Data hiding and encryption would be done on images, DOT NET Programming

Assignment Help:

Data hiding and encryption would be done on images. Both these process should have a data hiding key and an encryption key correspondingly. Another user should be able to decrypt the image only if he knows the encryption key and the similar to read the data hidden, he have to identify the data hiding key. Another aspect is that the software should be able to send data hidden images or the encrypted to other users. Therefore there should be an option for adding accounts with a username and password. It should be a small setup same to the mailing system which allows only sending and receiving the images. The sending of images should be linked with internet.

Skills required:

.NET, MySQL, C# Programming, Visual Basic


Related Discussions:- Data hiding and encryption would be done on images

Describe the roles of clr in .net framework, Describe the roles of CLR in ....

Describe the roles of CLR in .NET Framework. CLR gives an environment to execute .NET applications on target machines. CLR is also a common runtime environment for all .NET cod

Durkheims theory of crime, Application of durkheim''s theory of crime in ex...

Application of durkheim''s theory of crime in explaining the crime context in south Africa. Highlighting the relevance of the theory, as well as its limitations

Types of remote object creation mode in .net, Different types of remote obj...

Different types of remote object creation mode in .NET There are 2 different ways in which the object can be created using Remoting :- 1)SAO (Server Activated Objects) also

Scavenging, What is scavenging? When server running your ASP.NET applic...

What is scavenging? When server running your ASP.NET application runs low on the memory resources, items are discarded from the cache depending on cache item priority. The Cach

How can you implement a condition in a workflow, How can you implement a co...

How can you implement a condition in a workflow? You can implement a condition by using either of the following ways: By creating a rule condition - Specifies that you can e

Dmaic and dmadv, What is DMAIC and DMADV? The Six Sigma has two key met...

What is DMAIC and DMADV? The Six Sigma has two key methodologies viz. DMAIC and DMADV. The DMAIC is used to improve an existing business process. While DMADV is used to create

I need kinect fitting room - smart fitting mirror, I need Kinect Fitting Ro...

I need Kinect Fitting Room - Smart Fitting Mirror I'm presently looking for someone able to create software exactly like this fitnect (Kinect Fitting Room). Software can work

Practical implementation of façade patterns, Can you give a practical imple...

Can you give a practical implementation of FAÇADE patterns? The Façade pattern sits on the top of lot of the subsystems & makes access easy to interfaces of these subsystems. T

Live projects, current available topics on computer graphics

current available topics on computer graphics

Basic use of "dataview", What is basic use of "DataView"? The "DataView...

What is basic use of "DataView"? The "DataView" represents the whole table or can be small parts of rows depending on some criteria. It is the best used for sorting and finding

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd