Data hiding and encryption would be done on images, DOT NET Programming

Assignment Help:

Data hiding and encryption would be done on images. Both these process should have a data hiding key and an encryption key correspondingly. Another user should be able to decrypt the image only if he knows the encryption key and the similar to read the data hidden, he have to identify the data hiding key. Another aspect is that the software should be able to send data hidden images or the encrypted to other users. Therefore there should be an option for adding accounts with a username and password. It should be a small setup same to the mailing system which allows only sending and receiving the images. The sending of images should be linked with internet.

Skills required:

.NET, MySQL, C# Programming, Visual Basic


Related Discussions:- Data hiding and encryption would be done on images

C# api to grab option price from cboe web site, C# API to grab option price...

C# API to grab option price from CBOE web site Project Description: On the web page below, user will download option prices of Stock or Index. For example, if you put "VXX" i

What is object-oriented programming, What is object-oriented programming (O...

What is object-oriented programming (OOP)? OOP is a technique to develop logical modules, like classes that contain properties, methods, fields, and events. An object is formed

Full time contractual programming position, Full time contractual programmi...

Full time contractual programming position (mostly scraping, databasing) Project Description: This is a full time contractual role needed for a sports advisory service. We ar

Leasetime, What are LeaseTime, Sponsorship Time, Renew on Call Time and Lea...

What are LeaseTime, Sponsorship Time, Renew on Call Time and Lease Manager Poll Time? In the normal .NET environment objects lifetime is managed by garbage collector. But inrem

Three tier architecture, What is three tier architecture? The 3 tier so...

What is three tier architecture? The 3 tier software architecture was comes into action in the 1990s to overcome the limitations of the 2 tier architecture. There are 3 laye

Deployment diagram, Explain all parts of a deployment diagram. Pa...

Explain all parts of a deployment diagram. Package: - The package logically groups element of a UML model. Node: - The Node is as physical system which represents a

Named pipe in matlab, What I need is the following: I need an implementatio...

What I need is the following: I need an implementation in matlab under windows to open a named pipe and to read data from the pipe (an other program writes into the pipe) in quasi

What is the difference between sub-procedure and function, What is the main...

What is the main difference between sub-procedure and function? The sub-procedure is a block of multiple visual basic statements within Sub and End Sub statements. It is used t

Strongly typed resource class, Can we get a strongly typed resource class? ...

Can we get a strongly typed resource class? You can now get strongly types classes in the VS.NET intellisense as shown in the figure below. Figure: - Strongly typed re

Delegate, What is a delegate? The Delegate is the class that can hold a...

What is a delegate? The Delegate is the class that can hold a reference to a method or a function. The Delegate class has a signature and it can only reference to those methods

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd