Full Project – Design and implementation of digital image cryptosystem with adaptive steganography

Full Project – Design and implementation of digital image cryptosystem with adaptive steganography

Click here to Get this Complete Project Chapter 1-5

CHAPTER ONE

1.1 INTRODUCTION

Maintaining secrecy is very important in a large corporation and because of the intelligence of hackers, it becomes tedious. Already we have cryptography for transmitting secret information. Even though cryptography successfully transmitting secret information, it will give a suspicion to the hackers and it affects unintended users. However this project, DIGITAL STEGANO GRAPHY overcomes this factor and it gives a solution for transmitting secret formation without affecting unintended users. Steganography uses multimedia data as a covering medium (Covering secret information). By using steganography, data (secret information) can hide within data (multimedia data, here multimedia data is an image) and it can be sent anywhere to transfer the message easily without giving any suspicion to others. In this introductory chapter, some topics are treated such as:

  1. Background of the study: This reviews the history of the current system (federal polytechnic Nekede) precisely.
  2. Statement of the problem: this highlights the challenges facing federal polytechnic Nekede.
  3. Objective of the study: this is the main target of this project work. To design a DIGITAL STEGNOGRAPHY as a security measure to avoid unauthorized access to a file that will not only be efficient in monitoring data, enhance works and outdated the old system used in federal polytechnic Nekede.
  4. Significance of the study: this reveals the implementation of the new system and its working capabilities to the former trend.
  5. Limitation of the study: this has to do with my challenges and bottlenecks as the designer of this very project work.
  6. Definition of terms: this is the definition of some vocabularies found in the material.

1.2 BACKGROUND OF THE STUDY     

Steganography is the dark cousin of cryptography, the use of codes. While cryptography provides privacy, steganography is intended to provide secrecy. Privacy is what you need when you use your credit card on the Internet — you don’t want your number revealed to the public. For this, you use cryptography, and send a coded pile of gibberish that only the website can decipher. Though your code may be unbreakable, any hacker can look and see you’ve sent a message. For true secrecy, you don’t want anyone to know you’re sending a message at all.  Early steganography was messy. Before phones, before mail, before horses, messages were sent on foot. If you wanted to hide a message, you had two choices: have the messenger memorize it, or hide it on the messenger. In fact, the Chinese wrote messages on silk and encased them in balls of wax. The wax ball, “la wan,” could then be hidden in the messenger.  Herodotus, an entertaining but less than reliable Greek historian, reports a more ingenious method. Histaeus, the ruler of Miletus, wanted to send a message to his friend Aristagorus, urging revolt against the Persians. Histaeus shaved the head of his most trusted slave and then tattooed a message on the slave’s scalp. After the hair grew back, the slave was sent to Aristagorus with the message safely hidden.  Later in Herodotus’ histories, the Spartans received word that Xerxes was preparing to invade Greece. Their informant, Demeratus, was a Greek in exile in Persia. Fearing discovery, Demeratus wrote his message on the wood backing of a wax tablet. He then hid the message underneath a fresh layer of wax. The apparently blank tablet sailed easily past sentries on the road.

1.3 STATEMENT OF THE PROBLEMS  

The problem which has affected the ineffectiveness of security in companies to the investment growth in Nigeria is numerous:

  1. Increasing rate of computer literacy has brought about agents of hacking data
  2. Problem of data distress and cipher deterring during communication
  3. Unauthorized access to a file

 

  • AIM AND OBJECTIVES OF THE STUDY

The objectives of this study are as follows:

  • To create a DIGITAL STEGNOGRAPHY as a security measure to avoid unauthorized access to a file  that will not only be efficient in monitoring data but enhance secrecy
  • Reduce fraud, insecurity, and employee privacy system. Based on inputting the vital data, a digital stenography as a security measure
  • Resource Protection: This ensures that only authorized users can access resources on the system.
  • To secure all types of system resources is a system’s strength. The different categories of files that can access one system are defined and what access authorization that should be given to these group of files as part of creating security policy.

1.5 SCOPE OF THE STUDY         

This study covers the concept of steganography as a security measure with much emphasis on security operations to the problem of most organizations. The study should limit its scope on security of files as solely carried out on various organizations in our society today.

1.6 SIGNIFICANCE OF THE STUDY   

Steganography as a security measure in these contemporary times is a dire must. For your secrets to be secure, it might be necessary to add protections not provided by your computer operating systems. The effect of steganography as a security measure will offer many areas for specialization including;

Security systems

Allied infrastructure

Securing applications

Securing testing

System auditing

Business continuity planning

Digital forensics

Furthermore, it will serve as an aid to problems which most organization, financial institution and higher institutions face in recent times. It will help in centralizations of digital stenography as a security measure as well as easing fraudulence. It will serve as a linkage between organizations. finally, it would be helpful in system availability. This means that the computing systems used to store and process the system, the security controls used to protect it, and the communication channels used to access it must be functioning correctly. High availability systems aim to remain available at all times, preventing service disruption due to power outages, hardware failures and system upgrades. Ensuring availability also involves preventing denial-of-service attacks

1.7 LIMITATION OF THE STUDY

  1. Programming: This is another aspect of this project that was very difficult to achieve. Due to the difficulty of developing a program towards the hardware aspect, it was limited to software aspect of it alone.
  2. Time Constraint: The time frame given to achieve or accomplish this project was very short and it was carried out under pressure with respect to time.
  3. Financial Constraint: Due to a limited source of finance as a student, the problem became more complex coupled with the financial involvement of every research. The available funds from parents were barely enough.

1.8 DEFINITION OF TERMS

1 Steganography:the use of codes is intended to provide secrecy.

2 WAV: Windows Audio Visual

3 AIFF: Audio Interchange File Format

4 DSSS: Direct Sequence Speed Spectrum

5 DNS: Domain Name Service

6 JPEG: Joint Photographic Experts Group

7 LSB: Least Significant Bit

8 DBMS: Database Management System

9 ASCII: American Standard Code for Information Interchange

Get the Complete Project

This is a premium project material and the complete research project plus questionnaires and references can be gotten at an affordable rate of N3,000 for Nigerian clients and $8 for international clients.

Click here to Get this Complete Project Chapter 1-5

 

 

 

 

 

You can also check other Research Project here:

  1. Accounting Research Project
  2. Adult Education
  3. Agricultural Science
  4. Banking & Finance
  5. Biblical Theology & CRS
  6. Biblical Theology and CRS
  7. Biology Education
  8. Business Administration
  9. Computer Engineering Project
  10. Computer Science 2
  11. Criminology Research Project
  12. Early Childhood Education
  13. Economic Education
  14. Education Research Project
  15. Educational Administration and Planning Research Project
  16. English
  17. English Education
  18. Entrepreneurship
  19. Environmental Sciences Research Project
  20. Guidance and Counselling Research Project
  21. History Education
  22. Human Kinetics and Health Education
  23. Management
  24. Maritime and Transportation
  25. Marketing
  26. Marketing Research Project 2
  27. Mass Communication
  28. Mathematics Education
  29. Medical Biochemistry Project
  30. Organizational Behaviour

32    Other Projects pdf doc

  1. Political Science
  2. Psychology
  3. Public Administration
  4. Public Health Research Project
  5. More Research Project
  6. Transportation Management
  7. Nursing

Education

Essay 

 

 

Full Project – Design and implementation of digital image cryptosystem with adaptive steganography

Click here to Get The Complete Research Project Chapter 1-5

RESEARCH PROJECT CONTENTS
CHAPTER ONE - INTRODUCTION
1.1 Background of the study
1.2 Statement of problem
1.3 Objective of the study
1.4 Research Hypotheses
1.5 Significance of the study
1.6 Scope and limitation of the study
1.7 Definition of terms
1.8 Organization of the study
CHAPETR TWO – LITERATURE REVIEW
2.1. Introduction
2.2. Conceptual Framework
2.3. Theoretical Framework
2.4 Empirical Review
CHAPETR THREE - RESEARCH METHODOLOGY
3.1 Research Design
3.2 Study Area
3.3 Population of the Study
3.4 Sample Size and Sampling Technique
3.5 Instrument for Data Collection
3.6 Validity of the Instrument
3.7 Reliability of the Instrument
3.8 Method of Data Collection
3.9 Method of Data Analysis
3.9 Method of Data Analysis
3.10 Ethical Considerations
CHAPTER FOUR - DATA PRESENTATION AND ANALYSIS
4.1. Introduction
4.2 Demographic Profiles of Respondents
4.2 Research Questions
4.3. Testing of Research Hypothesis
4.4 Discussion of Findings
CHAPTER FIVE – SUMMARY, CONCLUSION & RECOMMENDATIONS
5.1 Introduction
5.2 Summary
5.3 Conclusion
5.4 Recommendation
REFERENCES
APPENDIX


Frequently Asked Questions | Https://eduschooler.com

Frequently Asked Questions

How do I get my choice complete project on any topic?
Simply click on the Download button above and follow the procedure stated.
I have a fresh topic that is not on your website. How do I go about it?
Chat with us on WhatsApp or contact our Instant Help Desk for a custom research project on your topic.
How fast can I get this complete project on any project topic?
Within 15 minutes if you want this exact project topic without adjustment.
Is it a complete research project or just materials?
It is a Complete Research Project i.e Chapters 1-5, Abstract, Table of Contents, Full References, Questionnaires / Secondary Data.
What if I want to change the case study for this topic?
Chat with Our Instant Help Desk Now: +234 708 7083 227 and you will be responded to immediately.
How will I get my complete project?
Your Complete Project Material will be sent to your Email Address in Ms Word document format.
Can I get my Complete Project through WhatsApp?
Yes! We can send your Complete Research Project to your WhatsApp Number.
What if my Project Supervisor made some changes to a topic I picked from your website?
Call Our Instant Help Desk Now: +234 708 7083 227 and you will be responded to immediately.
Do you assist students with Assignment and Project Proposal?
Yes! Call Our Instant Help Desk Now: +234 708 7083 227 and you will be responded to immediately.
What if I do not have any project topic idea at all?
Smiles! We've Got You Covered. Chat with us on WhatsApp Now to Get Instant Help: +234 708 7083 227.
How can I trust this site?
We are genuine and duly registered with the Corporate Affairs Commission. This site runs on Secure Sockets Layer (SSL), ensuring all transactions are highly secure and safe.
Customer Testimonials | Https://eduschooler.com

Our Customers are Happy

Ademola A.

★★★★★

I was skeptical at first, but after placing my order, my full project arrived in my email in under 15 minutes! The process was smooth, clear, and professional. Truly amazing service!

Kwabena K.

★★★★★

I needed a custom project on a new topic. Https://eduschooler.com delivered within 3 days, and the quality was outstanding. They even guided me on how to defend it. Highly recommend!

Michael H.

★★★★★

Fast, reliable, and very professional. My research project was delivered on time, with no hidden charges. The team is trustworthy and supportive.

Fatou B.

★★★★★

I got my full project in minutes and my custom request within 3 days. Their communication is clear, and the material is top-notch. Excellent experience!

James O.

★★★★★

https://eduschooler.com is a lifesaver! My project was delivered exactly as requested. The team is friendly, professional, and highly responsive. Very satisfied!

Ngozi E.

★★★★★

I was worried about paying online, but the team reassured me and delivered my complete project instantly. Transparent and professional service!

Ama S.

★★★★★

I requested a custom topic project and received it in just 3 days. The guidance and quality were excellent. I recommend eduschooler.com to everyone!

Sarah W.

★★★★★

The service is dependable and efficient. My project arrived on time, and every step was transparent. Truly a professional service I trust.

Emmanuel T.

★★★★★

Fast and reliable. My full project was delivered in minutes, and the custom project in 3 days. Communication was excellent throughout.

Aisha N.

★★★★★

Extremely satisfied with the service. My project was delivered promptly, fully transparent, and of high quality. A trustworthy academic partner!

Live Chat
Admin is typing...