AUTHENTIFICATION OF DIGITAL IMAGES BY ENCRYPTION AND DECRYPTION WITH PRIMARY KEY IMPLEMENTATION USING ISM ALGORITHM AND STEGANOGRAPHY  
 
     
         -    Department: Computer Science
- Project ID: CPU1410 
- Access Fee: ₦5,000
- Pages: 37 Pages
- Reference: YES 
- Format: Microsoft Word
- Views: 1,374 
Get this Project  Materials 
  
   
     
       
             
    
    
 ABSTRACT
Encryption/decryption is especially important in wireless communications. This is because wireless circuits are easier to tap than their hard-wired counterparts. Nevertheless, encryption/decryption is a good idea when carrying out any kind of sensitive transaction, such as a credit-card purchase online, or the discussion of a company secret between different departments in the organization. The stronger the cipher -- that is, the harder it is for unauthorized people to break it -- the better, in general. However, as the strength of encryption/decryption increases, so does the cost.
TABLE OF CONTENT
TITLE PAGE 
CERTIFICATION 
APPROVAL 
DEDICATION 
ACKNOWLEDGEMENT 
ABSTRACT 
TABLE OF CONTENT  
CHAPTER ONE
1.0 INTRODUCTION 
1.1 STATEMENT OF PROBLEM 
1.2 PURPOSE OF STUDY 
1.3 AIMS AND OBJECTIVES  
1.4 SCOPE/DELIMITATIONS 
1.5 LIMITATIONS/CONSTRAINTS 
1.6 DEFINITION OF TERMS  
CHAPTER TWO
2.0 LITERATURE REVIEW  
CHAPTER THREE
3.0 METHODS FOR FACT FINDING AND DETAILED DISCUSSIONS OF THE SYSTEM
3.1 METHODOLOGIES FOR FACT-FINDING 
3.2 DISCUSSIONS  
CHAPTER FOUR
4.0 FUTURES, IMPLICATIONS AND CHALLENGES OF THE SYSTEM 
4.1 FUTURES 
4.2 IMPLICATIONS
4.3 CHALLENGES
CHAPTER FIVE
5.0 RECOMMENDATIONS, SUMMARY AND CONCLUSION 
5.1 RECOMMENDATION 
5.2 SUMMARY 
5.3 CONCLUSION 
5.4 REFERENCES 
   
 
     
             
    
        
     
         -    Department: Computer Science
- Project ID: CPU1410 
- Access Fee: ₦5,000
- Pages: 37 Pages
- Reference: YES 
- Format: Microsoft Word
- Views: 1,374 
Get this Project  Materials