Data hiding and encryption would be done on images, DOT NET Programming

Assignment Help:

Data hiding and encryption would be done on images. Both these process should have a data hiding key and an encryption key correspondingly. Another user should be able to decrypt the image only if he knows the encryption key and the similar to read the data hidden, he have to identify the data hiding key. Another aspect is that the software should be able to send data hidden images or the encrypted to other users. Therefore there should be an option for adding accounts with a username and password. It should be a small setup same to the mailing system which allows only sending and receiving the images. The sending of images should be linked with internet.

Skills required:

.NET, MySQL, C# Programming, Visual Basic


Related Discussions:- Data hiding and encryption would be done on images

Login page, how to connect login page with my database and check the values...

how to connect login page with my database and check the values with the database.

Give a brief introduction to binders, Give a brief introduction to Binders....

Give a brief introduction to Binders. Binders are used by DLR to communicate with not the .NET Framework but also with a variety of other services, like Silverlight and COM. Th

Experienced outlook developer, About us in a nutshell: We are a young start...

About us in a nutshell: We are a young start-up that trade a refreshing product in the field of enterprise software and develops with the latest technologies. We love to partner wi

Differentiate between boxing and unboxing, Differentiate between Boxing and...

Differentiate between Boxing and Unboxing. When a value type is changed to an object type, the process is known as boxing; while, when an object type is changed to a value type

What is .net framework, C# Programming 1. What is .Net Framework? 2....

C# Programming 1. What is .Net Framework? 2. Write short notes on constructors and destructors. 3. Explain boxing and unboxing with examples. 4. What is a mixed mode a

What is full trust, What is Full Trust? Your code is permitted to do an...

What is Full Trust? Your code is permitted to do anything in the framework, meaning that all (.Net) permissions are granted. The GAC has Full Trust because it's on the local HD

Calculate and display the volume of the sphere, Question: (a) Define f...

Question: (a) Define four special target names use with the TARGET attribute. (b) Assume that you have a document with many subsections. Write the HTML code to create a fr

Describe how a user control is declared in an asp.net page, Question: (...

Question: (a) One problem encountered when designing web applications is that HTTP is a "stateless" protocol. Explain two general approaches to solve the statelessness problem

MVC, how can we use entity framework in ASP.Net MVC

how can we use entity framework in ASP.Net MVC

Title..case statement, Design an interface and add code to command buttons ...

Design an interface and add code to command buttons using case statement, to find coursework to be calculated using formula 0.6*1/6*total Mark

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd