m.e computer science cryptography projects

4
M.E Computer Science Cryptography Projects Web : www.kasanpro.com Email : [email protected] List Link : http://kasanpro.com/projects-list/m-e-computer-science-cryptography-projects Title :Robust Video Data Hiding using Forbidden Zone Data Hiding and Selective Embedding Language : C# Project Link : http://kasanpro.com/p/c-sharp/robust-video-data-hiding-forbidden-zone-data-hiding-selective-embedding Abstract : Video data hiding is still an important research topic due to the design complexities involved. We propose a new video data hiding method that makes use of erasure correction capa- bility of repeat accumulate codes and superiority of forbidden zone data hiding. Selective embedding is utilized in the proposed method to determine host signal samples suitable for data hiding. This method also contains a temporal synchronization scheme in order to withstand frame drop and insert attacks. The proposed framework is tested by typical broadcast material against MPEG- 2, H.264 compression, frame-rate conversion attacks, as well as other well-known video data hiding methods. The decoding error values are reported for typical system parameters. The simulation results indicate that the framework can be successfully utilized in video data hiding applications. Title :Differential Phase-Shift Quantum Key Distribution Systems Language : C# Project Link : http://kasanpro.com/p/c-sharp/differential-phase-shift-quantum-key-distribution-system Abstract : Differential phase-shift (DPS) quantum key distribution (QKD) is a unique QKD protocol that is different from traditional ones, featuring simplicity and practicality. This paper overviews DPS-QKD systems. Title :Differential Phase-Shift Quantum Key Distribution Systems Language : Java Project Link : http://kasanpro.com/p/java/differential-phase-shift-quantum-key-distribution-systems Abstract : Differential phase-shift (DPS) quantum key distribution (QKD) is a unique QKD protocol that is different from traditional ones, featuring simplicity and practicality. This paper overviews DPS-QKD systems. Title :Safeguarding Quantum Key Distribution Through Detection Randomization Language : Java Project Link : http://kasanpro.com/p/java/safeguarding-quantum-key-distribution-through-detection-randomization Abstract : We propose and experimentally demonstrate a scheme to render the detection apparatus of a quantum key distribution system immune to the main classes of hacking attacks in which the eavesdropper explores the back-door opened by the single-photon detectors. The countermeasure is based on the creation of modes that are not deterministically accessible to the eavesdropper. We experimentally show that the use of beamsplitters and extra single-photon detectors at the receiver station passively creates randomized spatial modes that erase any knowledge the eavesdropper might have gained when using bright-light faked states. Additionally, we experimentally show a detectorscrambling approach where the random selection of the detector used for each measurement--equivalent to an active spatial mode randomization--hashes out the side-channel open by the detection efficiency mismatch-based attacks. The proposed combined countermeasure represents a practical and readily implementable solution against the main classes of quantum hacking attacks aimed on the single-photon detector so far, without intervening on the inner working of the devices. Title :Safeguarding Quantum Key Distribution Through Detection Randomization Language : C#

Upload: vijay-karan

Post on 15-Jul-2015

63 views

Category:

Education


0 download

TRANSCRIPT

Page 1: M.E Computer Science Cryptography Projects

M.E Computer Science Cryptography Projects

Web : www.kasanpro.com     Email : [email protected]

List Link : http://kasanpro.com/projects-list/m-e-computer-science-cryptography-projects

Title :Robust Video Data Hiding using Forbidden Zone Data Hiding and Selective EmbeddingLanguage : C#

Project Link : http://kasanpro.com/p/c-sharp/robust-video-data-hiding-forbidden-zone-data-hiding-selective-embedding

Abstract : Video data hiding is still an important research topic due to the design complexities involved. We proposea new video data hiding method that makes use of erasure correction capa- bility of repeat accumulate codes andsuperiority of forbidden zone data hiding. Selective embedding is utilized in the proposed method to determine hostsignal samples suitable for data hiding. This method also contains a temporal synchronization scheme in order towithstand frame drop and insert attacks. The proposed framework is tested by typical broadcast material againstMPEG- 2, H.264 compression, frame-rate conversion attacks, as well as other well-known video data hiding methods.The decoding error values are reported for typical system parameters. The simulation results indicate that theframework can be successfully utilized in video data hiding applications.

Title :Differential Phase-Shift Quantum Key Distribution SystemsLanguage : C#

Project Link : http://kasanpro.com/p/c-sharp/differential-phase-shift-quantum-key-distribution-system

Abstract : Differential phase-shift (DPS) quantum key distribution (QKD) is a unique QKD protocol that is differentfrom traditional ones, featuring simplicity and practicality. This paper overviews DPS-QKD systems.

Title :Differential Phase-Shift Quantum Key Distribution SystemsLanguage : Java

Project Link : http://kasanpro.com/p/java/differential-phase-shift-quantum-key-distribution-systems

Abstract : Differential phase-shift (DPS) quantum key distribution (QKD) is a unique QKD protocol that is differentfrom traditional ones, featuring simplicity and practicality. This paper overviews DPS-QKD systems.

Title :Safeguarding Quantum Key Distribution Through Detection RandomizationLanguage : Java

Project Link : http://kasanpro.com/p/java/safeguarding-quantum-key-distribution-through-detection-randomization

Abstract : We propose and experimentally demonstrate a scheme to render the detection apparatus of a quantumkey distribution system immune to the main classes of hacking attacks in which the eavesdropper explores theback-door opened by the single-photon detectors. The countermeasure is based on the creation of modes that are notdeterministically accessible to the eavesdropper. We experimentally show that the use of beamsplitters and extrasingle-photon detectors at the receiver station passively creates randomized spatial modes that erase any knowledgethe eavesdropper might have gained when using bright-light faked states. Additionally, we experimentally show adetectorscrambling approach where the random selection of the detector used for each measurement--equivalent toan active spatial mode randomization--hashes out the side-channel open by the detection efficiency mismatch-basedattacks. The proposed combined countermeasure represents a practical and readily implementable solution againstthe main classes of quantum hacking attacks aimed on the single-photon detector so far, without intervening on theinner working of the devices.

Title :Safeguarding Quantum Key Distribution Through Detection RandomizationLanguage : C#

Page 2: M.E Computer Science Cryptography Projects

Project Link : http://kasanpro.com/p/c-sharp/quantum-key-distribution-safeguarding-through-detection-randomization

Abstract : We propose and experimentally demonstrate a scheme to render the detection apparatus of a quantumkey distribution system immune to the main classes of hacking attacks in which the eavesdropper explores theback-door opened by the single-photon detectors. The countermeasure is based on the creation of modes that are notdeterministically accessible to the eavesdropper. We experimentally show that the use of beamsplitters and extrasingle-photon detectors at the receiver station passively creates randomized spatial modes that erase any knowledgethe eavesdropper might have gained when using bright-light faked states. Additionally, we experimentally show adetectorscrambling approach where the random selection of the detector used for each measurement--equivalent toan active spatial mode randomization--hashes out the side-channel open by the detection efficiency mismatch-basedattacks. The proposed combined countermeasure represents a practical and readily implementable solution againstthe main classes of quantum hacking attacks aimed on the single-photon detector so far, without intervening on theinner working of the devices.

M.E Computer Science Cryptography Projects

Title :Postprocessing of the Oblivious Key in Quantum Private QueryLanguage : C#

Project Link : http://kasanpro.com/p/c-sharp/postprocessing-oblivious-key-quantum-private-query

Abstract : Private query is a kind of cryptographic protocols to protect both users' privacies in their communication.For instance, Alice wants to buy one item from Bob's database. The aim of private query is to ensure that Alice canget only one item from Bob, and simultaneously, Bob cannot know which one was taken by Alice. In pursuing highsecurity and efficiency, some quantum private query protocols were proposed. As a practical model, Quantum-Oblivious-Key-Transfer (QOKT)-based private query, which utilizes a QOKT protocol to distribute oblivious keybetween Alice and Bob and then applies the key to achieve the aim of private query, has drawn much attention. Here,we focus on postprocessing of the oblivious key, and the following two contributions are achieved. 1) We analyzethree recently proposed dilution methods and find two of them have serious security loophole. That is, Alice canillegally obtain much additional information about Bob's database by multiple queries. For example, Alice can obtainthe whole database, which contains 104 items, by only 53.4 queries averagely. 2) We present an effectiveerror-correction method for the oblivious key, which can address the realistic scenario with channel noises and makeQOKT-based private query more practical.

Title :Postprocessing of the Oblivious Key in Quantum Private QueryLanguage : Java

Project Link : http://kasanpro.com/p/java/oblivious-key-postprocessing-quantum-private-query

Abstract : Private query is a kind of cryptographic protocols to protect both users' privacies in their communication.For instance, Alice wants to buy one item from Bob's database. The aim of private query is to ensure that Alice canget only one item from Bob, and simultaneously, Bob cannot know which one was taken by Alice. In pursuing highsecurity and efficiency, some quantum private query protocols were proposed. As a practical model, Quantum-Oblivious-Key-Transfer (QOKT)-based private query, which utilizes a QOKT protocol to distribute oblivious keybetween Alice and Bob and then applies the key to achieve the aim of private query, has drawn much attention. Here,we focus on postprocessing of the oblivious key, and the following two contributions are achieved. 1) We analyzethree recently proposed dilution methods and find two of them have serious security loophole. That is, Alice canillegally obtain much additional information about Bob's database by multiple queries. For example, Alice can obtainthe whole database, which contains 104 items, by only 53.4 queries averagely. 2) We present an effectiveerror-correction method for the oblivious key, which can address the realistic scenario with channel noises and makeQOKT-based private query more practical.

Title :Cryptography - Analysis of Enhanced Approach for Secure Online Exam Process PlanLanguage : ASP.NET with VB

Project Link : http://kasanpro.com/p/asp-net-with-vb/secure-online-exam-process-plan

Abstract : To conduct the exam for thousand people offline process have several problems, to avoid those problemswith gone for the process online exam is a field that is very popular and made many security assurances. Eventhough it fails to control cheating, online exams have not been widely adopted well, but online education is adoptedand using all over the world without any security issues. Education learning from online process not have any problemand don't disturb to any one, through online test plan we need to control so many things here our work proposes an

Page 3: M.E Computer Science Cryptography Projects

enhanced secure filled online exam management environment mediated by group cryptography techniques usingremote monitoring and control of ports and input. The target domain of this is online exams for any subject's contestsin any level of study, as well as exams in online university courses with students in various remote locations. An easysolution to the issue of security and cheating for online exams and uses an enhanced Security Control system in theOnline Exam (SeCOnE) which is based on group cryptography with an e-monitoring scheme. This paper alsodetermines the comparison effects of existing system, and the proposed processes involved in handling failures.

http://kasanpro.com/ieee/final-year-project-center-ramanathapuram-reviews

Title :Cryptography - Analysis of Enhanced Approach for Secure Online Exam Process PlanLanguage : ASP.NET with C#

Project Link : http://kasanpro.com/p/asp-net-with-c-sharp/secure-online-exam-process-plan-code

Abstract : To conduct the exam for thousand people offline process have several problems, to avoid those problemswith gone for the process online exam is a field that is very popular and made many security assurances. Eventhough it fails to control cheating, online exams have not been widely adopted well, but online education is adoptedand using all over the world without any security issues. Education learning from online process not have any problemand don't disturb to any one, through online test plan we need to control so many things here our work proposes anenhanced secure filled online exam management environment mediated by group cryptography techniques usingremote monitoring and control of ports and input. The target domain of this is online exams for any subject's contestsin any level of study, as well as exams in online university courses with students in various remote locations. An easysolution to the issue of security and cheating for online exams and uses an enhanced Security Control system in theOnline Exam (SeCOnE) which is based on group cryptography with an e-monitoring scheme. This paper alsodetermines the comparison effects of existing system, and the proposed processes involved in handling failures.

Title :Cryptography - Analysis of Enhanced Approach for Secure Online Exam Process PlanLanguage : PHP

Project Link : http://kasanpro.com/p/php/secure-online-exam-process-plan-implement

Abstract : To conduct the exam for thousand people offline process have several problems, to avoid those problemswith gone for the process online exam is a field that is very popular and made many security assurances. Eventhough it fails to control cheating, online exams have not been widely adopted well, but online education is adoptedand using all over the world without any security issues. Education learning from online process not have any problemand don't disturb to any one, through online test plan we need to control so many things here our work proposes anenhanced secure filled online exam management environment mediated by group cryptography techniques usingremote monitoring and control of ports and input. The target domain of this is online exams for any subject's contestsin any level of study, as well as exams in online university courses with students in various remote locations. An easysolution to the issue of security and cheating for online exams and uses an enhanced Security Control system in theOnline Exam (SeCOnE) which is based on group cryptography with an e-monitoring scheme. This paper alsodetermines the comparison effects of existing system, and the proposed processes involved in handling failures.

M.E Computer Science Cryptography Projects

Title :Encryption and Multiplexing of Fingerprints for Enhanced SecurityLanguage : Matlab

Project Link : http://kasanpro.com/p/matlab/encryption-multiplexing-fingerprints-enhanced-security

Abstract : A novel cryptographic technique is proposed for enhanced security of fingerprint information. Anorthogonal coding scheme is developed to encrypt the given fingerprint image. Multiple encrypted fingerprint imagesare then mixed together by using a multiplexing process. The proposed encryption and multiplexing technique notonly enhances the security of confidential fingerprint information by making the information inaccessible to anyintruder having a random code, but also improves the system resource utilization by reducing the storage and/ortransmission bandwidth requirement. The salient features of the technique is that any authorized user can retrieve thecorresponding fingerprint information from the complex encrypted and multiplexed image by a single decryptionprocess with the authentic key. The proposed cryptographic technique involves a simple architecture by not requiringany mathematical transformation. Performance of the technique is investigated through computer simulationemploying real-life fingerprint images.

Title :Steganography Using the Twelve Square Substitution Cipher and an Index Variable

Page 4: M.E Computer Science Cryptography Projects

Language : Matlab

Project Link : http://kasanpro.com/p/matlab/steganography-using-twelve-square-substitution-cipher-index-variable

Abstract : In this paper we are proposing a technique for secret communication between Alice and Bob. We areusing both cryptography and steganography. Firstly, we encrypt the secret message using our new cipher algorithmcalled twelve square substitution cipher algorithm, and then embed the cipher text in the carrier image in 6th and 7thbit locations or 7th and 8th bit locations or 6th and 8th bit locations of the different pixels (bytes) of the carrier imagedepending on the value of an index variable. Here the 8th bit means the least significant bit (LSB) location, the 7th bitmeans the LSB minus one location and the 6th bit means the LSB minus two location. The index variable value canbe 0 or 1 or 2. The index variable value will change from 0 to 1 or 1 to 2 or 2 to 0 after each embedding. The initialvalue of the index variable depends upon the length of the cipher text. After embedding the resultant image should besent to the receiver and receiver should retrieve the cipher text from the said locations and then decrypt by using thetwelve square cipher algorithm to get the secret message. The embedding locations are not same in all pixels, so it isa stronger approach. The algorithm is implemented using Java programming language. The experimental results saysthat the algorithm performs well.