M.Phil Computer Science Cryptography Projects
M.Phil Computer Science Cryptography Projects
Web : www.kasanpro.com
Email : [email protected]
Title :Robust Video Data Hiding using Forbidden Zone Data Hiding and Selective Embedding
Language : C#
Project Link :
http://kasanpro.com/p/c-sharp/robust-video-data-hiding-forbidden-zone-data-hiding-selective-embedding
Abstract : Video data hiding is still an important research topic due to the design complexities involved. We propose
a new video data hiding method that makes use of erasure correction capa- bility of repeat accumulate codes and
superiority of forbidden zone data hiding. Selective embedding is utilized in the proposed method to determine host
signal samples suitable for data hiding. This method also contains a temporal synchronization scheme in order to
withstand frame drop and insert attacks. The proposed framework is tested by typical broadcast material against
MPEG- 2, H.264 compression, frame-rate conversion attacks, as well as other well-known video data hiding methods.
The decoding error values are reported for typical system parameters. The simulation results indicate that the
framework can be successfully utilized in video data hiding applications.
Title :Differential Phase-Shift Quantum Key Distribution Systems
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/differential-phase-shift-quantum-key-distribution-system
Abstract : Differential phase-shift (DPS) quantum key distribution (QKD) is a unique QKD protocol that is different
from traditional ones, featuring simplicity and practicality. This paper overviews DPS-QKD systems.
Title :Differential Phase-Shift Quantum Key Distribution Systems
Language : Java
Project Link : http://kasanpro.com/p/java/differential-phase-shift-quantum-key-distribution-systems
Abstract : Differential phase-shift (DPS) quantum key distribution (QKD) is a unique QKD protocol that is different
from traditional ones, featuring simplicity and practicality. This paper overviews DPS-QKD systems.
Title :Safeguarding Quantum Key Distribution Through Detection Randomization
Language : Java
Project Link : http://kasanpro.com/p/java/safeguarding-quantum-key-distribution-through-detection-randomization
Abstract : We propose and experimentally demonstrate a scheme to render the detection apparatus of a quantum
key distribution system immune to the main classes of hacking attacks in which the eavesdropper explores the
back-door opened by the single-photon detectors. The countermeasure is based on the creation of modes that are not
deterministically accessible to the eavesdropper. We experimentally show that the use of beamsplitters and extra
single-photon detectors at the receiver station passively creates randomized spatial modes that erase any knowledge
the eavesdropper might have gained when using bright-light faked states. Additionally, we experimentally show a
detectorscrambling approach where the random selection of the detector used for each measurement--equivalent to
an active spatial mode randomization--hashes out the side-channel open by the detection efficiency mismatch-based
attacks. The proposed combined countermeasure represents a practical and readily implementable solution against
the main classes of quantum hacking attacks aimed on the single-photon detector so far, without intervening on the
inner working of the devices.
Title :Safeguarding Quantum Key Distribution Through Detection Randomization
Language : C#
enhanced secure filled online exam management environment mediated by group cryptography techniques using
remote monitoring and control of ports and input. The target domain of this is online exams for any subject's contests
in any level of study, as well as exams in online university courses with students in various remote locations. An easy
solution to the issue of security and cheating for online exams and uses an enhanced Security Control system in the
Online Exam (SeCOnE) which is based on group cryptography with an e-monitoring scheme. This paper also
determines the comparison effects of existing system, and the proposed processes involved in handling failures.
http://kasanpro.com/ieee/final-year-project-center-madurai-reviews
Title :Cryptography - Analysis of Enhanced Approach for Secure Online Exam Process Plan
Language : ASP.NET with C#
Project Link : http://kasanpro.com/p/asp-net-with-c-sharp/secure-online-exam-process-plan-code
Abstract : To conduct the exam for thousand people offline process have several problems, to avoid those problems
with gone for the process online exam is a field that is very popular and made many security assurances. Even
though it fails to control cheating, online exams have not been widely adopted well, but online education is adopted
and using all over the world without any security issues. Education learning from online process not have any problem
and don't disturb to any one, through online test plan we need to control so many things here our work proposes an
enhanced secure filled online exam management environment mediated by group cryptography techniques using
remote monitoring and control of ports and input. The target domain of this is online exams for any subject's contests
in any level of study, as well as exams in online university courses with students in various remote locations. An easy
solution to the issue of security and cheating for online exams and uses an enhanced Security Control system in the
Online Exam (SeCOnE) which is based on group cryptography with an e-monitoring scheme. This paper also
determines the comparison effects of existing system, and the proposed processes involved in handling failures.
Title :Cryptography - Analysis of Enhanced Approach for Secure Online Exam Process Plan
Language : PHP
Project Link : http://kasanpro.com/p/php/secure-online-exam-process-plan-implement
Abstract : To conduct the exam for thousand people offline process have several problems, to avoid those problems
with gone for the process online exam is a field that is very popular and made many security assurances. Even
though it fails to control cheating, online exams have not been widely adopted well, but online education is adopted
and using all over the world without any security issues. Education learning from online process not have any problem
and don't disturb to any one, through online test plan we need to control so many things here our work proposes an
enhanced secure filled online exam management environment mediated by group cryptography techniques using
remote monitoring and control of ports and input. The target domain of this is online exams for any subject's contests
in any level of study, as well as exams in online university courses with students in various remote locations. An easy
solution to the issue of security and cheating for online exams and uses an enhanced Security Control system in the
Online Exam (SeCOnE) which is based on group cryptography with an e-monitoring scheme. This paper also
determines the comparison effects of existing system, and the proposed processes involved in handling failures.
M.Phil Computer Science Cryptography Projects
Title :Encryption and Multiplexing of Fingerprints for Enhanced Security
Language : Matlab
Project Link : http://kasanpro.com/p/matlab/encryption-multiplexing-fingerprints-enhanced-security
Abstract : A novel cryptographic technique is proposed for enhanced security of fingerprint information. An
orthogonal coding scheme is developed to encrypt the given fingerprint image. Multiple encrypted fingerprint images
are then mixed together by using a multiplexing process. The proposed encryption and multiplexing technique not
only enhances the security of confidential fingerprint information by making the information inaccessible to any
intruder having a random code, but also improves the system resource utilization by reducing the storage and/or
transmission bandwidth requirement. The salient features of the technique is that any authorized user can retrieve the
corresponding fingerprint information from the complex encrypted and multiplexed image by a single decryption
process with the authentic key. The proposed cryptographic technique involves a simple architecture by not requiring
any mathematical transformation. Performance of the technique is investigated through computer simulation
employing real-life fingerprint images.
Title :Steganography Using the Twelve Square Substitution Cipher and an Index Variable
Language : Matlab
Project Link : http://kasanpro.com/p/matlab/steganography-using-twelve-square-substitution-cipher-index-variable
Abstract : In this paper we are proposing a technique for secret communication between Alice and Bob. We are
using both cryptography and steganography. Firstly, we encrypt the secret message using our new cipher algorithm
called twelve square substitution cipher algorithm, and then embed the cipher text in the carrier image in 6th and 7th
bit locations or 7th and 8th bit locations or 6th and 8th bit locations of the different pixels (bytes) of the carrier image
depending on the value of an index variable. Here the 8th bit means the least significant bit (LSB) location, the 7th bit
means the LSB minus one location and the 6th bit means the LSB minus two location. The index variable value can
be 0 or 1 or 2. The index variable value will change from 0 to 1 or 1 to 2 or 2 to 0 after each embedding. The initial
value of the index variable depends upon the length of the cipher text. After embedding the resultant image should be
sent to the receiver and receiver should retrieve the cipher text from the said locations and then decrypt by using the
twelve square cipher algorithm to get the secret message. The embedding locations are not same in all pixels, so it is
a stronger approach. The algorithm is implemented using Java programming language. The experimental results says
that the algorithm performs well.