Premium Essay

Nt1310 Unit 4 Lab Report

Submitted By
Words 1254
Pages 6
Step 1: Select secret image S and target image T. If the size of the target image T is different from that of the secret image S, change the size of T to be identical to that of S
Step 2: Convert target image into HSV image by using the equation (1) to form new target image T
Step 3: For performing color conversion, first means and of S and T are find out and then find standard deviation quotient from equation (3.5) for each color channel
Step 4: Limit mean value by eight bits and standard deviation quotient to seven bits
Step 5: Based on this value, for each pixel p in each secret image S with color value c where c = r, g, or b, transform c into a new value by (3)
Step 6: if is not smaller than 255 or if it is not larger than 0, then …show more content…
Step 19: Concatenate the bit streams of all T in F in a raster-scan order to form a total bit stream ; use the secret key K to encrypt into another bit stream by using AES encryption; and embed into by replacing fourth bit position.
Step 20: Construct a bit stream I including: 1) encryption key; and 2) total length of before encryption and embed the bit stream I into mosaic image F by the same scheme used in Step 16.
Step 21: Send embedded target image to receiver side through e-mail.
ALGORITHM 2: Secret image recovery

Step 1: Select the image

Similar Documents

Premium Essay

Nt1310 Unit 4 Lab Report

...Biology REN Stage 1 DeArne Holmes SACE: 976199G Assessment task 4 Issues Investigation: Reproduction: Contraceptive Methods The Pill and Implanon (REFERENCES) Knowing how contraceptive methods work is essential to using them properly and increasing the reliability so pregnancy doesn’t occur. The pill is an orally taken pill which is a combination of the hormones estrogen and progesterone to prevent ovulation (2). You can not get pregnant if you don’t ovulate because there in no egg to be fertilized. The pill also works by thickening the mucus around the cervix, which makes it difficult for the sperm to enter the uterus (2). If you use the pill you need to take it everyday at a certain time to receive optimum reliability because it could leave you unprotected and possibly become...

Words: 680 - Pages: 3

Premium Essay

Nt1310 Unit 4 Lab Report

...3a) Refer to Appendix C of block diagram showing how AM DSB FC demodulation can be performed using a receiving USRP. 3b) Using GNURadio Companion and a transmitting USRP, AM DSB FC modulation can be performed on a message signal with frequency 1 kHz and amplitude of one unit. The following code in Fig. 6 has been used to perform such a modulation with a transmitting USRP. Fig. 6 GNURadio Companion code to perform AM DSB FC modulation on a cosinusoidal message signal using a transmitting USRP. The modulated signal from the transmitting USRP is then received by a second USRP, which demodulates the signal, to obtain a signal whose waveform is comparable to that of the original message signal. Fig. 7 shows the code used on a receiving USRP to...

Words: 758 - Pages: 4

Premium Essay

Nt1310 Unit 4 Lab Report

...• Where has it traveled, and where was it ultimately stored? 6. Why is it important to include a time/date stamp in the security incident response form? Stamping the time and date on the security incident form make it hard to manipulate or modify the file and therefore make it indisputable. It also improves accuracy of the occurrence of activities. It also holds those who come in contact with the evidence accountable. Lab Report File Define the phrase chain of custody. Chain of custody: Documentation that describes how evidence is collected, used, and handled during the duration of the case. Paraphrase what you found for your search of Chain of Custody for Digital Evidence. As I read the link below, I found that maintaining digital evidence is more than just securing the true copy. The perseverance of the hardware is just as important when it comes to maintaining the accuracy of the evidence on the hardware. The durability of the hardware that stores the evidence could become an issue if it alters the evidence over a period of time. It is very important that the longevity of hardware that stores evidence be checked and confirmed to ensure that the true copy...

Words: 461 - Pages: 2

Premium Essay

Nt1310 Unit 4 Lab Report

...University of North Carolina at Charlotte Department of Electrical and Computer Engineering Laboratory Experimentation Report Name: Langston Tucker Date: September 28, 2014 Course Number: ECGR 2155 Section: L05 Experiment Titles: Experiment Number: 2, 3, & 4 Lab 2: Basic Circuit Elements Lab 3: DC Voltage and Current Sources Lab 4: Series Circuit Characteristics Lab Partners: James Henderson and Joshua Sayles Equipment List: Objective: Experiment 2 The purpose of this lab was to familiarize ourselves with basic circuit elements. Those being, resistors, capacitors, inductors. Furthermore using basic calculations we determined the dissipated power in our elements. Experiment 3 The purpose of this...

Words: 2987 - Pages: 12

Premium Essay

Nt1310 Unit 4 Lab Report

...Cesium iodide and Alkyl metals salt clusters (Na, K, Rb…. Acetates,), with wide m/e range are commonly used for calibration of mass spectrometers. Polymers as poly ethylene oxide or polypropylene oxide are other excellent calibrators. Dish washing compound lauryl sulfate ethoxylorte, is a good calibrator for the compound for negative ion ESI. Water cluster is another good reference standard, with closely spaced reference peaks the other reference compound used are cesium salt of mono butyl phthalate, perfluyorinated acids, aminomethylphosphonic acid etc. In general a compound is used as a reference, depending upon the calibration required in the lower or higher scale of spectrometer and a with the stable molecular ion with exact m/e value. Nominal Mass. Mass of C12 is taken as 12, is a nominal mass and is a whole number. 1/12 of carbon C12 is 1.nominal mass or µ (a.m.u). In the spectrum it is nominal mass of a sample which is recorded against their relative abundances. Nominal mass for CO2 is 44 and for CH3OH is 32. It is an integer, and is sum of integer masses of elements present in sample compound. Isotopic mass is the exact mass of an isotope of an element, and it is 12 for C12, it is only integer mass. For all other isotopic atoms mass is determined with reference to C12, 1/12 of carbon is µ, is equal to 1.66055x10-27 kg, is taken as standard mass since 1961. Isotopic mass is the mass of that particular atom of an element with reference to C12, 12.000000, For C13; it...

Words: 735 - Pages: 3

Premium Essay

Nt1310 Unit 4 Lab Report

...Discussion: The method by which the mass of a single object was calculated in part 1, is similar in many ways to the method by which the elementary charge was calculated in part 2. Once the relevant data set was either collected or calculated it was first ordered from greatest to least. Next, the first differences between consecutively ordered masses/charges were determined. Thirdly, first differences that were significantly closer to zero than the rest were removed from the data set. Fourthly, first differences that were the multiples of other first differences were removed from the data set. Finally the remaining first differences were averaged in order to determine a mean value for the mass/elementary charge. In order for this method for determining elementary charges to be valid, several traits of elementary charges must be true. Firstly, to determine the elementary charge, it must be true that charge is quantized. This means that the values of charge are discrete, not continuous. If this were not the case, ten this method would not be able to determine the elementary charge because an elementary charge would not exist. Secondly, to determine the elementary charge using this method, the mass and charge of the elementary charge must be constant, and it must maintain this consistency regardless of the temperature, the material that the elementary charges are present in, or any other factor. Finally, all charges, and their composite elementary charges must behave...

Words: 923 - Pages: 4

Premium Essay

Telecommunications

...Exercise One Nt1310 Week 1 In: Computers and Technology Exercise One Nt1310 Week 1 NT1310:Week 1 Telecommunications By: Kenneth Martin You are an IT Network Specialist and are required to develop the design of the company’s telephone system for its new building which will begin construction in a few months. In order to get a background which will help when developing the new system, your supervisor asked you to research the current Plain Old Telephone Service (POTS) currently used by the company. You must research the system components and report back to your supervisor , the Telecommunications Manager, within a week. 1. Describe a local land line phone system based on the following Landline Telephone Components: a. Local Loop a local loop is the wired connection from a telephone company's central office in a locality to its customers' telephones at homes and businesses. This connection is usually on a pair of copper wires called twisted pair. The system was originally designed for voice transmission only using analog transmission technology on a single voice channel. Today, your computer's modem makes the conversion between analog signals and digital signals. With Integrated Services Digital Network (ISDN) or Digital Subscriber Line (DSL), the local loop can carry digital signals directly and at a much higher bandwidth than they do for voice only. b. Central Office In telephone communication in the United States, a central office (CO) is an office in a locality...

Words: 496 - Pages: 2

Premium Essay

Test

...ITT Technical Institute IS3340 Windows Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory Hours, 30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110...

Words: 2305 - Pages: 10