Project two – Encryption with photos
Secure communication is millennia old, and new methods and cyphers are always being developed. As increasing communication is done over the internet, 21st-century engineers will need to confront secure communication like never before. There are many methods of encrypting and decrypting messages, and this project will explore a few of them, including encrypting messages and hiding them in plain sight in an image.
You will be assigned teams of 4. Each team member will be responsible for analyzing some data, with comprehensive analysis by the whole group. Team members who do not contribute substantially in their groups can be replaced, and team members who are in poorly performing groups may move to other groups.
Four cyphers will be used, one for each member. The team must determine which team member will do which one. For teams with fewer than four members, they need only to do one per team member. So teams of three need only do three of the cyphers. The cyphers are all lower case and contain only letters, numbers and a space. For each, the letters correspond to numbers starting a 1 and going to 217 in increments of 6 (same length of vector as the letters).
Four image files are provided, one for each team member. Each member should use a different image, but there is not a requirement to use any particular image with any specific cypher. Any image can be used with any cypher, but each member of the team should have his or her own cypher and image unique from the other members on the team (DO NOT CHANGE THE NAME OF IMAGE FILE).
(Alphabet broken in half, count down M-A, then Z-N, “space”, then numbers 0 through 9)
‘M, L, K, J, I, H, G, F, E, D, C, B, A, Z, Y, X, W, V, U, T, S, R, Q, P, O, N, “space”, 0, 1, 2, 3, 4, 5, 6, 7, 8, 9’
(Vowels at the beginning, consonants (all alphabets should be Uppercase), “space”, numbers 0 through 9)
‘A,E,I,O,U,B,C,D,F,………..Y,Z, “space” ,0,1,2, … 9 ’
(Numbers 0 through 9, “space”, vowels in reverse, then all consonants in reverse (all alphabets should be Uppercase))
‘0,1,2, … 9 ,“space”,U,O,I,E,A,Z,Y,X,…….D,C,B’
(Vowels at the end after Z (all alphabets should be in Uppercase), “space”, numbers 0 through 9)
‘B,C,D,F,……….X,Y,Z,A,E,I,O,U, “space”,0,1,2, … 9 ’
Important programming information:
DescriptionIn this final assignment, the students will demonstrate their ability to apply two ma
Path finding involves finding a path from A to B. Typically we want the path to have certain properties,such as being the shortest or to avoid going t
Develop a program to emulate a purchase transaction at a retail store. Thisprogram will have two classes, a LineItem class and a Transaction class. Th
1 Project 1 Introduction - the SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of
1 Project 2 Introduction - the SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of