The main aim of this Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking .Net project is to identify the intruders while attackers adding any secret key in water marking and without any data packet loss all original files can be stored. This project is a web based application and users can register their details through main index page.

Apart from all his/her personal details like username, email, mobile number, birth date we are going to provide water mark signature option. After registration users can enter into website using username, password and water mark signature where users can embedded images, preview attached images, embedded watermark signature, etc.

Download Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking Project Documentation, Base Paper, Video file.