Sample+2

Leader: Gan Wei Liang (Search for low-cost (in terms of proc power) encrpytion and image processing algorithms, and experimentation) Member: Bay Wei Heng (Research and Research) Member: Joel Tan (Integrate algorithm into iphone application)

Area of Focus: 1) Computers 2) Signals Processing 3) Software Engineering

Research Paper Algorithm-based software engineering, integration of programming and web development Resaerch Area: Cryptography: A way of hiding information, usually extremely important Specifically encryption of binary strings and Image Processing Binary Strings: A sequence of numbers consisting of only ones and zeroes Image Processing: Doing signal processing on an image to produce an output Why encrypt? Encryption allows for information to be transferred between non-secure platforms securely History of Cryptography: During WWII, the Germans communicated via transmitted coded messages to each other. Even if the British were able to intercept the messages, they could not understand what they meant, as the Germans had used a machine called the Enigma, which was able to code and decode the messages via the same process, given a key.

Projects Day What: Cross-platform web application to send messages safely and securely

How: Text messages will be converted to black and white images The image will be dissected into pixels, which can then be compressed into strings through image compression These strings can then be encrypted before being converted back into an image, which contains random black and white pixels This image may be embedded into another image with to obtain a fixed file size, and noise will be added for the other parts of the image. This image is then sent to the other user, where the process is reversed and the original message can be obtained The message can be handwritten for further security as it is more difficult to spot font patterns in handwritten messages and text messages

Who (Target Audience): Everyone

When (Proposed Timeline): December Holidays: Read on various encryption methods and build up a formidable research pool T1W1 to T1W8: Decide on language used, begin coding algorithm (for encryption of binary) T1W9-End of March Holidays: Draft out project's day powerpoint and continue coding T2W1-Prelims: Finish coding, research on different ways to convert different types of images (jpg, emf, bmp, png etc.) into binary form, rehearse presentation Prelims-T2W9: Code an image-to-binary algorithm for bmp, possible extensions to other file formats if possible T2W10-End of June Holidays: Converting code such that it is suitable for the platform/application (i.e. iPhone app), Uploading onto platform, test runs T3W1-Semi-finals: Upgrading code (Look for more efficient algorithms that achieve the same level of security), Preparing for presentation Semi-final to Finals: Promoting application to test subjects Finals to Grand-Finals: Feedback

Why (Advantages): Handwritten messages are more unpredictable than typewritten messages Image will be hard to decrypt using conventional means (there are nCK combinations of black and white pixels) No one would guess that a weird image would be a secret message! Brute force cannot be used even if the hacker knows the algorithm but not the key, as the computer cannot recognise that an image is actual text (unless it uses OCR, which is extremely time-consuming, or if the hacker sits at the computer rejecting wrong decoded messages all the time)

Possible Extensions: Image size can be tweaked (i.e. variables in encryption code change as image size changes) Colour Images can be included Adding additional layers of security (e.g. a password to access the image, for starters)

Mr Tan's Feedback

Everything is in place from Intro to Methodology. However, nothing on eXperimentation/disscussion/Conclusion Things to do 1) Methodology - State the method use to create CAPTCHAs (Algo) - Concept behind the algo - Comparison & distinction from other Methods

2) Discussion - Examples of your Captchas - Test setups - Testing it on machines (?%) - Testing on Humans (?%) - Test Result discussions

3) Conclusion - How effective is your algo?