logo Use CA10RAM to get 10%* Discount.
Order Nowlogo
(5/5)

Secure communication is millennia old, and new methods and cyphers are always being developed as increasing communication is done over the internet

INSTRUCTIONS TO CANDIDATES
ANSWER ALL QUESTIONS

Engineering 102

Project two – Encryption with photos

 

Secure communication is millennia old, and new methods and cyphers are always being developed. As increasing communication is done over the internet, 21st-century engineers will need to confront secure communication like never before. There are many methods of encrypting and decrypting messages, and this project will explore a few of them, including encrypting messages and hiding them in plain sight in an image.

You will be assigned teams of 4.  Each team member will be responsible for analyzing some data, with comprehensive analysis by the whole group. Team members who do not contribute substantially in their groups can be replaced, and team members who are in poorly performing groups may move to other groups.

Four cyphers will be used, one for each member. The team must determine which team member will do which one. For teams with fewer than four members, they need only to do one per team member. So teams of three need only do three of the cyphers. The cyphers are all lower case and contain only letters, numbers and a space. For each, the letters correspond to numbers starting a 1 and going to 217 in increments of 6 (same length of vector as the letters).

 Four image files are provided, one for each team member. Each member should use a different image, but there is not a requirement to use any particular image with any specific cypher. Any image can be used with any cypher, but each member of the team should have his or her own cypher and image unique from the other members on the team (DO NOT CHANGE THE NAME OF IMAGE FILE).

Cypher A

(Alphabet broken in half, count down M-A, then Z-N, “space”, then numbers 0 through 9)

‘M, L, K, J, I, H, G, F, E, D, C, B, A, Z, Y, X, W, V, U, T, S, R, Q, P, O, N, “space”, 0, 1, 2, 3, 4, 5, 6, 7, 8, 9’

Cypher B

(Vowels at the beginning, consonants (all alphabets should be Uppercase), “space”, numbers 0 through 9)

‘A,E,I,O,U,B,C,D,F,………..Y,Z, “space” ,0,1,2, … 9 ’

Cypher C

(Numbers 0 through 9, “space”, vowels in reverse, then all consonants in reverse (all alphabets should be Uppercase))

‘0,1,2, … 9 ,“space”,U,O,I,E,A,Z,Y,X,…….D,C,B’

Cypher D

 (Vowels at the end after Z (all alphabets should be in Uppercase), “space”, numbers 0 through 9)

‘B,C,D,F,……….X,Y,Z,A,E,I,O,U, “space”,0,1,2, … 9 ’

Important programming information:

  • You must use the techniques taught in the course to solve this project.
  • Perform the following analysis in a single MATLAB script file (one per team member) named “Project_2_Firstname_Lastname.m “.
  • Each member must write his or her own code, and team member’s codes may not be identical.
  • The team must work together to divide the work and to complete the final analysis. In all cases except where noted MATLAB must do the computations and analysis and generate the output.
  • Computed values for outputs must be used, values may not be hard coded into the code unless noted.
  • Use comment statements to separate parts of the code and suppress all output to the command window except the required output.
  • The code must be capable of handling any message of any length, not just the one you use as an example.
(5/5)
Attachments:

Related Questions

. Introgramming & Unix Fall 2018, CRN 44882, Oakland University Homework Assignment 6 - Using Arrays and Functions in C

DescriptionIn this final assignment, the students will demonstrate their ability to apply two ma

. The standard path finding involves finding the (shortest) path from an origin to a destination, typically on a map. This is an

Path finding involves finding a path from A to B. Typically we want the path to have certain properties,such as being the shortest or to avoid going t

. Develop a program to emulate a purchase transaction at a retail store. This program will have two classes, a LineItem class and a Transaction class. The LineItem class will represent an individual

Develop a program to emulate a purchase transaction at a retail store. Thisprogram will have two classes, a LineItem class and a Transaction class. Th

. SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of Sea Ports. Here are the classes and their instance variables we wish to define:

1 Project 1 Introduction - the SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of

. Project 2 Introduction - the SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of Sea Ports. Here are the classes and their instance variables we wish to define:

1 Project 2 Introduction - the SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of

Ask This Question To Be Solved By Our ExpertsGet A+ Grade Solution Guaranteed

expert
Um e HaniScience

570 Answers

Hire Me
expert
Muhammad Ali HaiderFinance

645 Answers

Hire Me
expert
Husnain SaeedComputer science

659 Answers

Hire Me
expert
Atharva PatilComputer science

613 Answers

Hire Me

Get Free Quote!

394 Experts Online