Graduate Program Seminars Nov 30, 2017
Ali Khan
M.Sc. Candidate
Supervisor: Dr. Cao An Wang
Hiding and Extracting secrets in stego images with authentication
Department of Computer Science
Thursday, November 30, 2017, 9:00 am Room: EN 2022
Abstract
The purpose of this software application is to utilize steganography and cryptography techniques together to hide and extract secret information, which can be used to transmit secret and confidential information. The Cryptography scrambles plain text message into encrypted text to obscure its meaning, however steganography hides the message entirely.
In our project, we have implemented least significant bit (LSB) steganography algorithm and cryptography algorithms to achieve our goal. In this encoding algorithm the least significant bit of every pixel is replaced by every message bit. In addition to that, the change occurs only in the bit which is least significant, thus keeping the other more significant bits unaltered. Therefore, this does not affect the original image perceptibility. We have studied both techniques and have provided the implementation in the shape of software application along with test results.
Ghassem Alaee Khangha
M.Sc. Candidate
Supervisors: Drs. Edward Brown & Oscar Meruvia-Pastor
A Window To your Smartphone: Augmented Virtuality using Depth Sensing Cameras for Near-Range Awareness
Department of Computer Science
Thursday, November 30, 2017, 3:30 pm, Room: EN 2022
Abstract
Head-Mounted Displays (HMDs), such as Oculus Rift, due to their design, isolate the user completely from the physical environment. This partial and sometimes total visual isolation which comes as a by-product of providing a better virtual experience, makes it impossible for the user to see, hear and even interact with the physical world while wearing the HMD. One way ofsolving this issue is to move towards an Augmented Virtuality (AV) design. Augmented Virtuality (AV) incorporates a part of reality into the virtual world. In this project, a unique AV environment incorporates the users' personal mobile device by adding near-range awareness to user's experience. Two different methods to achieve near-range awareness are implemented. Results of a study using 25 participants to evaluate the effectiveness of resulting implementations will be discussed.