Engineering/Diploma/Bsc-IT/Msc-IT Projects

Last year engineering projects created by referring IEEE papers.

Graphical Password Strategy

Project Description: This project intends to maximize the password space, while facilitating memorization of entered secrets. Graphical passwords system is more difficult to be cracked by using the traditional attack methods such as brute force search, dictionary, social engineering and spyware attack. As a result the security level of this system is good. However, there …

Graphical Password Strategy Read More »

Visual Cryptograpgy (Image encryption and decryption)

Project Description:  Visual cryptography allows for image encryption and decryption using visual technique. This technique uses an encoding and decoding scheme to protect the data privacy. By use of this technique no one accept the sender and intended receiver knows about the data transferred. Additional Benifits: Blue book (basic introduction as per university format) Powerpoint Presentation …

Visual Cryptograpgy (Image encryption and decryption) Read More »

file encryption using fibonacci series

Project Description: This project uses Fibonacci series technique for encryption and decryption. In this technique one can secure any type of files. This encryption and decryption algorithm is loss-less and key dependent. It can be used to encrypt input files of various sizes and contents. Additional Benifits: Blue book (basic introduction as per university format) …

file encryption using fibonacci series Read More »

Hybrid AES DES encryption algorithm(any combination of algorithms is available)

Project Description: Aes and Des stand for Advanced encryption standard and data encryption standard respectively. Both are used for encrypting data. Used for data security during data transfers. But both have security holes. So this project combines the features of both the algorithm in a efficient fiestal structure to create an “un-crackable” encryption algorithm. It …

Hybrid AES DES encryption algorithm(any combination of algorithms is available) Read More »