Inzomia image encrypt

Table of Contents

1. Getting started
Why encrypting images
Downloading and installing
Trial version and registered version
2. Using the Inzomia image viewer
Encrypting images
Viewing encrypted images
Decrypting images
3. Ordering
4. Contact
A. Encryption algorithms

Chapter 1. Getting started

Why encrypting images

There is a very high likelihood that someone is looking at you photos, do YOU want that? Computers are vulnerable newly found breaches in windows, web browser and other software is discovered almost on a daily basis. People can get access to your photos for example by hacking, a virus, vlan, shared folders or simply by using the same computer as you.

By encrypting your photos with image encrypt you make sure it is you that decide who sees your photos. Encrypting images help you protect your privacy and secure company secrets. Viewing encrypted images is just as easy as viewing normal images with the inzomia image viewer.

Some Features:

  • Protects privacy.
  • Easy to use.
  • Automatically decrypts photos before viewing ( provided you have the key )
  • Safe, Keeps track of the key id used for encyption eliminating the risk to ruin files by encrypting twice.
  • Integration with inzomia image viewer.
  • Uses the secure TwoFish algorithm.
  • Gives a meaningful error message when the wrong key is used.

Downloading and installing

You can always get the latest version of the Inzomia image encryptor software at After downloading the latest version run the installer program and follow the on screen instructions.

Trial version and registered version

The inzomia image encryptor is available in a trial version and a registered version. The trial version can be used to encrypt up to 200 images and decrypt an Unlimited number of images. There is no time limit on the trial version, you will always be able to decrypt images you have encrypted.

The registered version can be used to encrypt and decrypt as many images as you want. The registered version also offer stronger security by supporting longer encryption keys. Buy the full version of inzomia image encrypt from our home page http:/

Encrypted images can be viewed directly in the Inzomia image viewer provided you have access to the key for the encrypted image. The free version as well as the full version of the image viewer support decryption. Get the latest version of the Inzomia image viewer from

Chapter 2. Using the Inzomia image viewer

Encrypting images

Encrypting an image

Start Inzomia image encryptor and click the "Protect images, encrypt" link.

Creating a key

Click "Create a short key" to create a short encryption key. You will be promted with a save file dialog to select where to keep your key.

The registered version also support longer encryption keys for improved safety and the ability to set a personal password to add further protection if the encryption key should be stolen.

An encryption key is a small file containing the code needed to scramble and unscramble a photo. Image encrypt uses the TwoFish algorithm for encryption which no one has been able to crack as of yet. The weakness of all encryption is the actual encryption key. Make sure no one but you can access the key and keep it at a safe place. If you lose your key there is no way to get back the files locked by the key. If you have a memory stick a good idea might be to keep the key on the stick.

When you decide to encrypt more images you can use the same key you used before. The only reason to use more than one keys is if you want to share encrypted images. If you only want to protect images on your computer stick to one key.

Selecting files

Click "Select files" to select the files you want to encrypt. You will be prompted with a open file dialog to select the files to encrypt.

Select more than one file by holding down the shift key to select a range of image files or hold down the ctrl key to add images to the current selection.

The files will be encrypted in-place i.e. replacing the previous file with the encrypted file making them unreadable for everyone that don't have access to the key you used.


You have now protected the images.

The only way to view them is by decrypting them or load the images into Inzomia image viewer, provided you have the encryption key. If something went wrong you might want to read the generated report or if you need to keep a record of all encrypted images.

Viewing encrypted images

The simplest way to view an encrypted image and still have it encrypted is to use the Inzomia image viewer. If you do not have it already download the program from

The Inzomia image viewer encrypts the image in memory as you are viewing it making sure the decrypted image is never decrypted on disk. When you load an encrypted image into the image viewer a dialog will be displayed where you need to enter the path to where your key is. During the run of the program the viewer will keep track of used keys. If an image is loaded that is encrypted with a previously used key you will not need to enter its path again.

Viewing encrypted image with Inzomia image viewer 3

Decrypting images

Inzomia image viewer start page

From the Inzomia image encrypt start page select "Remove protection from images, decrypt"

select key

Select the key to use for decryption.

If a password was set when creating the encryption key you need to provide that password. The trial version can not create keys with passwords but you can decrypt photos encrypted with keys that have a password in the trial version.

select files

Select the files you want to decrypt. You will be prompted with a open file dialog to select the files to encrypt.

Select more than one file by holding down the shift key to select a range of image files or hold down the ctrl key to add images to the current selection.

files decrypted

The files have now been decrypted. If something went wrong make sure to read the report.

Chapter 3. Ordering

Order Inzomia image encrypt online from

Chapter 4. Contact

Product home page:

Discussion forum:


Maple & Star AB

Bandstolsv 20

S-75648 Uppsala


Support Email:

Sales inquiries:

Email your bugs or suggestions to When reporting bugs please make sure that you write how to reproduce the problem and include your email address.

Appendix A. Encryption algorithms


DES stands for Data Encryption Standard. It has a key length of 56 bits and there are custom hardware designed to crack DES encryption in a few hours. Image Encrypt does not use DES


The TwoFish encryption algorithm is used in image encrypt. It is faster than DES and it is safer. It is a relatively new algorithm and believed to be better than BlowFish, another common encryption algorithm. The TwoFish algorithm can use 128 bit or 256 bit encryption.