Professional Documents
Culture Documents
(IEEE)
ABSTRACT
Iris recognition is the process of recognizing a person by analyzing the apparent pattern of his
or her iris. There is a strong scientific demand for the proliferation of systems, concepts and
algorithms for iris recognition and identification. This is mostly because of the comparatively
short time that iris recognition systems have been around. In comparison to face, fingerprint
and other biometric traits there is still a great need for substantial mathematical and computer-
vision research and insight into iris recognition. One evidence for this is the total lack of publicly
available adequate datasets of iris images.
The program converts a photo of an eye to an 'unrolled' depiction of the subject's iris and
matches the eye to the agent's memory. If a match is found, it outputs a best match. The
current functionality matches that proposed in the original requirements.
Introduction:
A biometric system is essentially a pattern recognition system that operates by acquiring
biometric data from an individual, extracting a feature vector from the acquired data,
comparing this feature vector from the database feature vector. Person authentication has
always been an attractive goal in computer vision. Authentication systems based on human
characteristics such as face, finger, iris and voice are known Biometrics systems. The basis of
every biometric system is to get the input image and generate prominent feature vectors like
color, texture, etc.
IGS LABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinayearproject.com
Our Proposed Iris Recognition
Iris recognition is the most powerful biometric technology there is. Nothing else comes close.
Most accurate
• Scalable
• Opt-in
• Non-contact
• Interoperable cameras
The iris is the plainly visible, colored ring that surrounds the pupil. It is a muscular structure
that controls the amount of light entering the eye, with intricate details that can be measured,
such as striations, pits, and furrows. The iris is not to be confused with the retina, which lines
IGS LABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinayearproject.com
the inside of the back of the eye. No two irises are alike. There is no detailed correlation
between the iris patterns of even identical twins, or the right and left eye of an individual. The
amount of information that can be measured in a single iris is much greater than fingerprints,
and the accuracy is greater than DNA.
Taking a Picture:
An iris recognition camera takes a black and white picture from 5 to 24 inches away, depending
on the type of camera. The camera uses non-invasive, near-infrared illumination (similar to a
TV remote control) that is barely visible and very safe. Proof Positive certified cameras are in
compliance with all applicable international illumination safety standards, including ANSI/IESNA
RP-27.1-96 and IEC 60825-1 Amend.2, Class 1 LED. These are the latest worldwide standards.
Unlike other biometric technologies that can be used in surveillance mode, iris recognition is an
opt-in technology. In order to use the technology you must first glance at a camera. Iris
recognition cannot take place without your permission.
Iris Recognition:
IGS LABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinayearproject.com
In less than a few seconds, even on a database of millions of records, the Iris Code template
generated from a live image is compared to previously enrolled ones to see if it matches any of
them. The decision threshold is automatically adjusted for the size of the search database to
ensure that no false matches occur even when huge numbers of Iris Code templates are being
compared with the live one.
Some of the bits in an Iris Code template signify if some data is corrupted (for example by
reflections, or contact lens boundaries), so that it does not influence the process, and only valid
data is compared. Decision thresholds take account of the amount of visible iris data, and the
matching operation compensates for any tilt of the iris.
A key advantage of iris recognition is its ability to perform identification using a one-to-all
search of a database, with no limitation on the number of Iris Code records and no requirement
for a user first to claim an identity, for example with a card.
TECNOLOGY USED
Software Requirements
Java Swing
Java Applets
Hardware Requirements
Hard disk : 40 GB
RAM : 256 MB
Processor : Pentium IV Processor
IGS LABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinayearproject.com
A Bidirectional Routing Abstraction for Asymmetric
Mobile Ad Hoc Networks (IEEE)
Abstract:
Wireless links are often asymmetric due to heterogeneity in the transmission power of devices,
non-uniform environmental noise, and other signal propagation phenomenon. Unfortunately,
routing protocols for mobile ad hoc networks typically work well only in bidirectional networks.
This paper first presents a simulation study quantifying the impact of asymmetric links on
network connectivity and routing performance. It then presents a framework called BRA that
provides a bidirectional abstraction of the asymmetric network to routing protocols. BRA works
by maintaining multi-hop reverse routes for unidirectional links and provides three new abilities:
improved connectivity by taking advantage of the unidirectional links, reverse route forwarding
of control packets to enable off-the-shelf routing protocols, and detection packet loss on
unidirectional links. Extensive simulations of AODV layered on BRA show that packet delivery
increases substantially (two-fold in some instances) in asymmetric networks compared to
regular AODV, which only routes on bidirectional links.
Existing System:
AODV avoids any unidirectional links in its paths. It achieves this by tracking the unidirectional
links in a black list. Nodes discover unidirectional links and add them to the black list whenever
an RREP sent along the reverse path fails to return an expected acknowledgment. Once added,
a unidirectional link is retained in the black list for a short lifetime. Nodes do not forward RREPs
to any node in their black list.
Proposed System:
IGS LABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinayearproject.com
SYSTEM REQUIREMENTS:
Hardware Interface:
Hard disk : 40 GB
RAM : 512 MB
Processor : Pentium IV
Software Interface:
JDK 1.5
Swing Builder
SQL Server
IGS LABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinayearproject.com
Extracting Actionable Knowledge from Decision Trees
(IEEE)
Most data mining algorithms and tools stop at discovered customer models, producing
distribution information on customer profiles. Such techniques, when applied to industrial
problems such as customer relationship management (CRM), are useful in pointing out
customers who are likely attritors and customers who are loyal, but they require human experts
to post process the discovered knowledge manually. Most of the post processing techniques
have been limited to producing visualization results and interestingness ranking, but they do not
directly suggest actions that would lead to an increase in the objective function such as profit.
In this paper, we present novel algorithms that suggest actions to change customers from an
undesired status (such as attritors) to a desired one (such as loyal) while maximizing an
objective function: the expected net profit. These algorithms can discover cost effective actions
to transform customers from undesirable classes to desirable ones. The approach we take
integrates data mining and decision making tightly by formulating the decision making problems
directly on top of the data mining results in a post processing step. To improve the
effectiveness of the approach, we also present an ensemble of decision trees which is shown to
be more robust when the training data changes. Empirical tests are conducted on both a
realistic insurance application domain and UCI benchmark data.
System Requirements
Software Specification
Operating System : Windows
Front End : HTML
Middle Ware : Java Servlets, Jsp, Struts
Back End : SQL Server
Hardware Specification:
Processor : Intel Pentium IV
Clock Speed : 700 MHZ
RAM : 128 MB
Monitor : 14” SVGA Digital Color Monitor
Keyboard : 107 Keys Keyboard
Floppy Drive : 1.44MB
IGS LABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinayearproject.com
Compact Disk Drive : 700MB
Hard Disk : 20GB
Mouse : Logitech Mouse
Existing System:
When data mining techniques are applied to customer relationship management it resulted in
finding out customer models and behaviors as graphical representations
Problem Findings
Using graphical representations the exact optimal knowledge could not be found
PROPOSED SYSTEM:
Enhanced Decision Tree Algorithm implementation provides the easy way to find out exact
optimal actions that can change the customer from undesired status to desired status while
maximizing the net profit.
Modules:
Main modules:
1. Customer
2. Supporting Team
3. Admin
Sub Modules:
1. Customer:
a. Customer Registration
b. Customer Login
c. View products
d. Purchasing products
e. Apply feedback
2. Supporting Team
a. View Customer Details
b. View Feedback Information
c. Build Customer Profile
d. Profit Calculation
e. Listing Action Sets
3. Admin
a. View Customer Feedback
IGS LABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinayearproject.com
b. View Support team Suggestions
c. View Action Set
d. Selecting Action Set
e. Apply Actions
Data Flow Diagram
ACTION SET
SELECT
BEST
ACTIONS
IGS LABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinayearproject.com
Customer Input
Loyal Probability
Of Customer
Decision Tree
Implementation
Post Processing
Steps
Exact Actions
Conclusion:
Most data mining algorithms and tools produce only the segments and ranked lists of
customers or products in the outputs.
In this project, we present a novel technique to take these results as input and produce
a set of actions that can be applied to transform customers from undesirable classes to
desirable ones.
IGS LABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinayearproject.com
DISTRIBUTED CACHE UPDATING USING DYNAMIC
SOURCE ROUTING PROTOCOL
Objective
The purpose of our project is to proactively disseminating the broken link information to the
nodes that have link in their caches. We define a new cache structure called a cache table and
present a distributed cache update algorithm. Each node maintains in its cache table the
information necessary for cache updates.
Existing System
• TCP performance degrades significantly in Mobile Ad hoc Networks due to the packet losses.
Most of these packet losses result from the Route failures due to network mobility.
• TCP assumes such losses occur because of congestion, thus invokes congestion control
mechanisms such as decreasing congestion windows, raising timeout, etc, thus greatly
reduce TCP throughput.
• However, after a link failure is detected, several packets will be dropped from the network
interface queue; TCP will time out because of these packet losses, as well as for
Acknowledgement losses caused by route failures.
• There is no intimation information regarding the failure links to the node from its
neighboring Node’s. So that the Source Node cannot able to make the Route Decision’s at
the time of data transfer.
Proposed System
• Prior work in Dynamic Source Routing Protocol used heuristics with ad hoc parameters to
predict the lifetime of a link or a route. However, heuristics cannot accurately estimate
timeouts because topology changes are unpredictable.
• Prior researches have proposed to provide link failure feedback to TCP, so that TCP can avoid
responding to route failures as if congestion had occurred.
• We propose proactively disseminating the broken link information to the nodes that have
that link in their caches. We define a new cache structure called a cache table and present a
distributed cache update algorithm. Each node maintains in its cache table the Information
necessary for cache updates.
IGS LABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinayearproject.com
• The Source Node has the information regarding about the destination and the intermediate
node links failure, So that it is useful from Packet loss and reduce the latency time while data
transfer throughout the Network.
DSR-Update Algorithm
A new distributed cache update algorithm:
1. When a node detects a link failure, proactively notifies all reachable nodes that have
cached that link about the link failure.
2. Proactive cache updating also prevents stale routes from being propagated to other
nodes
Software Requirements
Language : Java Networking
Front End Tool : Java Swing
Back End Tool : SQL Server
Operating System: Windows 98.
Hardware Requirements
Processor : Intel Pentium III Processor
RAM : 128MB
Hard Disk : 20GB
Processor Speed: 300 min
IGS LABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinayearproject.com
VAS for Hand Held Device
Objectives:
This specification proposes an implementation of MMS Gateway. The prevalent of system of
handling MMS content is proprietary and non interoperable and hence implementation of MMS
manufactures .The scenario being as such, an MMS Gateway provides a perfect solution. This
1. Reception of MMS messages from mobile phones for forwarding to MMSC (Multimedia
Messaging Service Center).
2. Encoding of received MMS messages in MM7 protocol.
3. Forwarding the encoded message to MMSC for delivery to respective end User
device.
To demonstrate the functioning of MMS Gateway we need some more modules. They are
Sender, Receiver, MMSC and content server. MMSC is useful for buffering the message if the
Messages from handheld devices. The application has also considered the limitations of the
wireless network connections. It has been designed in such a way that it can resolve the
possible data loss during transmission and can cope up with the limitations/constraints of all
proposed target devices irrespective of differences in their sizes, display capabilities, power
Environment:
IGS LABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinayearproject.com
• J2ME 2.0
• J2METK
• MMS API
• MMSTK
• MM7 API
• MM7 Gateway
• WEB Server
• MMSC
1. The proposed software targets resource constrained and more specifically wireless
computing devices.
2. Deployment requires formatting the display in an generic way so that it work for all different
types of devices.
IGS LABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinayearproject.com
Multiple Routing Configurations for Fast IP Network
Recovery (IEEE-2009)
Abstract:
Existing System:
The demands on Internet reliability and availability have increased accordingly. A
disruption of a link in central parts of a network has the potential to affect hundreds of
thousands of phone conversations or TCP connections, with obvious adverse effects. The ability
to recover from failures has always been a central design goal in the Internet. IP networks are
intrinsically robust, since IGP routing protocols like OSPF are designed to update the forwarding
information based on the changed topology after a failure. This network-wide IP re-
convergence is a time consuming process, and a link or node failure is typically followed by a
period of routing instability. During this period, packets may be dropped due to invalid routes.
Proposed System:
In this paper we present a new scheme for handling link and node failures in IP
networks. Multiple Routing Configurations (MRC) is a proactive and local protection mechanism
that allows recovery in the range of milliseconds. MRC allows packet forwarding to continue
IGS LABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinayearproject.com
over preconfigured alternative next-hops immediately after the detection of the failure. Using
MRC as a first line of defense against network failures, the normal IP convergence process can
be put on hold. This process is then initiated only as a consequence of non-transient failures.
Since no global re-routing is performed, fast failure detection mechanisms like fast hellos or
hardware alerts can be used to trigger MRC without compromising network stability. MRC
guarantees recovery from any single link or node failure, which constitutes a large majority of
the failures experienced in a network. MRC makes no assumptions with respect to the root
cause of failure, e.g., whether the packet forwarding is disrupted due to a failed link or a failed
router.
System Requirements:
Hardware requirements:
Processor : Any Processor above 500 MHz
Ram : 128Mb.
Hard Disk : 10 GB.
Compact Disk : 650 Mb.
Input device : Standard Keyboard and Mouse.
Output device : VGA and High Resolution Monitor.
Software requirements:
Operating System : Windows Family.
Language : JDK 1.5
Data Bases : Microsoft SQL Server
Front End : Java Swing
IGS LABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinayearproject.com
Enhancing Search Performance in Unstructured P2P
Networks Based on Users’ Common Interest (IEEE)
Abstract:
Peer-to-peer (P2P) networks establish loosely coupled application-level overlays on top of the
Internet to facilitate efficient sharing of resources. They can be roughly classified as either
structured or unstructured networks. Without stringent constraints over the network topology,
unstructured P2P networks can be constructed very efficiently and are therefore considered
suitable to the Internet environment. However, the random search strategies adopted by these
networks usually perform poorly with a large network Size. In this paper, we seek to enhance
the search performance in unstructured P2P networks through exploiting users’ common
interest patterns captured within a probability-theoretic framework termed the user interest
model (UIM). A search protocol and a routing table updating protocol are further proposed in
order to expedite the search process through self organizing the P2P network into a small
world. Both theoretical and experimental analyses are conducted and demonstrated the
effectiveness and efficiency of our approach.
Existing System:
Peers in unstructured P2P networks to choose their neighbors and locally shared files, using
Flooding techniques.
In purely unstructured P2P networks such as blind search through flooding mechanisms is
usually explored for resource discovery. To find a file, a peer sends out a query to its neighbors
on the overlay, until the query has traveled a certain radius. Despite its simplicity and
robustness, flooding techniques, in general, do not scale. In large networks, the probability of a
successful search may decrease dramatically without significantly enlarging the flooding radius.
Disadvantages:
• Blind Search.
• Future reference is not present in routing table.
• Delay due to absence of Routing Updating table.
IGS LABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinayearproject.com
Proposed System:
In order to improve search performance, guided search. The key problem is what information is
actually eligible to guide the search. Used interest-based locality as the general search
guidance. The basic assumption is that if a peer p0 has a particular file required by another
peer p, and then p0 is likely to have other files to be requested by p in the future. According to
previous successful queries, shortcuts from peer p to several peers p0 are established in order
to expedite subsequent search processes.
Advantages:
• Guided Search.
• Routing updating table.
• Fast Search Technique based on UIM.
System Requirement:
SOFTWARE REQUIREMENTS:-
Java1.3 or More
Java Swing – front end
SQL-back end
Windows 98 or more.
HARDWARE REQUIREMENTS:-
Hard disk : 40 GB
RAM : 128mb
Processor : Pentium
IGS LABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinayearproject.com
TTA
ANNR
ROOX
XWWO
ORRK
K FFO
ORRC
CEE
Objectives:
Tanrox work force is time collection software that is streamlined for billing and invoicing
purposes. Tanrox work force allows time tracking for customer and project related tasks. After
being collected the data can then be exported for invoice generation.
Description:
This guide describes how to execute these activities using Tanrox work force interfaces.
In addition, section Getting started describes initial data setup up to the point when you are
ready to start registering working time with Tanrox work force.
Section contents:
• Overview
• Submit time-track for the current week
• Submit and modify time-track for the selected date/week
• View time-track for a selected month
• Delete reported time-track
• Remove tasks from the Submit Time-Track interface
Registration of time expenses consists of the following activities related to registering and
managing your personal time expenses:
• Submitting time-track
• Viewing personal time-track
• Modifying personal time-track
• Deleting personal time-track
Time-track is Tanrox work force's term used to refer to working time submitted and stored in
the system.
To access the interfaces for submission of time-track use the top-level menu option 'Submit
Time-track'. To access the interfaces for browsing the submitted time-track use the top-level
menu option 'My Time-track'.
Users shall have the 'Submit Time-Track' access right to access interfaces for submission and
browsing of time-track. Note that the users who do not have this right as well as user 'root' will
not see these interfaces at all.
IGS LABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinayearproject.com
The interfaces for submission and management of personal time-track always show and store
time tracked by the user who is currently logged in. To browse the time-track submitted by
other users use the Staff output report (see section Generate staff output report).
To access the interfaces for Tasks, Projects, and Customers Management use top-level menu
option 'Projects & Tasks'.
Each of the access rights regulates user access to the corresponding subset of system
interfaces. System users may have any combination of these access rights. For example:
• A user who has only 'Manage Tasks' access right will be able to create new tasks to
track time expenses for, but will not be allowed to create new projects and customers.
• A user who has only 'Manage Customers' access right will be able to create and modify
customers but will not be able to create projects and tasks.
Grant these access rights to users according their responsibilities in everyday work. If you do
not need to introduce subordination between users and responsibilities, just grant all three
access rights to those users who are responsible for project/task management in your
organization. For example, you can grant them to project managers.
Note that users who do not have some access right will not see the interfaces associated with
this right at all.
See section User management about information on how to grant access rights to system users.
Hardware Requirements:
Processor : Intel P-III based system
Processor Speed : 250 MHz to 833MHz
RAM : 64MB to 256MB
Hard Disk : 2GB to 30GB
Software Requirements:
Language : Java
Web Components : Html, Jsp
Control Components : Servlets
Framework : Struts
Scripting Language : JavaScript
Web Server : Tomcat
Database (Back End) : MySQL
IGS LABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinayearproject.com
Mobile Gadgeteer (Remote pc Accessing using Mobile)
Objectives:
This application is designed to provide the user Access a PC from his mobile device.
This project is to enable the mobile users to control his PC information at their finger tips.
The application must consider the limitations of mobile devices.
This project involves flow of data on the Wireless Application Protocol.
The application must work properly without problems on all targeted devices, power supply and
network support.
Environment:
• J2ME 2.0 TOOL KIT
• J2SDK 1.4.1
• MIDP 2.0
• XML
• Java / Java servlets / Java Server Pages
• Windows NT/200X
Introduction:
The Mobile Information Device Profile (MIDP) is the first and most mature J2ME profile. MIDP is
based on the CLDC and is currently supported by major device manufacturers such as Motorola,
Nokia, Ericsson, and RIM, and by carriers like SprintPCS, Nextel, and NTT DoCoMo. Many
independent software vendors also support MIDP. Table summarizes the target devices for
MIDP 2.0.
IGS LABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinayearproject.com
Table Device Requirements for Mobile Information Device Profile 2.0
Requirement Description
Display Screen- size: 96x54,. Display depth: 1- bit. Pixel shape (aspect ratio):
approximately 1:1.
Input One or more of the following user-input mechanisms: one-handed keyboard, two-
handed keyboard, or touch screen.
Memory 256 kilobytes of non-volatile memory for the MIDP implementation, beyond what’s
required for CLDC. 8 kilobytes of non-volatile memory for application-created
persistent data. 128 kilobytes of volatile memory for the Java runtime.
MIDP, led by Motorola, was initially defined by JSR 37, which produced the MIDP 1.0
specification, and then by JSR 118, which defined the MIDP 2.0 specification. MIDP2.0
enhanced version 1.0 quite a bit. Even though the MIDP specification indicates the use of CLDC
1.0, nothing would preclude MIDP 2.0 (or 1.0) using CLDC 1.1 as its base.
In addition to the MIDP 1.0 APIs for networking, user interfaces, local persistence, and MIDlet
life-cycle, MIDP 2.0 adds APIs for networking, including socket (TCP) streams, UDP datagrams,
serial, push-initiated, and secure connections, as well as a robust security API and policy, and
APIs for sound and even gaming. MIDP 2.0 also formally includes in the profile specification an
update of the MIDP 1.0 Over the Air (OTA) User Initiated Provisioning recommendation
(originally defined as an addendum to the MIDP 1.0 specification), which describes how
applications are to be discovered and downloaded over wireless networks. Table summarizes
the packages available in MIDP 1.0 and MIDP 2.0.
IGS LABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinayearproject.com
Mobile Invoice
Objective:
This specification proposes of Mobile Invoice. The prevalent of system of handling Mobile Billing
content is proprietary and non interoperable and hence Mobile Invoice solution is cumbersome
in real time environment, which is full of devices of multimedia manufactures. The scenario
being as such, a Mobile Invoice Application provides a perfect solution. This Application handles
the following tasks:
Mobile Invoice is useful for paying bills by using the common mobile which is available at low
rates.
This system was implemented using the J2ME, SERVLETS, NETWORKING concepts of J2SE.
Description:
Java™ Platform, Micro Edition (Java ME) is the most ubiquitous application platform for mobile
devices across the globe. It provides a robust, flexible environment for applications running on
a broad range of other embedded devices, such as mobile phones, PDAs , TV set-top boxes,
and printers. The Java ME platform is deployed on millions of devices, supported by leading tool
vendors, and used by companies worldwide. In short, it is the platform of choice for today's
consumer and embedded devices.
Modules:
Authentication Module
Communication Module
Service Module
Billing Module
IGS LABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinayearproject.com
Checking Module
Language Used:
Java,J2ee,J2me
The proposed software targets resource constrained and more specifically wireless
computing devices.
Deployment requires formatting the display in a generic way so that it works for all
different types of devices.
Special attention is needed regarding complexities of network limitations
IGS LABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinayearproject.com
EMBEDDING THE SECURE DATA IN AN AUDIO/VIDEO
AND IMAGE FILES
Objective
The purpose of our project is to enable the development of hiding the data and to encrypt the
data using cryptography. Steganography is the science of hiding information and the goal of
Steganography is to hide the data from a third party where as the goal of cryptography is to
make data unreadable by a third party.
But simply encrypting the data and transmitting it will cause suspension among the viewers so
in this project to avoid such suspension, the data is embedded into a picture and this innocent
looking picture is transmitted.
Existing System
Almost all digital file formats can be used for embedding data, but the formats that are more
suitable are those with a high degree of redundancy. Redundancy can be defined as the bits of
an object that provide accuracy far greater than necessary for the object’s use and display.
Hiding information in text is historically the most important method of embedding data. An
obvious method was to hide a secret message in every nth letter of every word of a text
message.
It is only since the beginning of the Internet and all the different digital file formats that is
decreased in importance. Text embedding data using digital files is not used very often since
text files have a very small amount of redundant data.
Given the proliferation of digital images, especially on the Internet, and given the large amount
of redundant bits present in the digital representation of an image, images are the most popular
cover objects for embedding data.
Proposed System
In the proposed system we can overcome the difficulties of the existing system. In our system
we are introducing all the three concept to secure the information which is send by the user.
The data/information which the sender wants to send will be encrypted and then if the
information is too bigger in size there is an option to compress the data using compression
technique and later that data/information is embedded in the audio/video or image files.
IGS LABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinayearproject.com
For encrypting and decrypting the data/information we have used DES algorithm.
Hiding the text or file inside least significant of an image. By using this intruder could not be
able to see the content since there is no change will be seen compare to original images.
DES algorithm is used to encrypt the message which is hided in the image.
DES is used to give the extra protection for a data which has to be hide.
Compression technology has been used to compress the size of the message in order to save
memory.
Modules:
1. Hiding Test in image
a. Compression
b. Encryption
2. Decryption
a. Decrypting
Encryption Module:
In this module we can hide the text in side the image using least significant bit algorithm.
Before that user has to encrypt the message using DES algorithm. And then he can compress it.
Decryption Module:
In this module user will take care of reading the hidden message from Image and that
message can be decrypted.
System Environment:
Hardware Requirements:
Hard disk : 40 GB
RAM : 512 MB
Processor Speed : 3.00GHz
Processor : Pentium IV Processor
Software Requirements
JDK 1.5 and more
Java Swing – front end
IGS LABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinayearproject.com
Image Processing Editor
PURPOSE OF THE PROJECT:
Image Processing comes with a GUI (graphical user interface) program that lets us play with its
various features. The program is based on AWT (the Abstract Windowing Toolkit) so that more
people can run it. All that is required is an installed Java 1.1 Runtime Environment and a system
that can be put into some sort of graphics mode or work online with Internet Browser.
As there is lot of crazy towards graphics, photos or images editing, processing is very important
in that process. This application is accessible on any system and any platform. This application
can be used to change the setting of old photos, creating a new type of icons to add them into
applications and web sites. This application can be used to change the format of images from
one file type to another in simple way so that users or programmers can use one image in any
format according to compatibility and accessibility in their applications.
IGS LABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinayearproject.com
Gamma
Histogram
Colors Used
Equalize
Normalize
Save histogram
Convert to Grayscale
Invert
Promote
Reduce
Invert
Convert to minimum color type
The above are the operations conducted by the Image Color Processing Module.
3. Filters Module:
This Module applies Filter operations to the pictures the following are the operations conducted
by this module:
• Blur
IGS LABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinayearproject.com
• Sharpen
• Edge Detection
• Emboss
• Psychedelic distillation
• Lithograph
• Horizontal sobel
• Vertical sobel
• Horizontal prewitt
• Vertical prewitt
• Minimum
• Maximum
• Median
• Oil paint
4. View Module:
This Module performs Zoom-in, Zoom-out and Original size Operations.
IGS LABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinayearproject.com
Secure Data Transmission
Objective:
The system deals with security during transmission of data. Commonly used technology is
cryptography. This system deals with implementing security-using Steganography.
Description:
In this technology, the end user identifies an image which is going to act as the carrier of data.
The data file is also selected and then to achieve greater speed of transmission the data file and
image file are compressed and sent. Prior to this the data is embedded into the image and then
sent. The image if hacked or interpreted by a third party user will open up in any image
previewer but not displaying the data. This protects the data from being invisible and hence be
secure during transmission. The user in the receiving end uses another piece of code to retrieve
the data from the image.
Steganography is the art and science of hiding that communication is happening. Classical
Steganography systems depend on keeping the encoding system secret, but modern
Steganography is detectable only if secret information is known, e.g. a secret key. Because of
their invasive nature, Steganography systems leave detectable traces within a medium's
characteristics. This allows an eavesdropper to detect media that has been modified, revealing
that secret communication is taking place. Although the secrecy of the information is not
degraded, its hidden nature is revealed, defeating the main purpose of Steganography.
For JPEG images, Outguess preserves statistics based on frequency counts. As a result,
statistical tests based on frequency counts are unable to detect the presence of steganographic
content. Before embedding data into an image, Outguess can determine the maximum message
size that can be hidden while still being able to maintain statistics based on frequency counts.
Outguess uses generic iterators object to select which bits in the data should be modified. A
seed can be used to modify the behavior of the iterator. It is embedded in the data along with
the rest of the message. By altering the seed, Outguess tries to find a sequence of bits that
minimizes the number of changes in the data that have to be made.
Compression reduces the average code length used to represent the symbols of an alphabet.
Symbols of the source alphabet which occur frequently are assigned with short length codes.
The general strategy is to allow the code length to vary from character to character and to
IGS LABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinayearproject.com
ensure that the frequently occurring character have shorter codes. In Radix64 compression
technique, maps arbitrary input into printable character output. The form of encoding has the
following relevant characteristics.
The range of the function is a character set that is universally re-presentable at all sites, not a
specific binary encoding of that character set. Thus, the characters themselves can be encoded
into whatever form is needed by a specific system. For instance, the character 'E' is represented
in ASCII system as a hexadecimal 45 and in EDCDIC- based system as hexadecimal- c5.
The character set consists of 65 printable characters, one of which is used for padding. With
2^6 = 64 available characters, each character can be used to represent 6 bits of input. No
control characters are included in the set. Thus, the message encoded in Radix-64 can traverse
mail-handling system. That scans the data stream for control characters. The hyphen character
"-” is not included.
CRCSET is an anti-virus utility. Its purpose is to protect programs from third parties
manipulation .CRC set is the most effective weapons against computer viruses. This the Cyclic
Redundancy Check, or CRC, is an error-checking algorithm used in many types of computer
operations, especially in data transfer.
Before transmitting the data, the utility want to calculate the CRC value and attach with data. In
receiving end, the CRC recalculated and based on that calculated value, it will specify the
acceptation or rejection.
Module Description:
This project contains five modules. They are
Graphical User Interface
Data Embed and Retrieve
Compression and Decompression
CRC generation.
CRC Verification
Software Requirements:
Operating System : window 2000 or XP
Software : jdk 1.4 or above
IGS LABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinayearproject.com
Intrusion Detection System (IDS)
Objective:
Description:
Interest and knowledge about computer and network security is growing along
with the need for it. This interest is, no doubt, due to the continued expansion of the Internet
and the increase in the number of businesses that are migrating their sales and information
channels to the Internet. The growth in the use of networked computers in business, especially
for e-mail, has also fueled this interest. Many people are also presented with the post-mortems
of security breaches in high-profile companies in the nightly news and are given the impression
that some bastion of defense had failed to prevent some intrusion. One result of these
influences is that that many people feel that Internet security and Internet firewalls are
synonymous. Although we should know that no single mechanism or method will provide for
the entire computer and network security needs of an enterprise, many still put all their
network security eggs in one firewall basket.
IGS LABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinayearproject.com
Modules:
Hardware:
Processor : Intel Pentium II or above
Memory : 128 MB or above
Hard Disk Drive : 10 GB or above
Keyboard : 108 Keys
IGS LABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinayearproject.com
Efficient key Agreement for Large and Dynamic Multicast
Groups (IEEE)
Secure multicast represents the core component of many web and multimedia applications such
as pay-TV, teleconferencing, real-time distribution of stock market price and etc. The main
challenge for secure multicast is scalability, efficiency and authenticity. In this project, we
propose a scalable, efficient, authenticated group key agreement scheme for large and dynamic
multicast systems. The proposed key agreement scheme is identity-based which uses the
bilinear map over the elliptic curves. Compared with the previously published schemes, our
scheme provides group member authenticity without imposing extra mechanism. Furthermore,
we give a scalability solution based on the subgroups, which has advantages over the existing
schemes. Security analysis shows that our scheme satisfies both forward secrecy and backward
secrecy.
Project Objective:
The objectives of the project are as follows:
• Design the single multicast group.
• Generation of session keys and unique private keys of users.
• Encoding and decoding of text message
• Secure transmission of session key by using encryption algorithm data encryption
standard (DES).
• Design the multi group with multiple data stream in such a way that reduced overhead
of key server.
• Implementing and testing the techniques in a simulation environment.
Existing System:
In the Existing system we use Iolus approach proposed the notion of hierarchy subgroup for
scalable and secure multicast. In this method, a large communication group is divided into
smaller subgroups. Each subgroup is treated almost like a separate multicast group and is
managed by a trusted group security intermediary (GSI). GSI connect between the subgroups
and share the subgroup key with each of their subgroup members. GSIs act as message relays
and key translators between the subgroups by receiving the multicast messages from one
subgroup, decrypting them and then re multicasting them to the next subgroup after encrypting
IGS LABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinayearproject.com
them by the subgroup key of the next subgroup. The GSIs are also grouped in a top-level group
that is managed by a group security controller (GSC),
When group members join or leave only affect subgroup only while the other subgroup will not
be affected. It has the drawback of affecting data path. This occurs in the sense that there is a
need for translating the data that goes from one subgroup, and thereby one key, to another.
This becomes even more problematic when it takes into account that the GSI has to manage
the subgroup and perform the translation needed. The GSI may thus become the bottleneck.
Proposed System:
The advantages over the existing system are, we use an identity tree instead of key tree in our
scheme. Each node in the identity tree is associated with an identity. The leaf node’s identity is
corresponding to the user’s identity and the intermediate node’s identity is generated by its
children’s identity. Hence, in an identity tree, an intermediate node represents set users in the
sub tree rooted at this node.
In our scheme, even though a subgroup controller fails, it does not affect its subgroup.
Because every user in the subgroup can act as the subgroup group controller.
The keys used in each subgroup can be generated by a group of key generation centers (KGCs)
in parallel. All the members in the same subgroup can compute the same subgroup key though
the keys for them are generated by different KGCs. This is a desirable feature especially for the
large-scale network systems, because it minimizes the problem of concentrating the workload
on a single entity.
IGS LABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinayearproject.com
Applet - Applet is a dynamic and interactive program that can run inside a web page
displayed by a java capable browser such as hot java.
Hardware Interface
Hard disk : 40 GB
RAM : 512 MB
Processor Speed : 3.00GHz
Processor : Pentium IV Processor
Software Interface
JDK 1.5
Java Swing
SQL Server
Conclusion:
The Proposed system is an efficient, authenticated, scalable key agreement for large and
dynamic multicast systems, which is based on the bilinear map. Compared with the Existing
system, we use an identity tree to achieve the authentication of the group member. Further, it
solves the scalability problem in multicast communications. Since a large group is divided into
many small groups. Each subgroup is treated almost like a separate multicast group with its
own subgroup key. All the keys used in each subgroup can be generated by a group of KGC’s in
parallel. The intuitively surprising aspect of this scheme is that, even the subgroup controller
aborts, it does not affect the users in this subgroup. Because every user in the subgroup can
act as a subgroup controller. This is a significant feature especially for the mobile and ad hoc
networks. From the security analysis we can see that our scheme satisfies both forward and
backward secrecy.
IGS LABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinayearproject.com
Multihoming Route Control
Abstract
Existing System:
IGS LABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinayearproject.com
policies for route control but aside from marketing statements, little is known about their
quantitative benefits.
Proposed System:
Requirement Analysis:
SOFTWARE REQUIREMENTS:-
• Jdk1.5
• Java Swing
• Windows 98 or more.
HARDWARE REQUIREMENTS:-
Hard disk : 40 GB
RAM : 128mb
Processor : Pentium
IGS LABS Technologies Pvt Ltd. Email:training@igslabs.com, Ph: 9739066172, www.igslabstraining.com, www.makefinayearproject.com