National Repository of Grey Literature 339 records found  beginprevious198 - 207nextend  jump to record: Search took 0.01 seconds. 
Photos with Timestamp
Mlejnek, Matěj ; Herout, Adam (referee) ; Zemčík, Pavel (advisor)
This thesis describes the design and implementation of a system for creating timestamps for photos in groups. It deals with the ways the group timestamp of multiple photos can be verified all at once. The whole system can be split into four parts. The first part is a mobile application, in which photos are taken by the user. The second part is the server on which photos are backed up and which relays the photos to a server that makes group timestamps. The third part is the server itself that creates the timestamps. The fourth part consists of user tools for retrospectively checking the existence of a valid group timestamp.
Proposal Of Cryptographic Elliptic Curves Generator
Herbrych, Daniel
This paper deals with creation of elliptic curves generator. The purpose is generating disposable elliptic curves for cryptographic protocol. Miracl library is used. The most important issue is to determine the order of the elliptic curve group. SEA algorithm (Schoof–Elkies–Atkin) is used for this purpose. The second goal is to find suitable elliptic curves for the cryptographic purposes.
Multiplatform Test Environment For Efficiency Analysis Of Cryptographic Primitives Used In Elliptic Curves
Brychta, Josef
This paper deals with design of multiplatform test environment for efficiency analysis of cryptographic primitives used in elliptic curves. The test algorithm to generate 1000 random points on the SEC secp256k1 elliptic curve was used on Raspberry Pi 2/3 devices and compared the measured real-time values of the system usage of these devices.
Quantum-Resistant Cryptographic Application For Secure Data Storage On Os Android
Michalec, Pavol
Data security is an essential part of many Android OS applications. This paper presents a secure implementations including Post-Quantum Cryptographic (PQC) protocols that are going to be very important in the near future with the development of quantum computers.
Digital Image Steganography
Mazánek, Antonín ; Šimek, Václav (referee) ; Strnadel, Josef (advisor)
This bachelor's thesis introduces the steganography scientific discipline. It presents its ancient and relative recent history, mentions its current use and outlines the possible directions for steganography future. It introduces steganography into context of hiding information superior domain and highlights differences between other methods in this domain. It describes steganography subdivisions and closer deals with digital image steganography. It presents some known methods and types of digital image data. The thesis also contains more detailed description of image data in PNG format. It describes the implementation of LSB and PVD steganography methods with images in PNG format as cover object and evaluates their key properties, namely: imperceptibility, capacity and robustness. At the end of the thesis, the author's reflection on the results and possibilities of further modifications of the mentioned methods is given. 
Client-Server Mobile Application with Image Processing
Černošek, Bedřich ; Hradiš, Michal (referee) ; Zemčík, Pavel (advisor)
The main goal of this work is creating client-server application with image processing and cryptographic verification of image source and creation time. The work focuses on creating a mobile client application on the Android platform that securly takes photos by mobile device camera, processes captured images and provides a digital signature, timestamp and GPS location. The main part of the work is secure key exchange, encrypted communication, data and energy efficiency of the client-server application. The server application is implemented on the Java EE platform and processes the received image, performs object detection, object recognition in the image and provides a timestamp from a trusted server. Then taken photo can be considered as a trusted electronic document usable as valid evidence for the judical or administrative proceedings.
Message Encryption over Text Messengers for Android
Balvín, David ; Burget, Radek (referee) ; Kolář, Dušan (advisor)
The main purpose of this thesis is to design and implement an application that would handle encrypted communication using several protocols or existing applications. The application is able to handle automatic encryption using a symetric-key algorithm for sending messages and decryption on demand for receiving/reading messages. It also supports asymetric exchange of keys for symetric encryption. A simple user interface is also created for this application, taking ideas from default SMS application for Android and popular Messenger a Whatsapp.
The Description of the Program for Factorization of Large Numbers
Levek, Vladimír
The article describes the algorithm for factorization of large numbers. If there is the result of the product of two prime numbers, then the program can find the factors. The first part of the article generally introduces the problem of factoring large integers and its impact in the field of the cryptography. The next part describes the algorithm and the program for calculation. At the end of the article there is a summary of the possibilities of the program.
Android stock market application
Balaževič, Lukáš ; Ilgner, Petr (referee) ; Zvončák, Vojtěch (advisor)
The aim of the work is to design and implement an android application which will display parameters of cryptocurrencies, technical indicators and will predict the price based on the modern technology of machine learning. In addition to the displaying parameters, the user will be able to set up notifications. Application displays data from the Firebase database. The data are uploaded to an application from two services which run on Ubuntu server and are written in programming language Kotlin and Python. Services are in charge of obtaining and data processing. One of the services takes care of price prediction, the price is predicted using a LSTM neural network where each cryptocurrency has an own training model. The result of the work is a system that takes care of the whole lifecycle of the data from the acquisition, transformation and the presentation to the user. Based on acquired information from the application, the user is able to make statistically correct decisions in the cryptocurrency market without the need to constant market monitoring.

National Repository of Grey Literature : 339 records found   beginprevious198 - 207nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.