Data hiding and encryption would be done on images, DOT NET Programming

Assignment Help:

Data hiding and encryption would be done on images. Both these process should have a data hiding key and an encryption key correspondingly. Another user should be able to decrypt the image only if he knows the encryption key and the similar to read the data hidden, he have to identify the data hiding key. Another aspect is that the software should be able to send data hidden images or the encrypted to other users. Therefore there should be an option for adding accounts with a username and password. It should be a small setup same to the mailing system which allows only sending and receiving the images. The sending of images should be linked with internet.

Skills required:

.NET, MySQL, C# Programming, Visual Basic


Related Discussions:- Data hiding and encryption would be done on images

I need responsive database structure and web template, I have a responsive ...

I have a responsive database structure and web template. I need someone to prepare the code (.net, jquery ) to make interaction with database . Insert, edit , save . Plus a custom

Web application and xml data storage, Web application and XML data storage ...

Web application and XML data storage One person should create a library (Java package of classes) for managing the list of bibliography entries, and for saving and loading th

Difference between the select clause and selectmany method, What is the dif...

What is the difference between the Select clause and SelectMany() method in LINQ? Both the Select clause and SelectMany() method are used to produce a result value from a sourc

Various types of transactions in com + .net, Types of Transactions in COM +...

Types of Transactions in COM + .NET There are 5 types of transactions that can be used with COM+.   An object is whenever registered with the COM+ it has to abide either to any

Why project needed xml?, Explain why your project needed XML. Remember ...

Explain why your project needed XML. Remember XML was meant to exchange data between the two entities as you can define your user friendly tags with ease. In the real world sce

Importance of it governance, Importance of IT governance Governing and ...

Importance of IT governance Governing and managing information technology is a crucial activity in organizations to generate business value. According to Ross & Weill (2004), f

Jquery and mvc project, I am looking individuals who have company experienc...

I am looking individuals who have company experience working on Jquery and Microsoft Technology ( MVC 4.5 ), who will take live online session and provide training through Team Vie

Explain expandoobject and dynamicobject classes, Explain ExpandoObject and ...

Explain ExpandoObject and DynamicObject classes. The ExpandoObject class refers to a class whose members can be explicitly added and removed at runtime. In other words, the Exp

Connect a software application to a database backend, Connect a Software Ap...

Connect a Software Application to a Database Backend Acquire the knowledge and develop the skills needed to prototype an end user application using a rapid application dev

What is different overloading and overriding, What is different overloading...

What is different overloading and overriding, please explain

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd