Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Secured Data Transmission using Cryptographic and Steganographic Techniques ( Down
#1

As we enter the age of universal electronic connectivity, electronic eavesdropping and electronic fraud threaten the prosperity of corporations and individuals. Thus, the role of digital security has become increasingly important. The security requirements within an organization have undergone major changes in the last few decades. Before the widespread use of data processing equipment, data and information valuable to an organization were made invulnerable primarily by physical and administrative means. With the advent of computer networks and the internet however, the design of automated tools which ensure security and privacy of information transferred across networks was inevitable. Though there are several security techniques in use, two of the most prominent ones are steganography and cryptography. In this paper , we discuss these two techniques and how their combination can result in an efficient and secure data transfer software.

Download Full Seminar Report
Downlaod

Mirror
Reply
#2
[attachment=5017]


SECURED WIRELESS DATA TRANSMISSION


ELECTRONICS AND COMMUNICATION
By
GURUPRASAD H 4JC06EC037
KARTHIK D 4JC06EC042
KULDEEP M S 4JC06EC047
MADHUSOODANA BADIKILLYA M 4JC06EC049
Under the guidance of
Smt. B. A SUJATHA KUMARI
Assistant Professor
Department of Electronics and Communication Engineering
SJCE, Mysore

DEPARTMENT OF ELECTRONICS AND COMMUNICATION
ENGINEERING
SRI JAYACHAMARAJENDRA COLLEGE OF ENGINEERING
MYSORE-570006
2009-2010


ABSTRACT


Security is a critical issue in wireless applications both for the users and providers of such systems. A data transmission system, wherein a text data is being transmitted generally adopts cryptography to ensure secure communication over a media.
This project is used to transmit a text message from one place to another place using wireless system. The text message obtained by the keypad is encrypted by using the Microcontroller and the encrypted message is transmitted through wireless system. At the receiver end, the signal is received by the standard receiver and the analog signal is fed to the Microcontroller and it is decrypted by the Microcontroller and the message is displayed over the LCD display. For the efficient data transmission we have used amplitude shift keying (on-off keying). We can use several receivers and the message from the transmitter can be sent to the entire receivers at the same time. Each receiver can be accessed separately by its address. The Microcontroller is used to do the above work. It gets data from the Keyboard and encrypts with a private algorithm. The encrypted message is displayed at the transmitter using an LCD display. At the receiver end the Microcontroller decrypts it with the same algorithm and displays the data over the LCD display.


Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: steganographic matlab codes**and rover, data switching techniques, stripped down means in kannada, secured wireless data transmission, seminar topic design of cryptographic, profile of the problem for steganographic project, project on secured data acquisition system using 8051 microcontroller pdf,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  ULTRA SONIC TECHNIQUES FOR THE DETECTION OF HIDDEN CORROSION IN AIR CRAFT WING SKIN seminar projects crazy 5 4,828 15-04-2016, 08:04 PM
Last Post: knagpur
  Data Encryption Standard (DES) seminar class 2 1,906 20-02-2016, 01:59 PM
Last Post: seminar report asees
  Skin Tone based Secret Data hiding in Images seminar class 9 5,632 23-12-2015, 04:18 PM
Last Post: HelloGFS
Brick XML Data Compression computer science crazy 2 1,535 07-10-2014, 09:26 PM
Last Post: seminar report asees
  Image Processing & Compression Techniques (Download Full Seminar Report) Computer Science Clay 42 19,855 07-10-2014, 07:57 PM
Last Post: seminar report asees
  Data Security in Local Network using Distributed Firewalls computer science crazy 10 6,786 30-03-2014, 04:40 AM
Last Post: Guest
  GREEN CLOUD -A Data Center Approach computer topic 0 701 25-03-2014, 10:13 PM
Last Post: computer topic
  3D-OPTICAL DATA STORAGE TECHNOLOGY computer science crazy 3 7,139 12-09-2013, 08:28 PM
Last Post: Guest
  Security in Data Warehousing seminar surveyer 3 2,416 12-08-2013, 10:24 AM
Last Post: computer topic
Brick Face Recognition using the Techniques Base on Principal Component Analysis (PCA) computer science crazy 3 2,968 04-03-2013, 01:21 PM
Last Post: Guest