatic key storage system secures cryptographic keys efficiently. This system offers a robust, scalable, and adaptable security solution for various applications.
Description:MULTI-LAYERED ENCRYPTION SECURITY SYSTEM AND METHOD THEREOF
BACKGROUND
Technical Field
[0001] The embodiment herein generally relates to security systems and more particularly, to a multi-layered encryption security system and method thereof.
Description of the Related Art
[0002] Traditional encryption systems rely on a single method of encryption, making them vulnerable to emerging cryptographic attacks. Current security frameworks lack real-time unauthorized access detection and efficient key management solutions.
[0003] Accordingly, there remains a need for a multi-layered encryption security system and method thereof.
SUMMARY
[0004] In view of the foregoing, embodiments herein provide a multi-layered encryption security system. An AES-256 encryption module configured to generate a session-specific encryption key. An RSA-2048 and ECC key management module configured to secure transmission and storage of said AES key. An XOR-based key splitting module configured to divide the AES key into multiple independent shares, wherein reconstruction of the original AES key requires all shares. A Fourier transform watermarking module configured to embed an encrypted representation of said AES key within the frequency domain of a cover image. An unauthorized access detection module configured to verify an input decryption key against the stored AES key, and, upon detecting a mismatch, to generate and output a randomized noise image in place of the encrypted image. A session control module configured to generate a unique five-digit session key for associating sender and receiver during image transfer. The system prevents unauthorized parties from recovering any portion of the encrypted image content or embedded key without both the correct AES key and the session key.
[0005] According to some embodiments herein, if the key is invalid, noise image is shown and access is denied.
[0006] According to some embodiments herein, the unique session key (random string) is generated to tag the encryption session.
[0007] According to some embodiments herein, the sender manually or automatically sends the stego image and the session key.
[0008] According to some embodiments herein, the receiver uploads the stego image and enters the session key.
[0009] According to some embodiments herein, loads corresponding files.
[00010] According to some embodiments herein, extracts AES key from the image.
[00011] According to some embodiments herein, uploaded image becomes the base in which encrypted data will be hidden securely.
[00012] In an aspect herein provides a method for secure image encryption and unauthorized access detection. The method includes generating an AES-256 encryption key for a given session. The method includes generating RSA-2048 and ECC key pairs to secure storage and transmission of said AES key. The method includes splitting the AES key into three independent XOR shares. The method includes encoding the AES key into a multi-language representation for obfuscation. The method includes applying a Fourier transform to a cover image and embedding an encrypted watermark corresponding to the AES key within its frequency spectrum. The method includes generating a unique five-digit session key to link sender and receiver. The method includes receiving, at decryption, an input key and validating it against the stored AES key. When the key is valid, reconstructing the watermarked image via inverse Fourier transform. When the key is invalid, discarding the encrypted data and generating a noise image to prevent leakage of the original content.
[00013] These and other aspects of the embodiments herein will be better appreciated and understood when considered in conjunction with the following description and the accompanying drawings. It should be understood, however, that the following descriptions, while indicating preferred embodiments and numerous specific details thereof, are given by way of illustration and not of limitation. Many changes and modifications may be made within the scope of the embodiments herein, and the embodiments herein include all such modifications.
BRIEF DESCRIPTION OF THE DRAWINGS
[00014] The embodiments herein will be better understood from the following detailed description with reference to the drawings, in which:
[00015] FIG. 1 illustrates hardware components of a multi-layered encryption security system, according to some embodiments herein; and
[00016] FIG. 2 illustrates a flow chart shows a method for providing a multi-layered encryption security system, according to some embodiments herein.
DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS
[00017] The embodiments herein and the various features and advantageous details thereof are explained more fully with reference to the non-limiting embodiments that are illustrated in the accompanying drawings and detailed in the following description. Descriptions of well-known components and processing techniques are omitted so as to not unnecessarily obscure the embodiments herein. The examples used herein are intended merely to facilitate an understanding of ways in which the embodiments herein may be practiced and to further enable those of skill in the art to practice the embodiments herein. Accordingly, the examples should not be construed as limiting the scope of the embodiments herein.
[00018] As mentioned, there remains a need for a multi-layered encryption security system and method thereof. Referring now to the drawings, and more particularly to FIGs. 1 through 2, where similar reference characters denote corresponding features consistently throughout the figures, there are shown preferred embodiments.
[00019] FIG. 1 illustrates hardware components of a multi-layered encryption security system, according to some embodiments herein. The system 100 includes a sender and a receiver. The sender and the receiver includes a memory (102A-102B), at least one processor (104A-104B), a controller (106A-106B), configured with the memory (102A-102B) and the at least processor (104A-104B). The controller (106A-106B) is configured to generate a 256-bit AES (Advanced Encryption Standard) key for one or more images. The controller (106A-106B) is further configured to embed timestamp along with the AES key in a watermark before encoding to preserve context. The controller (106A-106B) is configured to provide ECC for mutual agreement on key security between sender and receiver. The controller (106A-106B) is configured to combine the AES with asymmetric encryption (RSA and ECC).
[00020] The controller (106A-106B) is configured to split the AES key using the XOR method, wherein the AES key is only reconstructable when all translations are reversed correctly. The controller (106A-106B) is configured to receive the one or more image from the sender. The controller (106A-106B) is configured to validate the entered key by the user, if the user has entered a wrong key, the controller does not reveal the actual image, instead, the controller generates and displays a noise image. After receiving the image, the receiver enters the session key via Gradio. The controller (106A-106B) is configured to extracts the watermark from the image's frequency domain, wherein the AES key is reconstructed and the original image is decrypted and shown.
[00021] According to some embodiments herein, if the key is invalid, noise image is shown and access is denied. The unique session key (random string) is generated to tag the encryption session. The sender manually or automatically sends the stego image and the session key. The receiver uploads the stego image and enters the session key. Loads corresponding files.
[00022] According to some embodiments herein, extracts AES key from the image. According to some embodiments herein, uploaded image becomes the base in which encrypted data will be hidden securely.
[00023] This system ensures multi-layered secure transmission of images using a hybrid of cryptography and steganography techniques. Below is an explanation of how each security layer is incorporated: AES-256 (CFB mode). Encrypts sensitive key data for steganography embedding. AES key is also used to encrypt timestamps for image traceability. Used to encrypt AES key for asymmetric security. Ensures the AES key isn’t exposed directly during transmission.
[00024] ECC Encryption (Simulated): Key exchange alternative using elliptic curves. Adds complexity and diversity to encryption layers. XOR Key Splitting where AES key is split into two parts using XOR. Neither part alone is useful to decrypt content, adding tamper resistance.
[00025] AES key (encoded and timestamped) is embedded into frequency domain of the image. Reduces visibility and increases resistance to tampering. Watermark Decryption & Validation on receiver side, Fourier components are analyzed to recover the AES key and watermark. Validated to ensure the image is authentic and not altered. Noise Image Generation, If watermark/AES key is tampered with or incorrect session key is used, a visually distorted image is generated. Prevents attackers from gaining clues from partial decryption.
[00026] Multi-language Key Obfuscation, the AES key is obfuscated using base64 and reversed strings in 7 different language styles randomly. This adds a linguistic obfuscation layer to confuse attackers. Session Key Authentication each transmission uses a 4-digit to 32-character session key. Access to the encrypted image is only possible through the correct session key.
[00027] The multi-layered encryption security system incorporating: AES-256 for symmetric encryption, RSA-2048 for asymmetric encryption, ECC (Elliptic Curve Cryptography) for enhanced security, XOR-based key splitting to increase complexity, Fourier Transform-based watermarking for data integrity verification, a real-time unauthorised access detection mechanism, Multi-language key encoding for enhanced compatibility, an automatic key storage and retrieval system.
[00028] This system ensures robust data security, reduces unauthorized access risks, and enhances data confidentiality and integrity. Use of a multi-layer encryption scheme combining AES-256, RSA-2048, ECC, and XOR-based key splitting. Implementation of Fourier Transform-based watermarking in cryptographic systems. Automatic key storage and retrieval mechanisms integrated within security systems. Real-time unauthorized access detection incorporated into an encryption framework.
[00029] The system provides a multi-layered encryption security system incorporating AES-256, RSA-2048, ECC, and XOR-based key splitting to enhance data security. A Fourier Transform-based watermarking mechanism ensures data integrity, while an unauthorized access detection system prevents breaches in real-time. The multi-language key encoding technique improves compatibility, and the automatic key storage system secures cryptographic keys efficiently. This system offers a robust, scalable, and adaptable security solution for various applications, including cloud security, IoT devices, and enterprise-level data protection.
[00030] FIG. 2 illustrates a flow chart shows a method 200 for providing a multi-layered encryption security system, according to some embodiments herein. At step 202, the method 200 includes generating an AES-256 encryption key for a given session. At step 204, the method 200 includes generating RSA-2048 and ECC key pairs to secure storage and transmission of said AES key. At step 206, the method 200 includes splitting the AES key into three independent XOR shares. At step 208, the method 200 includes encoding the AES key into a multi-language representation for obfuscation. At step 210, the method 200 includes applying a Fourier transform to a cover image and embedding an encrypted watermark corresponding to the AES key within its frequency spectrum. At step 212, the method 200 includes generating a unique five-digit session key to link sender and receiver. At step 214, the method 200 includes receiving, at decryption, an input key and validating it against the stored AES key. When the key is valid, reconstructing the watermarked image via inverse Fourier transform. When the key is invalid, discarding the encrypted data and generating a noise image to prevent leakage of the original content.
[00031] An advantage of the system 100 is that the system 100 provides higher security due to multi-layered encryption.
[00032] An advantage of the system 100 is that the system 100 provides real-time unauthorized access detection.
[00033] An advantage of the system 100 is that the system 100 provides improved data integrity through Fourier Transform-based watermarking.
[00034] An advantage of the system 100 is that the system 100 provides efficient key management via automatic key storage and retrieval.
[00035] An advantage of the system 100 is that the system 100 provides cross-platform compatibility with multi-language key encoding.
[0001] The foregoing description of the specific embodiments will so fully reveal the general nature of the embodiments herein that others can, by applying current knowledge, readily modify and/or adapt for various applications such specific embodiments without departing from the generic concept, and, therefore, such adaptations and modifications should and are intended to be comprehended within the meaning and range of equivalents of the disclosed embodiments. It is to be understood that the phraseology or terminology employed herein is for the purpose of description and not of limitation. Therefore, while the embodiments herein have been described in terms of preferred embodiments, those skilled in the art will recognize that the embodiments herein can be practised with modification within the scope of the appended claims.
, Claims:1. A multi-layered encryption security system comprising:
an AES-256 encryption module configured to generate a session-specific encryption key;
an RSA-2048 and ECC key management module configured to secure transmission and storage of said AES key;
an XOR-based key splitting module configured to divide the AES key into multiple independent shares, wherein reconstruction of the original AES key requires all shares;
a Fourier transform watermarking module configured to embed an encrypted representation of said AES key within the frequency domain of a cover image;
an unauthorized access detection module configured to verify an input decryption key against the stored AES key, and, upon detecting a mismatch, to generate and output a randomized noise image in place of the encrypted image; and
a session control module configured to generate a unique five-digit session key for associating sender and receiver during image transfer,
wherein the system prevents unauthorized parties from recovering any portion of the encrypted image content or embedded key without both the correct AES key and the session key.
2. The system as claimed in claim 1, wherein if the key is invalid, noise image is shown and access is denied.
3. The system as claimed in claim 1, wherein the unique session key (random string) is generated to tag the encryption session.
4. The system as claimed in claim 1, wherein the sender manually or automatically sends the stego image and the session key.
5. The system as claimed in claim 1, wherein the receiver uploads the stego image and enters the session key.
6. The system as claimed in claim 1, wherein loads corresponding files.
7. The system as claimed in claim 1, wherein extracts AES key from the image.
8. The system as claimed in claim 1, wherein uploaded image becomes the base in which encrypted data will be hidden securely.
9. A method for secure image encryption and unauthorized access detection, comprising:
generating an AES-256 encryption key for a given session;
generating RSA-2048 and ECC key pairs to secure storage and transmission of said AES key;
splitting the AES key into three independent XOR shares;
encoding the AES key into a multi-language representation for obfuscation;
applying a Fourier transform to a cover image and embedding an encrypted watermark corresponding to the AES key within its frequency spectrum;
generating a unique five-digit session key to link sender and receiver;
receiving, at decryption, an input key and validating it against the stored AES key;
when the key is valid, reconstructing the watermarked image via inverse Fourier transform; and
when the key is invalid, discarding the encrypted data and generating a noise image to prevent leakage of the original content.
| # | Name | Date |
|---|---|---|
| 1 | 202521102213-STATEMENT OF UNDERTAKING (FORM 3) [23-10-2025(online)].pdf | 2025-10-23 |
| 2 | 202521102213-REQUEST FOR EARLY PUBLICATION(FORM-9) [23-10-2025(online)].pdf | 2025-10-23 |
| 3 | 202521102213-POWER OF AUTHORITY [23-10-2025(online)].pdf | 2025-10-23 |
| 4 | 202521102213-MSME CERTIFICATE [23-10-2025(online)].pdf | 2025-10-23 |
| 5 | 202521102213-FORM28 [23-10-2025(online)].pdf | 2025-10-23 |
| 6 | 202521102213-FORM-9 [23-10-2025(online)].pdf | 2025-10-23 |
| 7 | 202521102213-FORM-8 [23-10-2025(online)].pdf | 2025-10-23 |
| 8 | 202521102213-FORM FOR SMALL ENTITY(FORM-28) [23-10-2025(online)].pdf | 2025-10-23 |
| 9 | 202521102213-FORM FOR SMALL ENTITY [23-10-2025(online)].pdf | 2025-10-23 |
| 10 | 202521102213-FORM 18A [23-10-2025(online)].pdf | 2025-10-23 |
| 11 | 202521102213-FORM 1 [23-10-2025(online)].pdf | 2025-10-23 |
| 12 | 202521102213-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [23-10-2025(online)].pdf | 2025-10-23 |
| 13 | 202521102213-EVIDENCE FOR REGISTRATION UNDER SSI [23-10-2025(online)].pdf | 2025-10-23 |
| 14 | 202521102213-DRAWINGS [23-10-2025(online)].pdf | 2025-10-23 |
| 15 | 202521102213-COMPLETE SPECIFICATION [23-10-2025(online)].pdf | 2025-10-23 |
| 16 | Abstract.jpg | 2025-11-11 |