SlideShare a Scribd company logo
M.Phil Computer Science Cryptography Projects
Web : www.kasanpro.com Email : sales@kasanpro.com
List Link : http://kasanpro.com/projects-list/m-phil-computer-science-cryptography-projects
Title :Robust Video Data Hiding using Forbidden Zone Data Hiding and Selective Embedding
Language : C#
Project Link :
http://kasanpro.com/p/c-sharp/robust-video-data-hiding-forbidden-zone-data-hiding-selective-embedding
Abstract : Video data hiding is still an important research topic due to the design complexities involved. We propose
a new video data hiding method that makes use of erasure correction capa- bility of repeat accumulate codes and
superiority of forbidden zone data hiding. Selective embedding is utilized in the proposed method to determine host
signal samples suitable for data hiding. This method also contains a temporal synchronization scheme in order to
withstand frame drop and insert attacks. The proposed framework is tested by typical broadcast material against
MPEG- 2, H.264 compression, frame-rate conversion attacks, as well as other well-known video data hiding methods.
The decoding error values are reported for typical system parameters. The simulation results indicate that the
framework can be successfully utilized in video data hiding applications.
Title :Differential Phase-Shift Quantum Key Distribution Systems
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/differential-phase-shift-quantum-key-distribution-system
Abstract : Differential phase-shift (DPS) quantum key distribution (QKD) is a unique QKD protocol that is different
from traditional ones, featuring simplicity and practicality. This paper overviews DPS-QKD systems.
Title :Differential Phase-Shift Quantum Key Distribution Systems
Language : Java
Project Link : http://kasanpro.com/p/java/differential-phase-shift-quantum-key-distribution-systems
Abstract : Differential phase-shift (DPS) quantum key distribution (QKD) is a unique QKD protocol that is different
from traditional ones, featuring simplicity and practicality. This paper overviews DPS-QKD systems.
Title :Safeguarding Quantum Key Distribution Through Detection Randomization
Language : Java
Project Link : http://kasanpro.com/p/java/safeguarding-quantum-key-distribution-through-detection-randomization
Abstract : We propose and experimentally demonstrate a scheme to render the detection apparatus of a quantum
key distribution system immune to the main classes of hacking attacks in which the eavesdropper explores the
back-door opened by the single-photon detectors. The countermeasure is based on the creation of modes that are not
deterministically accessible to the eavesdropper. We experimentally show that the use of beamsplitters and extra
single-photon detectors at the receiver station passively creates randomized spatial modes that erase any knowledge
the eavesdropper might have gained when using bright-light faked states. Additionally, we experimentally show a
detectorscrambling approach where the random selection of the detector used for each measurement--equivalent to
an active spatial mode randomization--hashes out the side-channel open by the detection efficiency mismatch-based
attacks. The proposed combined countermeasure represents a practical and readily implementable solution against
the main classes of quantum hacking attacks aimed on the single-photon detector so far, without intervening on the
inner working of the devices.
Title :Safeguarding Quantum Key Distribution Through Detection Randomization
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/quantum-key-distribution-safeguarding-through-detection-randomization
Abstract : We propose and experimentally demonstrate a scheme to render the detection apparatus of a quantum
key distribution system immune to the main classes of hacking attacks in which the eavesdropper explores the
back-door opened by the single-photon detectors. The countermeasure is based on the creation of modes that are not
deterministically accessible to the eavesdropper. We experimentally show that the use of beamsplitters and extra
single-photon detectors at the receiver station passively creates randomized spatial modes that erase any knowledge
the eavesdropper might have gained when using bright-light faked states. Additionally, we experimentally show a
detectorscrambling approach where the random selection of the detector used for each measurement--equivalent to
an active spatial mode randomization--hashes out the side-channel open by the detection efficiency mismatch-based
attacks. The proposed combined countermeasure represents a practical and readily implementable solution against
the main classes of quantum hacking attacks aimed on the single-photon detector so far, without intervening on the
inner working of the devices.
M.Phil Computer Science Cryptography Projects
Title :Postprocessing of the Oblivious Key in Quantum Private Query
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/postprocessing-oblivious-key-quantum-private-query
Abstract : Private query is a kind of cryptographic protocols to protect both users' privacies in their communication.
For instance, Alice wants to buy one item from Bob's database. The aim of private query is to ensure that Alice can
get only one item from Bob, and simultaneously, Bob cannot know which one was taken by Alice. In pursuing high
security and efficiency, some quantum private query protocols were proposed. As a practical model, Quantum-
Oblivious-Key-Transfer (QOKT)-based private query, which utilizes a QOKT protocol to distribute oblivious key
between Alice and Bob and then applies the key to achieve the aim of private query, has drawn much attention. Here,
we focus on postprocessing of the oblivious key, and the following two contributions are achieved. 1) We analyze
three recently proposed dilution methods and find two of them have serious security loophole. That is, Alice can
illegally obtain much additional information about Bob's database by multiple queries. For example, Alice can obtain
the whole database, which contains 104 items, by only 53.4 queries averagely. 2) We present an effective
error-correction method for the oblivious key, which can address the realistic scenario with channel noises and make
QOKT-based private query more practical.
Title :Postprocessing of the Oblivious Key in Quantum Private Query
Language : Java
Project Link : http://kasanpro.com/p/java/oblivious-key-postprocessing-quantum-private-query
Abstract : Private query is a kind of cryptographic protocols to protect both users' privacies in their communication.
For instance, Alice wants to buy one item from Bob's database. The aim of private query is to ensure that Alice can
get only one item from Bob, and simultaneously, Bob cannot know which one was taken by Alice. In pursuing high
security and efficiency, some quantum private query protocols were proposed. As a practical model, Quantum-
Oblivious-Key-Transfer (QOKT)-based private query, which utilizes a QOKT protocol to distribute oblivious key
between Alice and Bob and then applies the key to achieve the aim of private query, has drawn much attention. Here,
we focus on postprocessing of the oblivious key, and the following two contributions are achieved. 1) We analyze
three recently proposed dilution methods and find two of them have serious security loophole. That is, Alice can
illegally obtain much additional information about Bob's database by multiple queries. For example, Alice can obtain
the whole database, which contains 104 items, by only 53.4 queries averagely. 2) We present an effective
error-correction method for the oblivious key, which can address the realistic scenario with channel noises and make
QOKT-based private query more practical.
Title :Cryptography - Analysis of Enhanced Approach for Secure Online Exam Process Plan
Language : ASP.NET with VB
Project Link : http://kasanpro.com/p/asp-net-with-vb/secure-online-exam-process-plan
Abstract : To conduct the exam for thousand people offline process have several problems, to avoid those problems
with gone for the process online exam is a field that is very popular and made many security assurances. Even
though it fails to control cheating, online exams have not been widely adopted well, but online education is adopted
and using all over the world without any security issues. Education learning from online process not have any problem
and don't disturb to any one, through online test plan we need to control so many things here our work proposes an
enhanced secure filled online exam management environment mediated by group cryptography techniques using
remote monitoring and control of ports and input. The target domain of this is online exams for any subject's contests
in any level of study, as well as exams in online university courses with students in various remote locations. An easy
solution to the issue of security and cheating for online exams and uses an enhanced Security Control system in the
Online Exam (SeCOnE) which is based on group cryptography with an e-monitoring scheme. This paper also
determines the comparison effects of existing system, and the proposed processes involved in handling failures.
http://kasanpro.com/ieee/final-year-project-center-ramanathapuram-reviews
Title :Cryptography - Analysis of Enhanced Approach for Secure Online Exam Process Plan
Language : ASP.NET with C#
Project Link : http://kasanpro.com/p/asp-net-with-c-sharp/secure-online-exam-process-plan-code
Abstract : To conduct the exam for thousand people offline process have several problems, to avoid those problems
with gone for the process online exam is a field that is very popular and made many security assurances. Even
though it fails to control cheating, online exams have not been widely adopted well, but online education is adopted
and using all over the world without any security issues. Education learning from online process not have any problem
and don't disturb to any one, through online test plan we need to control so many things here our work proposes an
enhanced secure filled online exam management environment mediated by group cryptography techniques using
remote monitoring and control of ports and input. The target domain of this is online exams for any subject's contests
in any level of study, as well as exams in online university courses with students in various remote locations. An easy
solution to the issue of security and cheating for online exams and uses an enhanced Security Control system in the
Online Exam (SeCOnE) which is based on group cryptography with an e-monitoring scheme. This paper also
determines the comparison effects of existing system, and the proposed processes involved in handling failures.
Title :Cryptography - Analysis of Enhanced Approach for Secure Online Exam Process Plan
Language : PHP
Project Link : http://kasanpro.com/p/php/secure-online-exam-process-plan-implement
Abstract : To conduct the exam for thousand people offline process have several problems, to avoid those problems
with gone for the process online exam is a field that is very popular and made many security assurances. Even
though it fails to control cheating, online exams have not been widely adopted well, but online education is adopted
and using all over the world without any security issues. Education learning from online process not have any problem
and don't disturb to any one, through online test plan we need to control so many things here our work proposes an
enhanced secure filled online exam management environment mediated by group cryptography techniques using
remote monitoring and control of ports and input. The target domain of this is online exams for any subject's contests
in any level of study, as well as exams in online university courses with students in various remote locations. An easy
solution to the issue of security and cheating for online exams and uses an enhanced Security Control system in the
Online Exam (SeCOnE) which is based on group cryptography with an e-monitoring scheme. This paper also
determines the comparison effects of existing system, and the proposed processes involved in handling failures.
M.Phil Computer Science Cryptography Projects
Title :Encryption and Multiplexing of Fingerprints for Enhanced Security
Language : Matlab
Project Link : http://kasanpro.com/p/matlab/encryption-multiplexing-fingerprints-enhanced-security
Abstract : A novel cryptographic technique is proposed for enhanced security of fingerprint information. An
orthogonal coding scheme is developed to encrypt the given fingerprint image. Multiple encrypted fingerprint images
are then mixed together by using a multiplexing process. The proposed encryption and multiplexing technique not
only enhances the security of confidential fingerprint information by making the information inaccessible to any
intruder having a random code, but also improves the system resource utilization by reducing the storage and/or
transmission bandwidth requirement. The salient features of the technique is that any authorized user can retrieve the
corresponding fingerprint information from the complex encrypted and multiplexed image by a single decryption
process with the authentic key. The proposed cryptographic technique involves a simple architecture by not requiring
any mathematical transformation. Performance of the technique is investigated through computer simulation
employing real-life fingerprint images.
Title :Steganography Using the Twelve Square Substitution Cipher and an Index Variable
Language : Matlab
Project Link : http://kasanpro.com/p/matlab/steganography-using-twelve-square-substitution-cipher-index-variable
Abstract : In this paper we are proposing a technique for secret communication between Alice and Bob. We are
using both cryptography and steganography. Firstly, we encrypt the secret message using our new cipher algorithm
called twelve square substitution cipher algorithm, and then embed the cipher text in the carrier image in 6th and 7th
bit locations or 7th and 8th bit locations or 6th and 8th bit locations of the different pixels (bytes) of the carrier image
depending on the value of an index variable. Here the 8th bit means the least significant bit (LSB) location, the 7th bit
means the LSB minus one location and the 6th bit means the LSB minus two location. The index variable value can
be 0 or 1 or 2. The index variable value will change from 0 to 1 or 1 to 2 or 2 to 0 after each embedding. The initial
value of the index variable depends upon the length of the cipher text. After embedding the resultant image should be
sent to the receiver and receiver should retrieve the cipher text from the said locations and then decrypt by using the
twelve square cipher algorithm to get the secret message. The embedding locations are not same in all pixels, so it is
a stronger approach. The algorithm is implemented using Java programming language. The experimental results says
that the algorithm performs well.

More Related Content

What's hot

IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
ranjith kumar
 
Anomaly detection final
Anomaly detection finalAnomaly detection final
Anomaly detection final
Akshay Bansal
 
Multimedia
MultimediaMultimedia
Multimedia
ambitlick
 
Automatic static unpacking of malware binaries
Automatic static unpacking of malware binariesAutomatic static unpacking of malware binaries
Automatic static unpacking of malware binaries
UltraUploader
 
Automated Validation of Internet Security Protocols and Applications (AVISPA)
Automated Validation of Internet Security Protocols and Applications (AVISPA) Automated Validation of Internet Security Protocols and Applications (AVISPA)
Automated Validation of Internet Security Protocols and Applications (AVISPA)
Krassen Deltchev
 
Scalable Statistical Detection of Tunnelled Applications
Scalable Statistical Detection of Tunnelled ApplicationsScalable Statistical Detection of Tunnelled Applications
Scalable Statistical Detection of Tunnelled Applications
IJCSIS Research Publications
 
Network Forensics: Packet Analysis Using Wireshark
Network Forensics: Packet Analysis Using WiresharkNetwork Forensics: Packet Analysis Using Wireshark
Network Forensics: Packet Analysis Using Wireshark
n|u - The Open Security Community
 
Formal Modeling and Verification of Trusted OLSR Protocol Using I-SPIN Model...
Formal Modeling and Verification of Trusted OLSR Protocol  Using I-SPIN Model...Formal Modeling and Verification of Trusted OLSR Protocol  Using I-SPIN Model...
Formal Modeling and Verification of Trusted OLSR Protocol Using I-SPIN Model...
IOSR Journals
 
Hydan
HydanHydan
IEEE Information forensic and security Title and Abstract 2016
IEEE Information forensic and security Title and Abstract 2016IEEE Information forensic and security Title and Abstract 2016
IEEE Information forensic and security Title and Abstract 2016
tsysglobalsolutions
 
Survey of universal authentication protocol for mobile communication
Survey of universal authentication protocol for mobile communicationSurvey of universal authentication protocol for mobile communication
Survey of universal authentication protocol for mobile communication
Ahmad Sharifi
 
Analysis and Implementation of Software-Defined Network (SDN) Techniques on C...
Analysis and Implementation of Software-Defined Network (SDN) Techniques on C...Analysis and Implementation of Software-Defined Network (SDN) Techniques on C...
Analysis and Implementation of Software-Defined Network (SDN) Techniques on C...
Pavel Popa
 
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionA Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data Decryption
IJERA Editor
 
Finding Bad Code Smells with Neural Network Models
Finding Bad Code Smells with Neural Network Models Finding Bad Code Smells with Neural Network Models
Finding Bad Code Smells with Neural Network Models
IJECEIAES
 
Quantum Cryptography Approach for Resolving Cyber Threats
Quantum Cryptography Approach for Resolving Cyber ThreatsQuantum Cryptography Approach for Resolving Cyber Threats
Quantum Cryptography Approach for Resolving Cyber Threats
ijtsrd
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
Uttam Jain
 
Pattern-Oriented Network Trace Analysis
Pattern-Oriented Network Trace AnalysisPattern-Oriented Network Trace Analysis
Pattern-Oriented Network Trace Analysis
Dmitry Vostokov
 
Network Forensics
Network ForensicsNetwork Forensics
Network Forensics
Conferencias FIST
 
Test versus security @ IEEE Concept
Test versus security @ IEEE ConceptTest versus security @ IEEE Concept
Test versus security @ IEEE Concept
kodela3
 
20170412 om patri pres 153pdf
20170412 om patri pres 153pdf20170412 om patri pres 153pdf

What's hot (20)

IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
 
Anomaly detection final
Anomaly detection finalAnomaly detection final
Anomaly detection final
 
Multimedia
MultimediaMultimedia
Multimedia
 
Automatic static unpacking of malware binaries
Automatic static unpacking of malware binariesAutomatic static unpacking of malware binaries
Automatic static unpacking of malware binaries
 
Automated Validation of Internet Security Protocols and Applications (AVISPA)
Automated Validation of Internet Security Protocols and Applications (AVISPA) Automated Validation of Internet Security Protocols and Applications (AVISPA)
Automated Validation of Internet Security Protocols and Applications (AVISPA)
 
Scalable Statistical Detection of Tunnelled Applications
Scalable Statistical Detection of Tunnelled ApplicationsScalable Statistical Detection of Tunnelled Applications
Scalable Statistical Detection of Tunnelled Applications
 
Network Forensics: Packet Analysis Using Wireshark
Network Forensics: Packet Analysis Using WiresharkNetwork Forensics: Packet Analysis Using Wireshark
Network Forensics: Packet Analysis Using Wireshark
 
Formal Modeling and Verification of Trusted OLSR Protocol Using I-SPIN Model...
Formal Modeling and Verification of Trusted OLSR Protocol  Using I-SPIN Model...Formal Modeling and Verification of Trusted OLSR Protocol  Using I-SPIN Model...
Formal Modeling and Verification of Trusted OLSR Protocol Using I-SPIN Model...
 
Hydan
HydanHydan
Hydan
 
IEEE Information forensic and security Title and Abstract 2016
IEEE Information forensic and security Title and Abstract 2016IEEE Information forensic and security Title and Abstract 2016
IEEE Information forensic and security Title and Abstract 2016
 
Survey of universal authentication protocol for mobile communication
Survey of universal authentication protocol for mobile communicationSurvey of universal authentication protocol for mobile communication
Survey of universal authentication protocol for mobile communication
 
Analysis and Implementation of Software-Defined Network (SDN) Techniques on C...
Analysis and Implementation of Software-Defined Network (SDN) Techniques on C...Analysis and Implementation of Software-Defined Network (SDN) Techniques on C...
Analysis and Implementation of Software-Defined Network (SDN) Techniques on C...
 
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionA Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data Decryption
 
Finding Bad Code Smells with Neural Network Models
Finding Bad Code Smells with Neural Network Models Finding Bad Code Smells with Neural Network Models
Finding Bad Code Smells with Neural Network Models
 
Quantum Cryptography Approach for Resolving Cyber Threats
Quantum Cryptography Approach for Resolving Cyber ThreatsQuantum Cryptography Approach for Resolving Cyber Threats
Quantum Cryptography Approach for Resolving Cyber Threats
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Pattern-Oriented Network Trace Analysis
Pattern-Oriented Network Trace AnalysisPattern-Oriented Network Trace Analysis
Pattern-Oriented Network Trace Analysis
 
Network Forensics
Network ForensicsNetwork Forensics
Network Forensics
 
Test versus security @ IEEE Concept
Test versus security @ IEEE ConceptTest versus security @ IEEE Concept
Test versus security @ IEEE Concept
 
20170412 om patri pres 153pdf
20170412 om patri pres 153pdf20170412 om patri pres 153pdf
20170412 om patri pres 153pdf
 

Viewers also liked

Sophie lee a2 advanced portfolio_production_diary_template
Sophie lee a2 advanced portfolio_production_diary_templateSophie lee a2 advanced portfolio_production_diary_template
Sophie lee a2 advanced portfolio_production_diary_template
sophiejane27
 
Stress manangement in the university.pptx 1
Stress manangement in the university.pptx 1Stress manangement in the university.pptx 1
Stress manangement in the university.pptx 1
University of Port Harcourt Teaching Hospital
 
دروس من حياه موسى 3 الاحد 5 مارس 2012
دروس من حياه موسى 3   الاحد 5 مارس  2012دروس من حياه موسى 3   الاحد 5 مارس  2012
دروس من حياه موسى 3 الاحد 5 مارس 2012Ibrahimia Church Ftriends
 
انا هو الراعى الصالح أبونا متى المسكين
انا هو الراعى الصالح أبونا متى المسكين انا هو الراعى الصالح أبونا متى المسكين
انا هو الراعى الصالح أبونا متى المسكين Ibrahimia Church Ftriends
 
M.Phil Computer Science Secure Computing Projects
M.Phil Computer Science Secure Computing ProjectsM.Phil Computer Science Secure Computing Projects
M.Phil Computer Science Secure Computing Projects
Vijay Karan
 
Mayas
MayasMayas
Training and development
Training and developmentTraining and development
Training and development
Ankur Tiwari
 
Speech
Speech Speech
Speech
bshanebowers
 
Giornale Democratico
Giornale DemocraticoGiornale Democratico
Giornale Democratico
Giuseppe Sapere
 
חינוך טכנולוגי
חינוך טכנולוגיחינוך טכנולוגי
חינוך טכנולוגיDganit Hartman
 
Cabbages and Kings
Cabbages and KingsCabbages and Kings
Cabbages and Kings
Debasish Bhattacharjee
 
Mercabarna
MercabarnaMercabarna
Mercabarna
escolapigros
 
สัปดาห์ที่ 2 เรื่อง ความรู้เบื้องต้นเกี่ยวกับระบบสารสนเทศฯ
สัปดาห์ที่ 2 เรื่อง ความรู้เบื้องต้นเกี่ยวกับระบบสารสนเทศฯสัปดาห์ที่ 2 เรื่อง ความรู้เบื้องต้นเกี่ยวกับระบบสารสนเทศฯ
สัปดาห์ที่ 2 เรื่อง ความรู้เบื้องต้นเกี่ยวกับระบบสารสนเทศฯKhemjira_P
 
My record label anaylsis
My record label anaylsisMy record label anaylsis
My record label anaylsis
Danpalacefan
 
Factors Contributing to the Decline of the Anchovy Fisheries in Krueng Raya B...
Factors Contributing to the Decline of the Anchovy Fisheries in Krueng Raya B...Factors Contributing to the Decline of the Anchovy Fisheries in Krueng Raya B...
Factors Contributing to the Decline of the Anchovy Fisheries in Krueng Raya B...
Zulhamsyah Imran
 
Penyelesaian masalah (1)
Penyelesaian masalah (1)Penyelesaian masalah (1)
Penyelesaian masalah (1)Kamariah Osman
 
سفر اشعياء
سفر اشعياءسفر اشعياء
سفر اشعياء
Ibrahimia Church Ftriends
 
Evaluation – Bryn Hughes
Evaluation – Bryn HughesEvaluation – Bryn Hughes
Evaluation – Bryn Hughes
Bryn Hughes
 
IS20G New York ToniAnne Fardette Day 2 The 3 Keys
IS20G  New York ToniAnne Fardette Day 2 The 3 KeysIS20G  New York ToniAnne Fardette Day 2 The 3 Keys
IS20G New York ToniAnne Fardette Day 2 The 3 Keys
Sean Bradley
 

Viewers also liked (20)

Sophie lee a2 advanced portfolio_production_diary_template
Sophie lee a2 advanced portfolio_production_diary_templateSophie lee a2 advanced portfolio_production_diary_template
Sophie lee a2 advanced portfolio_production_diary_template
 
Stress manangement in the university.pptx 1
Stress manangement in the university.pptx 1Stress manangement in the university.pptx 1
Stress manangement in the university.pptx 1
 
دروس من حياه موسى 3 الاحد 5 مارس 2012
دروس من حياه موسى 3   الاحد 5 مارس  2012دروس من حياه موسى 3   الاحد 5 مارس  2012
دروس من حياه موسى 3 الاحد 5 مارس 2012
 
انا هو الراعى الصالح أبونا متى المسكين
انا هو الراعى الصالح أبونا متى المسكين انا هو الراعى الصالح أبونا متى المسكين
انا هو الراعى الصالح أبونا متى المسكين
 
M.Phil Computer Science Secure Computing Projects
M.Phil Computer Science Secure Computing ProjectsM.Phil Computer Science Secure Computing Projects
M.Phil Computer Science Secure Computing Projects
 
Mayas
MayasMayas
Mayas
 
Training and development
Training and developmentTraining and development
Training and development
 
Speech
Speech Speech
Speech
 
Giornale Democratico
Giornale DemocraticoGiornale Democratico
Giornale Democratico
 
חינוך טכנולוגי
חינוך טכנולוגיחינוך טכנולוגי
חינוך טכנולוגי
 
Cabbages and Kings
Cabbages and KingsCabbages and Kings
Cabbages and Kings
 
Mercabarna
MercabarnaMercabarna
Mercabarna
 
สัปดาห์ที่ 2 เรื่อง ความรู้เบื้องต้นเกี่ยวกับระบบสารสนเทศฯ
สัปดาห์ที่ 2 เรื่อง ความรู้เบื้องต้นเกี่ยวกับระบบสารสนเทศฯสัปดาห์ที่ 2 เรื่อง ความรู้เบื้องต้นเกี่ยวกับระบบสารสนเทศฯ
สัปดาห์ที่ 2 เรื่อง ความรู้เบื้องต้นเกี่ยวกับระบบสารสนเทศฯ
 
My record label anaylsis
My record label anaylsisMy record label anaylsis
My record label anaylsis
 
Factors Contributing to the Decline of the Anchovy Fisheries in Krueng Raya B...
Factors Contributing to the Decline of the Anchovy Fisheries in Krueng Raya B...Factors Contributing to the Decline of the Anchovy Fisheries in Krueng Raya B...
Factors Contributing to the Decline of the Anchovy Fisheries in Krueng Raya B...
 
Penyelesaian masalah (1)
Penyelesaian masalah (1)Penyelesaian masalah (1)
Penyelesaian masalah (1)
 
Flying dutchman
Flying dutchmanFlying dutchman
Flying dutchman
 
سفر اشعياء
سفر اشعياءسفر اشعياء
سفر اشعياء
 
Evaluation – Bryn Hughes
Evaluation – Bryn HughesEvaluation – Bryn Hughes
Evaluation – Bryn Hughes
 
IS20G New York ToniAnne Fardette Day 2 The 3 Keys
IS20G  New York ToniAnne Fardette Day 2 The 3 KeysIS20G  New York ToniAnne Fardette Day 2 The 3 Keys
IS20G New York ToniAnne Fardette Day 2 The 3 Keys
 

Similar to M phil-computer-science-cryptography-projects

Cryptography IEEE 2015 Projects
Cryptography IEEE 2015 ProjectsCryptography IEEE 2015 Projects
Cryptography IEEE 2015 Projects
Vijay Karan
 
Cryptography IEEE 2015 Projects
Cryptography IEEE 2015 ProjectsCryptography IEEE 2015 Projects
Cryptography IEEE 2015 Projects
Vijay Karan
 
M phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projectsM phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projects
Vijay Karan
 
M phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projectsM phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projects
Vijay Karan
 
M phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projectsM phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projects
Vijay Karan
 
M.E Computer Science Secure Computing Projects
M.E Computer Science Secure Computing ProjectsM.E Computer Science Secure Computing Projects
M.E Computer Science Secure Computing Projects
Vijay Karan
 
Mobile Computing IEEE 2014 Projects
Mobile Computing IEEE 2014 ProjectsMobile Computing IEEE 2014 Projects
Mobile Computing IEEE 2014 Projects
Vijay Karan
 
Mobile computing-ieee-2014-projects
Mobile computing-ieee-2014-projectsMobile computing-ieee-2014-projects
Mobile computing-ieee-2014-projects
Vijay Karan
 
IEEE Projects 2012-2013 Network Security
IEEE Projects 2012-2013 Network SecurityIEEE Projects 2012-2013 Network Security
IEEE Projects 2012-2013 Network Security
SBGC
 
Networking for java and dotnet 2016 - 17
Networking for java and dotnet 2016 - 17Networking for java and dotnet 2016 - 17
Networking for java and dotnet 2016 - 17
redpel dot com
 
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
SBGC
 
Virtual Labs SniffingConsider what you have learned so far
Virtual Labs SniffingConsider what you have learned so far Virtual Labs SniffingConsider what you have learned so far
Virtual Labs SniffingConsider what you have learned so far
AlleneMcclendon878
 
THE METHOD OF DETECTING ONLINE PASSWORD ATTACKS BASED ON HIGH-LEVEL PROTOCOL ...
THE METHOD OF DETECTING ONLINE PASSWORD ATTACKS BASED ON HIGH-LEVEL PROTOCOL ...THE METHOD OF DETECTING ONLINE PASSWORD ATTACKS BASED ON HIGH-LEVEL PROTOCOL ...
THE METHOD OF DETECTING ONLINE PASSWORD ATTACKS BASED ON HIGH-LEVEL PROTOCOL ...
IJCNCJournal
 
Zerovm backgroud
Zerovm backgroudZerovm backgroud
Zerovm backgroud
UT, San Antonio
 
IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...
IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...
IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...
IEEEMEMTECHSTUDENTPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...
IEEEFINALSEMSTUDENTSPROJECTS
 
IEEE 2014 JAVA NETWORKING PROJECTS Hop by-hop message uthenticationand source...
IEEE 2014 JAVA NETWORKING PROJECTS Hop by-hop message uthenticationand source...IEEE 2014 JAVA NETWORKING PROJECTS Hop by-hop message uthenticationand source...
IEEE 2014 JAVA NETWORKING PROJECTS Hop by-hop message uthenticationand source...
IEEEGLOBALSOFTSTUDENTPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...
IEEEFINALSEMSTUDENTSPROJECTS
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptography
Martins Okoi
 
International Journal of Engineering Research and Development (IJERD)
 International Journal of Engineering Research and Development (IJERD) International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 

Similar to M phil-computer-science-cryptography-projects (20)

Cryptography IEEE 2015 Projects
Cryptography IEEE 2015 ProjectsCryptography IEEE 2015 Projects
Cryptography IEEE 2015 Projects
 
Cryptography IEEE 2015 Projects
Cryptography IEEE 2015 ProjectsCryptography IEEE 2015 Projects
Cryptography IEEE 2015 Projects
 
M phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projectsM phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projects
 
M phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projectsM phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projects
 
M phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projectsM phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projects
 
M.E Computer Science Secure Computing Projects
M.E Computer Science Secure Computing ProjectsM.E Computer Science Secure Computing Projects
M.E Computer Science Secure Computing Projects
 
Mobile Computing IEEE 2014 Projects
Mobile Computing IEEE 2014 ProjectsMobile Computing IEEE 2014 Projects
Mobile Computing IEEE 2014 Projects
 
Mobile computing-ieee-2014-projects
Mobile computing-ieee-2014-projectsMobile computing-ieee-2014-projects
Mobile computing-ieee-2014-projects
 
IEEE Projects 2012-2013 Network Security
IEEE Projects 2012-2013 Network SecurityIEEE Projects 2012-2013 Network Security
IEEE Projects 2012-2013 Network Security
 
Networking for java and dotnet 2016 - 17
Networking for java and dotnet 2016 - 17Networking for java and dotnet 2016 - 17
Networking for java and dotnet 2016 - 17
 
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
 
Virtual Labs SniffingConsider what you have learned so far
Virtual Labs SniffingConsider what you have learned so far Virtual Labs SniffingConsider what you have learned so far
Virtual Labs SniffingConsider what you have learned so far
 
THE METHOD OF DETECTING ONLINE PASSWORD ATTACKS BASED ON HIGH-LEVEL PROTOCOL ...
THE METHOD OF DETECTING ONLINE PASSWORD ATTACKS BASED ON HIGH-LEVEL PROTOCOL ...THE METHOD OF DETECTING ONLINE PASSWORD ATTACKS BASED ON HIGH-LEVEL PROTOCOL ...
THE METHOD OF DETECTING ONLINE PASSWORD ATTACKS BASED ON HIGH-LEVEL PROTOCOL ...
 
Zerovm backgroud
Zerovm backgroudZerovm backgroud
Zerovm backgroud
 
IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...
IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...
IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...
 
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...
 
IEEE 2014 JAVA NETWORKING PROJECTS Hop by-hop message uthenticationand source...
IEEE 2014 JAVA NETWORKING PROJECTS Hop by-hop message uthenticationand source...IEEE 2014 JAVA NETWORKING PROJECTS Hop by-hop message uthenticationand source...
IEEE 2014 JAVA NETWORKING PROJECTS Hop by-hop message uthenticationand source...
 
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptography
 
International Journal of Engineering Research and Development (IJERD)
 International Journal of Engineering Research and Development (IJERD) International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 

More from Vijay Karan

IEEE 2014 Java Projects
IEEE 2014 Java ProjectsIEEE 2014 Java Projects
IEEE 2014 Java Projects
Vijay Karan
 
IEEE 2014 NS2 Projects
IEEE 2014 NS2 ProjectsIEEE 2014 NS2 Projects
IEEE 2014 NS2 Projects
Vijay Karan
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 Projects
Vijay Karan
 
IEEE 2014 Matlab Projects
IEEE 2014 Matlab ProjectsIEEE 2014 Matlab Projects
IEEE 2014 Matlab Projects
Vijay Karan
 
IEEE 2015 Matlab Projects
IEEE 2015 Matlab ProjectsIEEE 2015 Matlab Projects
IEEE 2015 Matlab Projects
Vijay Karan
 
IEEE 2014 C# Projects
IEEE 2014 C# ProjectsIEEE 2014 C# Projects
IEEE 2014 C# Projects
Vijay Karan
 
IEEE 2015 C# Projects
IEEE 2015 C# ProjectsIEEE 2015 C# Projects
IEEE 2015 C# Projects
Vijay Karan
 
IEEE 2014 ASP.NET with C# Projects
IEEE 2014 ASP.NET with C# ProjectsIEEE 2014 ASP.NET with C# Projects
IEEE 2014 ASP.NET with C# Projects
Vijay Karan
 
IEEE 2014 ASP.NET with VB Projects
IEEE 2014 ASP.NET with VB ProjectsIEEE 2014 ASP.NET with VB Projects
IEEE 2014 ASP.NET with VB Projects
Vijay Karan
 
M.E Computer Science Medical Imaging Projects
M.E Computer Science Medical Imaging ProjectsM.E Computer Science Medical Imaging Projects
M.E Computer Science Medical Imaging Projects
Vijay Karan
 
M.Phil Computer Science Server Computing Projects
M.Phil Computer Science Server Computing ProjectsM.Phil Computer Science Server Computing Projects
M.Phil Computer Science Server Computing Projects
Vijay Karan
 
M.E Computer Science Server Computing Projects
M.E Computer Science Server Computing ProjectsM.E Computer Science Server Computing Projects
M.E Computer Science Server Computing Projects
Vijay Karan
 
M.Phil Computer Science Remote Sensing Projects
M.Phil Computer Science Remote Sensing ProjectsM.Phil Computer Science Remote Sensing Projects
M.Phil Computer Science Remote Sensing Projects
Vijay Karan
 
M.E Computer Science Remote Sensing Projects
M.E Computer Science Remote Sensing ProjectsM.E Computer Science Remote Sensing Projects
M.E Computer Science Remote Sensing Projects
Vijay Karan
 
M.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication ProjectsM.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication Projects
Vijay Karan
 
M.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication ProjectsM.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication Projects
Vijay Karan
 
M.Phil Computer Science Parallel and Distributed System Projects
M.Phil Computer Science Parallel and Distributed System ProjectsM.Phil Computer Science Parallel and Distributed System Projects
M.Phil Computer Science Parallel and Distributed System Projects
Vijay Karan
 
M.E Computer Science Parallel and Distributed System Projects
M.E Computer Science Parallel and Distributed System ProjectsM.E Computer Science Parallel and Distributed System Projects
M.E Computer Science Parallel and Distributed System Projects
Vijay Karan
 
M.Phil Computer Science Networking Projects
M.Phil Computer Science Networking ProjectsM.Phil Computer Science Networking Projects
M.Phil Computer Science Networking Projects
Vijay Karan
 
M.Phil Computer Science Biometric System Projects
M.Phil Computer Science Biometric System ProjectsM.Phil Computer Science Biometric System Projects
M.Phil Computer Science Biometric System Projects
Vijay Karan
 

More from Vijay Karan (20)

IEEE 2014 Java Projects
IEEE 2014 Java ProjectsIEEE 2014 Java Projects
IEEE 2014 Java Projects
 
IEEE 2014 NS2 Projects
IEEE 2014 NS2 ProjectsIEEE 2014 NS2 Projects
IEEE 2014 NS2 Projects
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 Projects
 
IEEE 2014 Matlab Projects
IEEE 2014 Matlab ProjectsIEEE 2014 Matlab Projects
IEEE 2014 Matlab Projects
 
IEEE 2015 Matlab Projects
IEEE 2015 Matlab ProjectsIEEE 2015 Matlab Projects
IEEE 2015 Matlab Projects
 
IEEE 2014 C# Projects
IEEE 2014 C# ProjectsIEEE 2014 C# Projects
IEEE 2014 C# Projects
 
IEEE 2015 C# Projects
IEEE 2015 C# ProjectsIEEE 2015 C# Projects
IEEE 2015 C# Projects
 
IEEE 2014 ASP.NET with C# Projects
IEEE 2014 ASP.NET with C# ProjectsIEEE 2014 ASP.NET with C# Projects
IEEE 2014 ASP.NET with C# Projects
 
IEEE 2014 ASP.NET with VB Projects
IEEE 2014 ASP.NET with VB ProjectsIEEE 2014 ASP.NET with VB Projects
IEEE 2014 ASP.NET with VB Projects
 
M.E Computer Science Medical Imaging Projects
M.E Computer Science Medical Imaging ProjectsM.E Computer Science Medical Imaging Projects
M.E Computer Science Medical Imaging Projects
 
M.Phil Computer Science Server Computing Projects
M.Phil Computer Science Server Computing ProjectsM.Phil Computer Science Server Computing Projects
M.Phil Computer Science Server Computing Projects
 
M.E Computer Science Server Computing Projects
M.E Computer Science Server Computing ProjectsM.E Computer Science Server Computing Projects
M.E Computer Science Server Computing Projects
 
M.Phil Computer Science Remote Sensing Projects
M.Phil Computer Science Remote Sensing ProjectsM.Phil Computer Science Remote Sensing Projects
M.Phil Computer Science Remote Sensing Projects
 
M.E Computer Science Remote Sensing Projects
M.E Computer Science Remote Sensing ProjectsM.E Computer Science Remote Sensing Projects
M.E Computer Science Remote Sensing Projects
 
M.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication ProjectsM.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication Projects
 
M.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication ProjectsM.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication Projects
 
M.Phil Computer Science Parallel and Distributed System Projects
M.Phil Computer Science Parallel and Distributed System ProjectsM.Phil Computer Science Parallel and Distributed System Projects
M.Phil Computer Science Parallel and Distributed System Projects
 
M.E Computer Science Parallel and Distributed System Projects
M.E Computer Science Parallel and Distributed System ProjectsM.E Computer Science Parallel and Distributed System Projects
M.E Computer Science Parallel and Distributed System Projects
 
M.Phil Computer Science Networking Projects
M.Phil Computer Science Networking ProjectsM.Phil Computer Science Networking Projects
M.Phil Computer Science Networking Projects
 
M.Phil Computer Science Biometric System Projects
M.Phil Computer Science Biometric System ProjectsM.Phil Computer Science Biometric System Projects
M.Phil Computer Science Biometric System Projects
 

Recently uploaded

BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
sayalidalavi006
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 

Recently uploaded (20)

BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 

M phil-computer-science-cryptography-projects

  • 1. M.Phil Computer Science Cryptography Projects Web : www.kasanpro.com Email : sales@kasanpro.com List Link : http://kasanpro.com/projects-list/m-phil-computer-science-cryptography-projects Title :Robust Video Data Hiding using Forbidden Zone Data Hiding and Selective Embedding Language : C# Project Link : http://kasanpro.com/p/c-sharp/robust-video-data-hiding-forbidden-zone-data-hiding-selective-embedding Abstract : Video data hiding is still an important research topic due to the design complexities involved. We propose a new video data hiding method that makes use of erasure correction capa- bility of repeat accumulate codes and superiority of forbidden zone data hiding. Selective embedding is utilized in the proposed method to determine host signal samples suitable for data hiding. This method also contains a temporal synchronization scheme in order to withstand frame drop and insert attacks. The proposed framework is tested by typical broadcast material against MPEG- 2, H.264 compression, frame-rate conversion attacks, as well as other well-known video data hiding methods. The decoding error values are reported for typical system parameters. The simulation results indicate that the framework can be successfully utilized in video data hiding applications. Title :Differential Phase-Shift Quantum Key Distribution Systems Language : C# Project Link : http://kasanpro.com/p/c-sharp/differential-phase-shift-quantum-key-distribution-system Abstract : Differential phase-shift (DPS) quantum key distribution (QKD) is a unique QKD protocol that is different from traditional ones, featuring simplicity and practicality. This paper overviews DPS-QKD systems. Title :Differential Phase-Shift Quantum Key Distribution Systems Language : Java Project Link : http://kasanpro.com/p/java/differential-phase-shift-quantum-key-distribution-systems Abstract : Differential phase-shift (DPS) quantum key distribution (QKD) is a unique QKD protocol that is different from traditional ones, featuring simplicity and practicality. This paper overviews DPS-QKD systems. Title :Safeguarding Quantum Key Distribution Through Detection Randomization Language : Java Project Link : http://kasanpro.com/p/java/safeguarding-quantum-key-distribution-through-detection-randomization Abstract : We propose and experimentally demonstrate a scheme to render the detection apparatus of a quantum key distribution system immune to the main classes of hacking attacks in which the eavesdropper explores the back-door opened by the single-photon detectors. The countermeasure is based on the creation of modes that are not deterministically accessible to the eavesdropper. We experimentally show that the use of beamsplitters and extra single-photon detectors at the receiver station passively creates randomized spatial modes that erase any knowledge the eavesdropper might have gained when using bright-light faked states. Additionally, we experimentally show a detectorscrambling approach where the random selection of the detector used for each measurement--equivalent to an active spatial mode randomization--hashes out the side-channel open by the detection efficiency mismatch-based attacks. The proposed combined countermeasure represents a practical and readily implementable solution against the main classes of quantum hacking attacks aimed on the single-photon detector so far, without intervening on the inner working of the devices. Title :Safeguarding Quantum Key Distribution Through Detection Randomization Language : C#
  • 2. Project Link : http://kasanpro.com/p/c-sharp/quantum-key-distribution-safeguarding-through-detection-randomization Abstract : We propose and experimentally demonstrate a scheme to render the detection apparatus of a quantum key distribution system immune to the main classes of hacking attacks in which the eavesdropper explores the back-door opened by the single-photon detectors. The countermeasure is based on the creation of modes that are not deterministically accessible to the eavesdropper. We experimentally show that the use of beamsplitters and extra single-photon detectors at the receiver station passively creates randomized spatial modes that erase any knowledge the eavesdropper might have gained when using bright-light faked states. Additionally, we experimentally show a detectorscrambling approach where the random selection of the detector used for each measurement--equivalent to an active spatial mode randomization--hashes out the side-channel open by the detection efficiency mismatch-based attacks. The proposed combined countermeasure represents a practical and readily implementable solution against the main classes of quantum hacking attacks aimed on the single-photon detector so far, without intervening on the inner working of the devices. M.Phil Computer Science Cryptography Projects Title :Postprocessing of the Oblivious Key in Quantum Private Query Language : C# Project Link : http://kasanpro.com/p/c-sharp/postprocessing-oblivious-key-quantum-private-query Abstract : Private query is a kind of cryptographic protocols to protect both users' privacies in their communication. For instance, Alice wants to buy one item from Bob's database. The aim of private query is to ensure that Alice can get only one item from Bob, and simultaneously, Bob cannot know which one was taken by Alice. In pursuing high security and efficiency, some quantum private query protocols were proposed. As a practical model, Quantum- Oblivious-Key-Transfer (QOKT)-based private query, which utilizes a QOKT protocol to distribute oblivious key between Alice and Bob and then applies the key to achieve the aim of private query, has drawn much attention. Here, we focus on postprocessing of the oblivious key, and the following two contributions are achieved. 1) We analyze three recently proposed dilution methods and find two of them have serious security loophole. That is, Alice can illegally obtain much additional information about Bob's database by multiple queries. For example, Alice can obtain the whole database, which contains 104 items, by only 53.4 queries averagely. 2) We present an effective error-correction method for the oblivious key, which can address the realistic scenario with channel noises and make QOKT-based private query more practical. Title :Postprocessing of the Oblivious Key in Quantum Private Query Language : Java Project Link : http://kasanpro.com/p/java/oblivious-key-postprocessing-quantum-private-query Abstract : Private query is a kind of cryptographic protocols to protect both users' privacies in their communication. For instance, Alice wants to buy one item from Bob's database. The aim of private query is to ensure that Alice can get only one item from Bob, and simultaneously, Bob cannot know which one was taken by Alice. In pursuing high security and efficiency, some quantum private query protocols were proposed. As a practical model, Quantum- Oblivious-Key-Transfer (QOKT)-based private query, which utilizes a QOKT protocol to distribute oblivious key between Alice and Bob and then applies the key to achieve the aim of private query, has drawn much attention. Here, we focus on postprocessing of the oblivious key, and the following two contributions are achieved. 1) We analyze three recently proposed dilution methods and find two of them have serious security loophole. That is, Alice can illegally obtain much additional information about Bob's database by multiple queries. For example, Alice can obtain the whole database, which contains 104 items, by only 53.4 queries averagely. 2) We present an effective error-correction method for the oblivious key, which can address the realistic scenario with channel noises and make QOKT-based private query more practical. Title :Cryptography - Analysis of Enhanced Approach for Secure Online Exam Process Plan Language : ASP.NET with VB Project Link : http://kasanpro.com/p/asp-net-with-vb/secure-online-exam-process-plan Abstract : To conduct the exam for thousand people offline process have several problems, to avoid those problems with gone for the process online exam is a field that is very popular and made many security assurances. Even though it fails to control cheating, online exams have not been widely adopted well, but online education is adopted and using all over the world without any security issues. Education learning from online process not have any problem and don't disturb to any one, through online test plan we need to control so many things here our work proposes an
  • 3. enhanced secure filled online exam management environment mediated by group cryptography techniques using remote monitoring and control of ports and input. The target domain of this is online exams for any subject's contests in any level of study, as well as exams in online university courses with students in various remote locations. An easy solution to the issue of security and cheating for online exams and uses an enhanced Security Control system in the Online Exam (SeCOnE) which is based on group cryptography with an e-monitoring scheme. This paper also determines the comparison effects of existing system, and the proposed processes involved in handling failures. http://kasanpro.com/ieee/final-year-project-center-ramanathapuram-reviews Title :Cryptography - Analysis of Enhanced Approach for Secure Online Exam Process Plan Language : ASP.NET with C# Project Link : http://kasanpro.com/p/asp-net-with-c-sharp/secure-online-exam-process-plan-code Abstract : To conduct the exam for thousand people offline process have several problems, to avoid those problems with gone for the process online exam is a field that is very popular and made many security assurances. Even though it fails to control cheating, online exams have not been widely adopted well, but online education is adopted and using all over the world without any security issues. Education learning from online process not have any problem and don't disturb to any one, through online test plan we need to control so many things here our work proposes an enhanced secure filled online exam management environment mediated by group cryptography techniques using remote monitoring and control of ports and input. The target domain of this is online exams for any subject's contests in any level of study, as well as exams in online university courses with students in various remote locations. An easy solution to the issue of security and cheating for online exams and uses an enhanced Security Control system in the Online Exam (SeCOnE) which is based on group cryptography with an e-monitoring scheme. This paper also determines the comparison effects of existing system, and the proposed processes involved in handling failures. Title :Cryptography - Analysis of Enhanced Approach for Secure Online Exam Process Plan Language : PHP Project Link : http://kasanpro.com/p/php/secure-online-exam-process-plan-implement Abstract : To conduct the exam for thousand people offline process have several problems, to avoid those problems with gone for the process online exam is a field that is very popular and made many security assurances. Even though it fails to control cheating, online exams have not been widely adopted well, but online education is adopted and using all over the world without any security issues. Education learning from online process not have any problem and don't disturb to any one, through online test plan we need to control so many things here our work proposes an enhanced secure filled online exam management environment mediated by group cryptography techniques using remote monitoring and control of ports and input. The target domain of this is online exams for any subject's contests in any level of study, as well as exams in online university courses with students in various remote locations. An easy solution to the issue of security and cheating for online exams and uses an enhanced Security Control system in the Online Exam (SeCOnE) which is based on group cryptography with an e-monitoring scheme. This paper also determines the comparison effects of existing system, and the proposed processes involved in handling failures. M.Phil Computer Science Cryptography Projects Title :Encryption and Multiplexing of Fingerprints for Enhanced Security Language : Matlab Project Link : http://kasanpro.com/p/matlab/encryption-multiplexing-fingerprints-enhanced-security Abstract : A novel cryptographic technique is proposed for enhanced security of fingerprint information. An orthogonal coding scheme is developed to encrypt the given fingerprint image. Multiple encrypted fingerprint images are then mixed together by using a multiplexing process. The proposed encryption and multiplexing technique not only enhances the security of confidential fingerprint information by making the information inaccessible to any intruder having a random code, but also improves the system resource utilization by reducing the storage and/or transmission bandwidth requirement. The salient features of the technique is that any authorized user can retrieve the corresponding fingerprint information from the complex encrypted and multiplexed image by a single decryption process with the authentic key. The proposed cryptographic technique involves a simple architecture by not requiring any mathematical transformation. Performance of the technique is investigated through computer simulation employing real-life fingerprint images. Title :Steganography Using the Twelve Square Substitution Cipher and an Index Variable
  • 4. Language : Matlab Project Link : http://kasanpro.com/p/matlab/steganography-using-twelve-square-substitution-cipher-index-variable Abstract : In this paper we are proposing a technique for secret communication between Alice and Bob. We are using both cryptography and steganography. Firstly, we encrypt the secret message using our new cipher algorithm called twelve square substitution cipher algorithm, and then embed the cipher text in the carrier image in 6th and 7th bit locations or 7th and 8th bit locations or 6th and 8th bit locations of the different pixels (bytes) of the carrier image depending on the value of an index variable. Here the 8th bit means the least significant bit (LSB) location, the 7th bit means the LSB minus one location and the 6th bit means the LSB minus two location. The index variable value can be 0 or 1 or 2. The index variable value will change from 0 to 1 or 1 to 2 or 2 to 0 after each embedding. The initial value of the index variable depends upon the length of the cipher text. After embedding the resultant image should be sent to the receiver and receiver should retrieve the cipher text from the said locations and then decrypt by using the twelve square cipher algorithm to get the secret message. The embedding locations are not same in all pixels, so it is a stronger approach. The algorithm is implemented using Java programming language. The experimental results says that the algorithm performs well.