• Home
  • Blog
  • Image Security Application Using Encryption and Digital Watermarking

Image Security Application Using Encryption and Digital Watermarking

0 comments

1- We need a Preface for our report.

2- In the literature review chapter 2 we need a study for embading invisible watermarking into an image using wavelets.

*support it with 5 other studies (include the refrences).(chapter2)

3- We also need a study for techniques to generate and store systamitic AES encryption key for cloud storage appliction.

*Support it with other study.(chapter 2)

4- We need a conclusion and discussion for the report.(chapter 6)

Chapter 5 is not needed

Apply those guideline on the report:

use a unified format for all report pages.

Use a justified alignment for the lines.

Start each chapter in a new page.

Add discussion and conclusion in Chapter 6

Do not add the references as bullet points, and please follow the APA style for formatting the citations and references (please read this guide https://www.mendeley.com/guides/apa-citation-guide).

note: I Will upload the report partlclly so you can understand what is going on. and then once accepted I will provide it all.

About the Author

Follow me


{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}