Data hiding and encryption would be done on images, DOT NET Programming

Assignment Help:

Data hiding and encryption would be done on images. Both these process should have a data hiding key and an encryption key correspondingly. Another user should be able to decrypt the image only if he knows the encryption key and the similar to read the data hidden, he have to identify the data hiding key. Another aspect is that the software should be able to send data hidden images or the encrypted to other users. Therefore there should be an option for adding accounts with a username and password. It should be a small setup same to the mailing system which allows only sending and receiving the images. The sending of images should be linked with internet.

Skills required:

.NET, MySQL, C# Programming, Visual Basic


Related Discussions:- Data hiding and encryption would be done on images

I need kinect fitting room - smart fitting mirror, I need Kinect Fitting Ro...

I need Kinect Fitting Room - Smart Fitting Mirror I'm presently looking for someone able to create software exactly like this fitnect (Kinect Fitting Room). Software can work

Explain memory-mapped files, Explain memory-mapped files. Memory-mapped...

Explain memory-mapped files. Memory-mapped files (MMFs) permit you map the content of a file to the logical address of an application. These files enable the multiple processes

List the new features added in .net framework 4.0, List the new features ad...

List the new features added in .NET Framework 4.0. The following are the latest features of .NET Framework 4.0:     Improved Application Compatibility and Deployment Support

What is managed code and managed data, What is managed code and managed dat...

What is managed code and managed data? Managed code is code that is written to target the services of the Common Language Runtime. In order to target these services, the code m

Difference between delete table and truncate table commands, What is the di...

What is the difference between DELETE TABLE and TRUNCATE TABLE commands? Following are differences between delete & truncate commands:- 1)The DELETE TABLE syntax logs the de

Different transaction levels in sql server, What are different transaction ...

What are different transaction levels in SQL SERVER? The Transaction Isolation level decides how is the one process isolated from theother process. Using the transaction levels

XML, Write a XML with database with book details (BOOK ID, Title, Author, s...

Write a XML with database with book details (BOOK ID, Title, Author, subject, published Year, language, vendor, price)

Consuming a web service with soap on c# .net, Consuming a web service with ...

Consuming a web service with SOAP on c# .NET Project Description: I need to consume a web service with SOAP. I have xml file and some description. I need it to be done

Advantages of using permission sets and code groups, This assignment docume...

This assignment document will be distributed from Blackboard assignment folder. Some parts of the assignments will require you to research answers from your text book (you must rea

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd