Back

Decrypt Image

Upload the ZIP file generated during encryption, along with the correct key and Initialization Vector (IV).

The application will:
1. Recombine the three image fragments into the original modified image
2. Use the provided key and IV to decrypt and extract the hidden message

If the key or IV is incorrect, reconstruction or decryption will fail.


No file selected



i