AUTHENTIFICATION OF DIGITAL IMAGES BY ENCRYPTION AND DECRYPTION WITH PRIMARY KEY IMPLEMENTATION USING ISM ALGORITHM AND STEGANOGRAPHY

ABSTRACT
Encryption/decryption is especially important in wireless communications. This is because wireless circuits are easier to tap than their hard-wired counterparts. Nevertheless, encryption/decryption is a good idea when carrying out any kind of sensitive transaction, such as a credit-card purchase online, or the discussion of a company secret between different departments in the organization. The stronger the cipher -- that is, the harder it is for unauthorized people to break it -- the better, in general. However, as the strength of encryption/decryption increases, so does the cost.

TABLE OF CONTENT
TITLE PAGE
CERTIFICATION
APPROVAL
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENT

CHAPTER ONE
1.0INTRODUCTION
1.1STATEMENT OF PROBLEM
1.2PURPOSE OF STUDY
1.3AIMS AND OBJECTIVES
1.4SCOPE/DELIMITATIONS
1.5LIMITATIONS/CONSTRAINTS
1.6DEFINITION OF TERMS

CHAPTER TWO
2.0LITERATURE REVIEW

CHAPTER THREE
3.0METHODS FOR FACT FINDING AND DETAILED DISCUSSIONS OF THE SYSTEM
3.1 METHODOLOGIES FOR FACT-FINDING 
3.2DISCUSSIONS

CHAPTER FOUR
4.0FUTURES, IMPLICATIONS AND CHALLENGES OF THE SYSTEM 
4.1FUTURES 
4.2IMPLICATIONS
4.3CHALLENGES

CHAPTER FIVE
5.0RECOMMENDATIONS, SUMMARY AND CONCLUSION
5.1RECOMMENDATION
5.2SUMMARY
5.3CONCLUSION
5.4REFERENCES

Subscribe to access this work and thousands more
Overall Rating

0

5 Star
(0)
4 Star
(0)
3 Star
(0)
2 Star
(0)
1 Star
(0)
APA

Possibility, A. (2018). AUTHENTIFICATION OF DIGITAL IMAGES BY ENCRYPTION AND DECRYPTION WITH PRIMARY KEY IMPLEMENTATION USING ISM ALGORITHM AND STEGANOGRAPHY. Afribary. Retrieved from https://afribary.com/works/authentification-of-digital-images-by-encryption-and-decryption-with-primary-key-implementation-using-ism-algorithm-and-steganography-3897

MLA 8th

Possibility, Aka "AUTHENTIFICATION OF DIGITAL IMAGES BY ENCRYPTION AND DECRYPTION WITH PRIMARY KEY IMPLEMENTATION USING ISM ALGORITHM AND STEGANOGRAPHY" Afribary. Afribary, 29 Jan. 2018, https://afribary.com/works/authentification-of-digital-images-by-encryption-and-decryption-with-primary-key-implementation-using-ism-algorithm-and-steganography-3897. Accessed 05 Oct. 2024.

MLA7

Possibility, Aka . "AUTHENTIFICATION OF DIGITAL IMAGES BY ENCRYPTION AND DECRYPTION WITH PRIMARY KEY IMPLEMENTATION USING ISM ALGORITHM AND STEGANOGRAPHY". Afribary, Afribary, 29 Jan. 2018. Web. 05 Oct. 2024. < https://afribary.com/works/authentification-of-digital-images-by-encryption-and-decryption-with-primary-key-implementation-using-ism-algorithm-and-steganography-3897 >.

Chicago

Possibility, Aka . "AUTHENTIFICATION OF DIGITAL IMAGES BY ENCRYPTION AND DECRYPTION WITH PRIMARY KEY IMPLEMENTATION USING ISM ALGORITHM AND STEGANOGRAPHY" Afribary (2018). Accessed October 05, 2024. https://afribary.com/works/authentification-of-digital-images-by-encryption-and-decryption-with-primary-key-implementation-using-ism-algorithm-and-steganography-3897