logo Hurry, Grab up to 30% discount on the entire course
Order Now logo

Ask This Question To Be Solved By Our ExpertsGet A+ Grade Solution Guaranteed

expert
Mark MohammadPhilosophy
(5/5)

947 Answers

Hire Me
expert
Umar KhalidManagement
(5/5)

576 Answers

Hire Me
expert
Aarushi YadavEnglish
(5/5)

570 Answers

Hire Me
expert
Hardik DixitSociology
(5/5)

710 Answers

Hire Me
Matlab & Mathematica

Secure communication is millennia old, and new methods and cyphers are always being developed as increasing communication is done over the internet

INSTRUCTIONS TO CANDIDATES
ANSWER ALL QUESTIONS

Engineering 102

Project two – Encryption with photos

 

Secure communication is millennia old, and new methods and cyphers are always being developed. As increasing communication is done over the internet, 21st-century engineers will need to confront secure communication like never before. There are many methods of encrypting and decrypting messages, and this project will explore a few of them, including encrypting messages and hiding them in plain sight in an image.

You will be assigned teams of 4.  Each team member will be responsible for analyzing some data, with comprehensive analysis by the whole group. Team members who do not contribute substantially in their groups can be replaced, and team members who are in poorly performing groups may move to other groups.

Four cyphers will be used, one for each member. The team must determine which team member will do which one. For teams with fewer than four members, they need only to do one per team member. So teams of three need only do three of the cyphers. The cyphers are all lower case and contain only letters, numbers and a space. For each, the letters correspond to numbers starting a 1 and going to 217 in increments of 6 (same length of vector as the letters).

 Four image files are provided, one for each team member. Each member should use a different image, but there is not a requirement to use any particular image with any specific cypher. Any image can be used with any cypher, but each member of the team should have his or her own cypher and image unique from the other members on the team (DO NOT CHANGE THE NAME OF IMAGE FILE).

Cypher A

(Alphabet broken in half, count down M-A, then Z-N, “space”, then numbers 0 through 9)

‘M, L, K, J, I, H, G, F, E, D, C, B, A, Z, Y, X, W, V, U, T, S, R, Q, P, O, N, “space”, 0, 1, 2, 3, 4, 5, 6, 7, 8, 9’

Cypher B

(Vowels at the beginning, consonants (all alphabets should be Uppercase), “space”, numbers 0 through 9)

‘A,E,I,O,U,B,C,D,F,………..Y,Z, “space” ,0,1,2, … 9 ’

Cypher C

(Numbers 0 through 9, “space”, vowels in reverse, then all consonants in reverse (all alphabets should be Uppercase))

‘0,1,2, … 9 ,“space”,U,O,I,E,A,Z,Y,X,…….D,C,B’

Cypher D

 (Vowels at the end after Z (all alphabets should be in Uppercase), “space”, numbers 0 through 9)

‘B,C,D,F,……….X,Y,Z,A,E,I,O,U, “space”,0,1,2, … 9 ’

Important programming information:

  • You must use the techniques taught in the course to solve this project.
  • Perform the following analysis in a single MATLAB script file (one per team member) named “Project_2_Firstname_Lastname.m “.
  • Each member must write his or her own code, and team member’s codes may not be identical.
  • The team must work together to divide the work and to complete the final analysis. In all cases except where noted MATLAB must do the computations and analysis and generate the output.
  • Computed values for outputs must be used, values may not be hard coded into the code unless noted.
  • Use comment statements to separate parts of the code and suppress all output to the command window except the required output.
  • The code must be capable of handling any message of any length, not just the one you use as an example.

Related Questions

. The fundamental operations of create, read, update, and delete (CRUD) in either Python or Java

CS 340 Milestone One Guidelines and Rubric  Overview: For this assignment, you will implement the fundamental operations of create, read, update,

. Develop a program to emulate a purchase transaction at a retail store. This  program will have two classes, a LineItem class and a Transaction class

Retail Transaction Programming Project  Project Requirements:  Develop a program to emulate a purchase transaction at a retail store. This

. The following program contains five errors. Identify the errors and fix them

7COM1028   Secure Systems Programming   Referral Coursework: Secure

. Accepts the following from a user: Item Name Item Quantity Item Price Allows the user to create a file to store the sales receipt contents

Create a GUI program that:Accepts the following from a user:Item NameItem QuantityItem PriceAllows the user to create a file to store the sales receip

. The final project will encompass developing a web service using a software stack and implementing an industry-standard interface. Regardless of whether you choose to pursue application development goals as a pure developer or as a software engineer

CS 340 Final Project Guidelines and Rubric  Overview The final project will encompass developing a web service using a software stack and impleme