Hi,
I have updated my proposal to melange. It would be great if mentors can
have a look and give feedback to improve it further before deadline.
On Sun, Apr 28, 2013 at 12:40 AM, Sukhbir Singh wrote:
> Hi Hareesan,
>
> > : Exif.Photo.ImageUniqueID or Exif.Image.DateTime, etc ). If its a fixed
>
Hi Hareesan,
> : Exif.Photo.ImageUniqueID or Exif.Image.DateTime, etc ). If its a fixed
> location and if the man-in-middle know that location,and if he know Bob's
> public key (since its public), he could easily get to the message. If MIAB
Alice will use Bob's public key to encrypt the message,
Hey there,
I have been working on the proposal for the browser extension. Here I got
some doubts. The following say how I expect the system could work according
to the MIAB implementation explained in 3.2 part in the research paper [1].
Alice who know Bob's public key. He encrypt the message using
> I'm Hareesan, undergraduate from University of Moratuwa,Sri Lanka.
> Interested in working on the project Steganography Browser Addon. I wish to
> confirm is that a project for GSOC? and Is it a good time to start working
> on my proposal?
>
> I have already gone through few chapters of the paper
Hey there,
I'm Hareesan, undergraduate from University of Moratuwa,Sri Lanka.
Interested in working on the project Steganography Browser Addon. I wish to
confirm is that a project for GSOC? and Is it a good time to start working
on my proposal?
I have already gone through few chapters of the pape