2011/2012                                                                       

                                                                                            
         

                                                                                            
            BFCI 
             
            Benha Faculty of Computer &  Informatics 
             




[LAB 2 (FONT, TEXT &  CRYPTOGRAPHY] 
[ This Lab allow the student to Know different types of Font & create His own + Know the cryptography techniques & know 
how to use it & make it more and more difficult regarding to its usage and needs  ] 
Learning Activity 1: Computer font 
There are three basic kinds of computer font file data formats: 

       Bitmap fonts consist of a series of dots or pixels representing the image of each glyph in each face and size. 
       Outline fonts (also called vector fonts) use Bézier curves, drawing instructions and mathematical formulas to 
        describe each glyph, which make the character outlines scalable to any size. 
       Stroke fonts use a series of specified lines and additional information to define the profile, or size and shape of the 
        line in a specific face, which together describe the appearance of the glyph. 
       Workshop student Assignment : 

        Create Class '12 OWN font (team members=3) using both pixel & vector technique. (Please find the attached 
        documents) 

        Ref:  

         http://www.fontcapture.com/ 

        http://www.yourfonts.com/print.html 

        http://fontstruct.fontshop.com/ 

        http://www.high‐logic.com/fontcreator.html         

Learning Activity 2: Cryptography  

    Cryptography (or cryptology; from Greek κρυπτός, kryptos, "hidden, secret"; and γράφω, gráphō, "I write") is the 
    practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer 
    science, and engineering. Applications of cryptography include ATM cards, computer passwords, and electronic 
    commerce. 

Substitution (one of the Cryptography methods) method can be divided into 3 forms:  

           Fixed displacement substitution 
           Keyword based substitution
           Matrix based substitution.

Fixed Displacement Substitution: 

           Ciphertext represent a fixed displacement in the alphabet. 
           The relationship between the mapping of plaintext and ciphertext characters are as below: 
            Plaintext: ABCDEFGHIJKLMNOPQRSTUVWXYZ
            Key:           BCDEFGHIJKLMNOPQRSTUVWXYZA 

This encrypts “multimedia”(plaintext) into “nvmujnfejb” (ciphertext) 

Keyword Based Substitution: 

           Simplest type of keyword based substitution is implemented in three steps : 
                1. A word or phrase is selected as keyword and use for forming the letters of the ciphertext alphabet
                2. Repeated letters are omitted after their first occurrence
                3. At the end of the word or phrase, remaining letters of the alphabet are used in the normal sequence
           For example, suppose we use the phrase “MULTIMEDIA UNIVERSITY”. We then form one word and remove the 
            duplicated letters to get a newly formed word “MULTIEDANVRSY”.  
           The remaining alphabet letters are then added at the end of the keyword to give you the keyword‐based mixed 
            alphabet “MULTIEDANVRSYBCFGHJKOPQWXZ” (key) 


                                                                                                                               
© Copyright 2011 BFCI . All Rights Reserved.  
   Example: 
            Plaintext: ABCDEFGHIJKLMNOPQRSTUVWXYZ
            Key:          MULTIEDANVRSYBCFGHJKOPQWXZ 

This encrypts “Hello”(plaintext) to “Aissc”(ciphertext)

Matrix Based Substitution: 

           By placing an alphabet into an n x n matrix or array, one can obtain the ability to design the ciphertext alphabet 
            in many different ways 
           For example, consider the matrix below: 




                                                            

           By extracting the matrix element in a predefined sequence, you can develop a transpose alphabet. 
           If you extract the matrix elements in each column, commencing with column 7 working backward, extracting 
            the elements in column 6, 5 and so on, the alphabet GNUFMTELSZDKRYCJQXBIPWAHOV (key) is created.
           If matrix elements are extracted in a progressive column order, alphabet AHOVBIPWCJQXDKRYELSZFMTGNU 
            (key) is created.

       Workshop student Assignment : 

        Create Class '12 OWN (team members=3) Quote using the difference cryptography techniques.  

Lab Assignment: 
       Multimedia is Combination of different media techniques (Text, Video, Audio…etc.) to trigger a piece of 
        information and to present an Idea. You now know how to create a font for constructing a piece of information. 
        Please make a Poster (Unrestricted Dimension) to use only text to deliver your idea, note, quote…etc. [Typography 
        Art] 
       At the bottom of the “Poster” write your (team) own quote you want to deliver to “Mother Earth”, but it must be 
        “Encrypted”. And upload the “key” on the “Multimedia Class’12” group. 
       Through your creation journey you will configure that the “Typography Artistes” need better software to work on, 
        So, Present an initial GUI interface that handle these needs.  
         
        Your “Creative Work” will be published in an Open Gallery [The Date will be arranged with your T.A.], to check id 
        the “Text” Media Delivered what you need?? This is what the Gallery audience will answer. 
         
         
         
         
         
        Good Luck,  
        Multimedia Class T.A’s  


                                                                                                                              
© Copyright 2011 BFCI . All Rights Reserved.  

More Related Content

PPT
31 uml
DOCX
Bt0077 multimedia systems
PPTX
C# Value Data Types and Reference Data Types
PPT
3 data-types-in-c
PPTX
Literals, primitive datatypes, variables, expressions, identifiers
DOC
Data type
PDF
Learn C# Programming - Data Types & Type Conversion
PPTX
Data types in C language
31 uml
Bt0077 multimedia systems
C# Value Data Types and Reference Data Types
3 data-types-in-c
Literals, primitive datatypes, variables, expressions, identifiers
Data type
Learn C# Programming - Data Types & Type Conversion
Data types in C language

What's hot (20)

PPSX
INTRODUCTION TO C PROGRAMMING
PPTX
Data Types and Variables In C Programming
PPT
Simple uml
PPT
constants, variables and datatypes in C
PPTX
data types in C programming
PPTX
data types in C-Sharp (C#)
PPTX
Concept of c data types
PDF
Impact of indentation in programming
PDF
External domain-specific languages
PPTX
Programming construction tools
PPTX
Data types in C
PPT
Chapter1 c programming data types, variables and constants
PPT
Lect 9(pointers) Zaheer Abbas
PPTX
Tokens in C++
PPTX
Datatype in c++ unit 3 -topic 2
PPT
C++ data types
PPT
Fundamentals of Programming Chapter 4
PDF
JetBrains MPS: Structure Aspect
PPTX
Variables in C++, data types in c++
PPT
Data Types in C
INTRODUCTION TO C PROGRAMMING
Data Types and Variables In C Programming
Simple uml
constants, variables and datatypes in C
data types in C programming
data types in C-Sharp (C#)
Concept of c data types
Impact of indentation in programming
External domain-specific languages
Programming construction tools
Data types in C
Chapter1 c programming data types, variables and constants
Lect 9(pointers) Zaheer Abbas
Tokens in C++
Datatype in c++ unit 3 -topic 2
C++ data types
Fundamentals of Programming Chapter 4
JetBrains MPS: Structure Aspect
Variables in C++, data types in c++
Data Types in C
Ad

Similar to Multimedia Lab Handout [Lab2] [Text] (20)

PDF
Multimedia system and designs ch2-text.pdf
PDF
Abap slide class4 unicode-plusfiles
PPT
Chapter 5 Text
PPT
Lecture6 text
PPT
Chapter 04bnbnbbnmbnmbmbmnbmnnbnmbnnm.ppt
PDF
Chapter 2
PPT
Lecture 4 text
PPT
Lecture 4 text
PPT
Lecture6 text
PPT
LIS3353 SP 12 Week 2a
PPTX
3. COMPUTER SCIENCE I DATA REPRESENTATION.pptx
PPTX
ASCII and Unicode.pptx
PDF
Unicode Explained Includes Index 1st Ed Korpela Jukka K
PDF
Ti1220 Lecture 1: Programming Linguistics
PPTX
Chapter Five
PDF
Cse373 multimedia systems and design
PDF
PDF
Nov 09 P12
DOCX
© Copyright 2013 by Pearson Education, Inc. All Rights Res.docx
Multimedia system and designs ch2-text.pdf
Abap slide class4 unicode-plusfiles
Chapter 5 Text
Lecture6 text
Chapter 04bnbnbbnmbnmbmbmnbmnnbnmbnnm.ppt
Chapter 2
Lecture 4 text
Lecture 4 text
Lecture6 text
LIS3353 SP 12 Week 2a
3. COMPUTER SCIENCE I DATA REPRESENTATION.pptx
ASCII and Unicode.pptx
Unicode Explained Includes Index 1st Ed Korpela Jukka K
Ti1220 Lecture 1: Programming Linguistics
Chapter Five
Cse373 multimedia systems and design
Nov 09 P12
© Copyright 2013 by Pearson Education, Inc. All Rights Res.docx
Ad

Recently uploaded (20)

PPTX
Modernising the Digital Integration Hub
PDF
Developing a website for English-speaking practice to English as a foreign la...
PPTX
2018-HIPAA-Renewal-Training for executives
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
Consumable AI The What, Why & How for Small Teams.pdf
DOCX
search engine optimization ppt fir known well about this
PDF
Five Habits of High-Impact Board Members
PDF
UiPath Agentic Automation session 1: RPA to Agents
PPTX
TEXTILE technology diploma scope and career opportunities
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PPT
What is a Computer? Input Devices /output devices
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Getting started with AI Agents and Multi-Agent Systems
PPTX
Configure Apache Mutual Authentication
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PDF
Zenith AI: Advanced Artificial Intelligence
Modernising the Digital Integration Hub
Developing a website for English-speaking practice to English as a foreign la...
2018-HIPAA-Renewal-Training for executives
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
A contest of sentiment analysis: k-nearest neighbor versus neural network
Taming the Chaos: How to Turn Unstructured Data into Decisions
Consumable AI The What, Why & How for Small Teams.pdf
search engine optimization ppt fir known well about this
Five Habits of High-Impact Board Members
UiPath Agentic Automation session 1: RPA to Agents
TEXTILE technology diploma scope and career opportunities
sbt 2.0: go big (Scala Days 2025 edition)
What is a Computer? Input Devices /output devices
Chapter 5: Probability Theory and Statistics
Getting started with AI Agents and Multi-Agent Systems
Configure Apache Mutual Authentication
A proposed approach for plagiarism detection in Myanmar Unicode text
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
OpenACC and Open Hackathons Monthly Highlights July 2025
Zenith AI: Advanced Artificial Intelligence

Multimedia Lab Handout [Lab2] [Text]

  • 1.   2011/2012            BFCI    Benha Faculty of Computer &  Informatics    [LAB 2 (FONT, TEXT &  CRYPTOGRAPHY]  [ This Lab allow the student to Know different types of Font & create His own + Know the cryptography techniques & know  how to use it & make it more and more difficult regarding to its usage and needs  ] 
  • 2. Learning Activity 1: Computer font  There are three basic kinds of computer font file data formats:   Bitmap fonts consist of a series of dots or pixels representing the image of each glyph in each face and size.   Outline fonts (also called vector fonts) use Bézier curves, drawing instructions and mathematical formulas to  describe each glyph, which make the character outlines scalable to any size.   Stroke fonts use a series of specified lines and additional information to define the profile, or size and shape of the  line in a specific face, which together describe the appearance of the glyph.   Workshop student Assignment :  Create Class '12 OWN font (team members=3) using both pixel & vector technique. (Please find the attached  documents)  Ref:    http://www.fontcapture.com/  http://www.yourfonts.com/print.html  http://fontstruct.fontshop.com/  http://www.high‐logic.com/fontcreator.html    Learning Activity 2: Cryptography   Cryptography (or cryptology; from Greek κρυπτός, kryptos, "hidden, secret"; and γράφω, gráphō, "I write") is the  practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer  science, and engineering. Applications of cryptography include ATM cards, computer passwords, and electronic  commerce.  Substitution (one of the Cryptography methods) method can be divided into 3 forms:    Fixed displacement substitution   Keyword based substitution  Matrix based substitution. Fixed Displacement Substitution:   Ciphertext represent a fixed displacement in the alphabet.   The relationship between the mapping of plaintext and ciphertext characters are as below:  Plaintext: ABCDEFGHIJKLMNOPQRSTUVWXYZ Key:           BCDEFGHIJKLMNOPQRSTUVWXYZA  This encrypts “multimedia”(plaintext) into “nvmujnfejb” (ciphertext)  Keyword Based Substitution:   Simplest type of keyword based substitution is implemented in three steps :  1. A word or phrase is selected as keyword and use for forming the letters of the ciphertext alphabet 2. Repeated letters are omitted after their first occurrence 3. At the end of the word or phrase, remaining letters of the alphabet are used in the normal sequence  For example, suppose we use the phrase “MULTIMEDIA UNIVERSITY”. We then form one word and remove the  duplicated letters to get a newly formed word “MULTIEDANVRSY”.    The remaining alphabet letters are then added at the end of the keyword to give you the keyword‐based mixed  alphabet “MULTIEDANVRSYBCFGHJKOPQWXZ” (key)    © Copyright 2011 BFCI . All Rights Reserved.  
  • 3. Example:  Plaintext: ABCDEFGHIJKLMNOPQRSTUVWXYZ Key:          MULTIEDANVRSYBCFGHJKOPQWXZ  This encrypts “Hello”(plaintext) to “Aissc”(ciphertext) Matrix Based Substitution:   By placing an alphabet into an n x n matrix or array, one can obtain the ability to design the ciphertext alphabet  in many different ways   For example, consider the matrix below:     By extracting the matrix element in a predefined sequence, you can develop a transpose alphabet.   If you extract the matrix elements in each column, commencing with column 7 working backward, extracting  the elements in column 6, 5 and so on, the alphabet GNUFMTELSZDKRYCJQXBIPWAHOV (key) is created.  If matrix elements are extracted in a progressive column order, alphabet AHOVBIPWCJQXDKRYELSZFMTGNU  (key) is created.  Workshop student Assignment :  Create Class '12 OWN (team members=3) Quote using the difference cryptography techniques.   Lab Assignment:   Multimedia is Combination of different media techniques (Text, Video, Audio…etc.) to trigger a piece of  information and to present an Idea. You now know how to create a font for constructing a piece of information.  Please make a Poster (Unrestricted Dimension) to use only text to deliver your idea, note, quote…etc. [Typography  Art]   At the bottom of the “Poster” write your (team) own quote you want to deliver to “Mother Earth”, but it must be  “Encrypted”. And upload the “key” on the “Multimedia Class’12” group.   Through your creation journey you will configure that the “Typography Artistes” need better software to work on,  So, Present an initial GUI interface that handle these needs.     Your “Creative Work” will be published in an Open Gallery [The Date will be arranged with your T.A.], to check id  the “Text” Media Delivered what you need?? This is what the Gallery audience will answer.            Good Luck,   Multimedia Class T.A’s     © Copyright 2011 BFCI . All Rights Reserved.