Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

The project will encourage you to ask some big questions about how a security mechanism works and why/when to use it. This project will provide

The project will encourage you to ask some big questions about how a security mechanism works and why/when to use it. This project will provide a secure system by combining encryption for data transfer and information hiding techniques for data authentication. The students will develop a program to hide personal information into a gray scale medical image. The project has two main parts: In the first part, the personal information will be embedded into a gray scale medical image. o You must design your own algorithm. o You can select one of the cipher algorithms. o The output must be gray scale medical image with personal information. In the second part, the program will extract personal information from the modified gray scale medical image. PHASE I The proposal of the project includes description of the problem, solution of the project, implementation steps, design of your own solution in detail. PHASE II The main part of the project includes design of the solution and implementation schema. The Project Final Presentation includes not only conclusion, questions and discussion, but also Phases. TECHNICAL REPORT Each project will result in a detailed 10-20 page written technical report. The project report should be, readable, and self-contained. Also, it should be written with the readers in mind, do not copy and paste. Any class member should be able to understand your report, and benefit from the results you obtain. You should include adequate references and/or background materials. You should use tables, diagrams, graphs, figures, and portions of printouts to enhance readers' comprehension of your project. REPORT GUIDELINES The following format is suggested. You do not have to follow it exactly. Some sections may not be needed, or additional sections may be necessary for your project. Abstract: It comes first in your report, but you write it last. CSE0421 Cryptography 2023-2024 Fall 2 / 2 Summary: Gives succinct information on the purpose, methods, results, and conclusions reported. Introduction: Include background material and discuss the scope and limitations of your project. Implementation Discussion: The body of your report. This includes the methodology used. Be sure to fully describe any figures, tables or diagrams you include. Results Conclusions Recommendations, especially for future work and unsolved problems. References (must always be included), annotated if possible. Appendices, including supporting material as needed.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

The Temple Of Django Database Performance

Authors: Andrew Brookins

1st Edition

1734303700, 978-1734303704

More Books

Students also viewed these Databases questions