Cryptography and Steganography with Watermarking CSE ppt

The research paper Cryptography and Steganography with Watermarking CSE ppt describes what steganography is. It suggests that Steganography refers to the practice of hiding secret message in communications over a public channel so that an eavesdropper cannot even tell that a secret message is being sent. The aim of this study was to investigate implement and evaluate a number of common methods of pixel-based Steganography.

Methods of Steganography: The research paper explains various methods of steganography. It comments that Steganography includes a vast array of techniques for hiding messages in variety of media. Among these methods are invisible inks, microdots, digital signatures, and covert channels and spread spectrum communication. Steganography is being vastly used through the media of text, images, and audio.

What is Digital Watermarking: The research abstract explains what digital watermarking is. It says that Digital Watermarking is defined as a process of embedding data (watermark) into a multimedia object to help to protect the owner’s right to that object. Digital Watermark is a pattern of bits embedded into a file used to identify the source of illegal copies. For example, if a digital watermark is placed into a master copy of an audio CD or a DVD movie, then all copies of that disc are uniquely identified. If a licensee were to manufacture and distribute them in areas outside of its authorized territory, the watermark provides a trace.

Drawbacks of stenography: The research paper identifies and explains the drawbacks of stenography. It says that A weakness of Steganography is that many people have a hard time locating a normal file even though they have a good idea what they called it. Most people that use these techniques would have to be educated and have computer knowledge.

Conclusion:

The research paper concludes saying that steganography is an instrument of security, but not exclusively secure. There are tradeoffs with Steganography of which the security community is becoming aware: There is a tradeoff between reliability and message size and there is a tradeoff between message size and detect ability. The approach Steganography offers reduces the chance of a message being detected by its inadvertent layer of cover.

Download Cryptography and Steganography with Watermarking CSE ppt.

Cryptography Computer Science Seminar for Students

The research paper Cryptography Computer Science Seminar for Students explains what cryptography is. It suggests that Cryptography presents various methods for taking legible, readable data, and transforming it into unreadable data for the purpose of secure transmission, and then using a key to transform it back into readable data when it reaches its destination.

The most secure techniques use a mathematical algorithm and a variable value known as a ‘key’. Cryptography uses a single key to encrypt i.e. changing data so that it is unrecognizable and useless to an unauthorized person and decrypt a message i.e. changing it back to its original form.

Ways to classify Cryptographic Algorithms: There are several ways of classifying cryptographic algorithms Secret Key Cryptography, which uses a single key for both encryption and decryption. Public Key Cryptography, which uses one key for encryption and another for decryption. Hash Functions uses a mathematical transformation to irreversibly “encrypt” information.

Scope of Cryptography:

The goal of cryptography extends beyond merely making data unreadable; it also extends into user authentication, Privacy/confidentiality, Integrity, Non-repudiation.

The research paper identifies types of algorithms. They are mentioned in the paper as:

  • Secret Key Cryptography (SKC): Uses a single key for both encryption and decryption
  • Public Key Cryptography (PKC): Uses one key for encryption and another for decryption
  • Hash Functions: Uses a mathematical transformation to irreversibly “encrypt” information

Application of Cryptography: It is suggested in the paper that Cryptography is used in:

  1. Secure Communication
  2. Identification and Authentication
  3. E-Commerce and
  4. Digital Signatures

Conclusion:

The research paper concludes on a note that Cryptography is the gold standard for security. It is used to protect the transmission and storage of data between two parties by encrypting it into an unreadable format.

Cryptography has enabled the first wave of secure transmissions, which has helped fuel the growth of transactions like shopping, banking, and finance over the world’s biggest public network, the Internet.

Network Security and Cryptography CSE Seminar Download

The research paper Network Security and Cryptography CSE Seminar Download explains the reasons for security requirement. It says that there are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect of secure communications is that of cryptography. Cryptography is the science of writing in secret code and is an ancient art.

The first documented use of cryptography in writing dates back to circa 1900 B.C. when an Egyptian scribe used non-standard hieroglyphs in an inscription. In data and telecommunications, cryptography is necessary when communicating over any untrusted medium, which includes just about any network, particularly the Internet.

How it is done: The research paper explains how encryption is done. It says that the receiver applies the same key (or rule set) to decrypt the message and recover the plain text. Because a single key is used for both functions, secret key cryptography is also called symmetric encryption. 

With this form of cryptography, it is obvious that the key must be known to both the sender and the receiver; that, in fact, is the secret. The biggest difficulty with this approach, of course, is the distribution of the key. Secret key cryptography schemes are generally categorized as being either stream ciphers or block ciphers.

Latest Cryptographic Techniques:

The research paper identifies the two latest cryptographic techniques:

  • Message Digest (MD) algorithms
  • Secure Hash Algorithm (SHA)

What is Pretty Good Privacy: The research paper explains PGP. It says that Pretty Good Privacy (PGP) is one of today’s most widely used public key cryptography programs.PGP can be used to sign or encrypt e-mail messages with the mere click of the mouse.

Threats to Network: The research paper identifies different types of threats to Network. All these have been explained in depth.

  1. Application Backdoors
  2. STMP session hijacking
  3. Operation system bugs
  4. Denial of service
  5. Email bombs
  6. Macros
  7. Viruses
  8. Spam
  9. Redirect bombs

Conclusion:

The research paper concludes saying what cryptography can do. It says that cryptography can hide information while it is in transit or storage. In general, cryptography can:

  • Provide SECRECY.
  • AUTHENTICATE that a message has not changed in transit.

Implicitly authenticate the sender.

MCA Seminar Topics E-Commerce and Cryptography

The research paper MCA Seminar Topics E-Commerce and Cryptography talks in depth about E-Commerce and Cryptography. It says that E-commerce on the worldwide web is a rapidly growing and proliferating field. But there are several differences between commerce in the real world and on the Internet, and perhaps the most fundamental issue is that of trust and security. In order to build secure E-commerce applications, we need to establish a definition of various security requirements.

The following four areas have been identified in the research abstract as the framework for secure E-commerce:

  • Confidentiality: Protecting the data from all but the intended receiver(s).
  • Authentication: Proving one’s identity.
  • Integrity: Ensuring no unauthorized alteration of data.
  • Non-repudiation: Preventing an entity from denying previous commitments or actions.

Functionality of Cryptography: The research paper helps in identifying the main functionalities of cryptography. They are identified as:

§  Encryption as the process of transforming information so that it is unintelligible to an intruder, and

§  Decryption as the process of transforming the encrypted information so that it is intelligible again.

How encryption is done: The information in its original form is known as plain text, and the encrypted message is called cipher text.

 

  • Exchanging or choosing a key pair secretly does secure communication between two persons.
  • The security lies in the fact that the mathematical function and the key are only bound to the sender and receiver, not to anybody else.
  • Keys are very critical to the functionality of cryptographic algorithms and it is sound cryptographic practice to change keys frequently.

Conclusion:

The research paper concludes explaining that there is no gain saying the fact that cryptography plays an essential role in protecting the privacy of electronic information against threats from a variety of potential attackers. Public key cryptography, is the most important technology in modern cryptographic schemes to address issues like key management, authentication, non-repudiation and digital signature cryptosystems with smaller key lengths offer virtually no security. Symmetric-key systems offer an advantage over the public-key systems. Private keys in public-key systems are much larger.

Download MCA Seminar Topics E-Commerce and Cryptography.

Seminar Topic Cryonics On Way to Raising the Dead Nano Technology

The research paper Seminar Topic Cryonics On Way to Raising the Dead Nano Technology explains Cryonics and Nanotechnology. The paper posits that Nanotechnology  is nothing  but  a  technology  which  uses  atoms  with  a  view  to  creating  a  desired  product. It has wider applications in all the fields. Cryonics is an important domain of Nanotechnology. Cryonics is nothing but an attempt of raising the dead – making them alive. First  we   preserve  the  body  then  by  using  molecular  machines  based  nanotechnology  we  could  revive  the  patients  by  repairing  damaged  cells.

History of Cryonics: The paper casts light on the past. It says that historically  cryonics  began  in  1962  with  the  publication  of  “The  prospect  of  immortality” referred  by  Robert  Ettinger, a  founder  and  the  first  president  of  the  cryonics  institute. During  1980’s  the  extent  of  the  damage  from  freezing  process  became  much  clearer  and   better  known, when  the  emphasis  of  the  movement  began  to  shift  to  the  capabilities  of  nanotechnology.

What is Cryonics: The word “cryonics” is the practice of freezing a dead body in hopes of someday reviving it. A Cryonics is the practice of cooling people immediately after death to the point where molecular physical decay completely stops, in the expectation that scientific and medical procedures currently being developed will be able to revive them and restore them to good health later. A patient held in such a state is said to be in ‘cryonic suspension.

Drawbacks: Not all dead can be cryonically preserved. The research abstract says that legal death is a declaration by medical personnel that there is nothing more they can do to save the patient. But if the body is clearly biologically dead, having been sitting at room temperature for a period of time, or having been traditionally embalmed, then cryonicists would hold that such a body is far less revivable than a cryonically preserved patient, because any process of resuscitation will depend on the quality of the structural and molecular preservation of the brain.

Conclusion:

The research paper concludes on the note that Cryonics is a promising field to resurrect the dead. But taking into consideration the financial constraints and other legal issues the field still has miles to go.

Download Seminar Topic Cryonics On Way to Raising the Dead Nano Technology.

Blu Ray Disc The Next Generation Optical Disc Technical Seminar

The research paper Blu Ray Disc The Next Generation Optical Disc Technical Seminar says that the Blu-ray Disc or BD is yet another breakthrough. The industry is set for yet another revolution with the introduction of Blu-ray Discs (BD).

With their high storage capacity, Blu-ray discs can hold and playback large quantities of high-definition video and audio, as well as photos, data and other digital content. Also incorporated are some advanced security and privacy options and convenient accessibility features.

Advantages of BD: A single sided blu ray disc has the capacity to store information of about 27 gigabytes, that’s about the size of 13 hr standard definition movie or more than 2.5 hrs of a high definition movie. While the double layered one can store to about 54 gigabytes.

This enormous storage capability is considered to be the major advantage of the blu- ray disc to that of the conventional DVD’s in the market right now.

The research paper also explains that the name Blu-ray is derived from the underlying technology, which utilizes a blue-violet laser to read and write data. The name is a combination of “Blue” and optical ray “Ray”.

It is suggested in the research abstract that the BD technology utilizes a “blue” (actually blue violet) laser diode operating at a wavelength of 405 nm to read and write data. Conventional DVDs and CDs use red and infrared lasers at 650 nm and 780 nm respectively.

Conditional Access System Technical Seminars for CSE Students

The research paper Conditional Access System Technical Seminars for CSE Students describes what a Conditional Access System (CA) is. It says that a conditional access (CA) system comprises a combination of scrambling and encryption to prevent unauthorized reception. Scrambling is the process of rendering the sound, pictures and data unintelligible. Encryption is the process of protecting the secret keys that have to be transmitted with the scrambled signal in order for the descrambler to work. After descrambling, any defects on the sound and pictures should be imperceptible, i.e. the CA system should be transparent.

Why CA: The research paper explains that the primary purpose of a CA system for broadcasting is to determine which individual receivers/ set-top decoders shall be able to deliver particular program services, or individual programs to the viewers.

How CA should be: The research paper explains how the CA system should be it posits that the CA system should impose a minimum of burden on the authorized viewer at any stage in the transaction. In particular it should not require special action when changing channels (e.g. swapping a smart card or keying in a Personal Identification Number) nor should it significantly delay presentation of picture and sound when “zapping” (a sensible upper limit on the “zapping” time is 1 second). Furthermore, it should be easy to gain initial access to the broadcasts, requiring the minimum of equipment, outlay and effort. Ideally, the complete system would be integrated into the television set which would be able to access any combination of program services to which individual viewers had subscribed.

Conclusion:

The research abstract concludes on a note that the specification or evaluation of a practical CA system requires considerably more depth and detail than could be included in this outline.  In particular, an evaluation of security issues requires a careful analysis of the overall system security. Some of the core concerns could include non-technical issues such as the theft of data.

Download Conditional Access System Technical Seminars for CSE Students.

CSE Seminar Report on Computer Parts

The power point presentation CSE Seminar Report on Computer Parts describes various parts of a computer. The part of the PC that you actually see is the case. It is officially called the system unit.  But generally called as the case.

Everything is connected to the motherboard. A motherboard is a thin, flat piece of circuit board, usually of green or gold color, usually slightly larger than a piece of paper. The CPU (Central Processing Unit, also called the microprocessor) is where all the calculations take place in the PC.

CPUs will be either PGA (Pin Grid Array) or SEC (Single Edge Cartridge. RAM (Random Access Memory) is where the CPU stores programs and data that it is currently using. RAM is measured in units called “bytes“and megabytes. Hard drives store programs and data that are not currently being used by the CPU.

Hard drive capacity is measured in megabytes and Gigabytes. The capacity of a single hard drive can vary from as low as 10 megabytes (very old systems) up to 40, 80,120 or more gigabytes. There are two common types of hard drives: IDE and SCSI.

Any PC might have IDE, SCSI or both installed. IDE drives use a roughly 1.5“wide, 40-pin ribbon cable. SCSI drives will use a roughly 2″ wide, 50-pin cable IDE supports up to two hard drives per controller.

Each ribbon cable has two connectors for hard drives. With two controllers, each controlling two drives, a PC can support up to four IDE drives CD-ROM drives enable the system to access CD-ROM disks. CD-ROM drives are quite large, usually the single largest component inside the PC. They are connected with an IDE cable to an IDE controller.

The floppy drive enables to access floppy diskettes. Floppy ribbon cables are the narrowest ribbon cable, only slightly more than 1″ wide. There is a twist in the cable, usually close to where the floppy cable is connected to the floppy drive. A PC can support up to two floppy drives. If a PC has two floppy drives, they will be connected to the same ribbon cable. Every drive needs to be connected to a power connector. There are several power connectors on one power supply cable.

Download CSE Seminar Report on Computer Parts.

CSE Seminar Topic on Computer viruses

The research paper CSE Seminar Topic on Computer viruses describes extensively the concept of ‘Computer Viruses’ the possible threats and solutions. It starts by commenting on what a computer virus is. It says a virus is a program which reproduces its own code by attaching itself to other programs in such a way that the virus code is executed when the infected program is executed.

The research paper further explains virus saying that a virus can do anything that other programs do. The only difference is that it attaches itself to another program and execute secretly when the host program is run .once a virus is executing it can perform any function, such as  erasing files and programs.

What viruses do: viruses are potentially destructive software that spreads from program to program or from disk to disk. Computer viruses, like biological viruses, need a host to infect; in the case of computer viruses this host is an innocent program. If such a program is transferred to your PC, other programs on your PC will become infected. While most viruses haven’t been written to be destructive, almost all viruses can cause damage to your files–mostly because the viruses themselves are very poorly written programs. If viruses destroy nothing else, they destroy your trust in your PC–something that is quite valuable. Many types of viruses like logic worms, Trojans and worms have been described in the research paper.

Phases of Virus Attack: Viruses come in a great many different forms, but they all potentially have three phases to their execution, the dormant, the infection phase and the attack phase. The research paper identifies three types of virus: Boot sector virus, parasitic virus, stealth virus, polymorphic virus.

Conclusion:

The research paper concludes on a note that the fundamental truth about computer viruses is that they are a people problem. People create viruses for various reasons. People disseminate virus infections either deliberately or as a result of the very human traits of innocence, ignorance, or carelessness. And the people who are the potential victims of this phenomenon can acquire the knowledge to turn a real threat into a reasonably calculated risk that they can solve.

Download CSE Seminar Topic on Computer viruses.

Information Technology Seminars Computer Networks Triple Play Technology

The research paper Information Technology Seminars Computer Networks Triple Play Technology describes what Triple Play Technology is. It says that Triple play technology is nowadays considered as an indisputable trend. The differentiated service architecture is preferred over “hard quality of service” (QoS) integrated service architecture. Moreover it applies perfectly to triple play, as it satisfies differing QoS requirements. In addition, latest developments in the area of video and audio encoding impose new challenges in content delivery systems.

   What is VoIP: Voice over Internet Protocol (VoIP) is a protocol optimized for the transmission of voice through the internet or other packet switched networks. Voice over IP protocols carry telephony signals as digital audio, typically reduced in data rate using speech data compression techniques, encapsulated in a data packet stream over IP.The ability of VoIP is to transmit more than one telephone call down the same broadband connected telephone line. It’s also a location independent, just by having internet connection one can avail this service.

Disadvantages: Some broadband connections may have less than desirable quality. Where IP packets are lost or delayed at any point in the network between VoIP users, there will be a momentary drop-out of voice.

Wi-MAX: The research paper explains what Wi-MAX is it says that at first this wireless communication was started by infrared then Bluetooth then Wi-Fi and now Wi-MAX. The above devices were not capable for communicating for larger distances so one by one they got improved and now finally Wi-MAX has come into existence.

Conclusion:

The research abstract concludes on a note that the converged triple play service delivery is an emerging opportunity for enterprises and consumers, enabling them to enter a new era of user-centric multimedia communication and broadband entertainment. For service providers it is an opportunity to enter into or expand new markets as well as offering increased service differentiation to remain an attractive partner for providing solutions to an established customer base.

Download Information Technology Seminars Computer Networks Triple Play Technology CSE Computer Science Engineering B Tech/ BE Final Project Paper Presentation and Seminar PPT.