You are on page 1of 4

TABLE OF CONTENTS

CHAPTER
NO.

TITLE

PAGE
NO.

ABSTRACT

Iv

LIST OF FIGURES

LIST OF ABBREVIATIONS

Xii

LIST OF TABLES

Xiv

INTRODUCTION

1.1 General

1.2 Objective

1.3 Existing System

1.4 Proposed System

LITERATURE SURVEY

2.1 General

2.2 Database Security

2.3 Role Mining With Permission Usage Cardinality

2.4 Relational Database System

2.5 Mondrian Multidimentional K-Anonymity

2.6 Protecting Respondents Identities in microdata

2.7 l-Diversity:Privacy Beyond K-Anonymity

2.8 Fine Grained Authorization

10

2.9 Privacy-Preserving Data Publishing

11

2.10 Workload-Aware Anonymization

13

2.11 K-Anonymization As Spatial Indexing

14

HUMAN SKIN DETECTION FOR


SECRET IMAGE SHARING USING BY
DTCWT

13

3.1 General

13

3.2 Problem Definition

13

3.3 System Architecture

14

3.4 Methodology

16

3.4.1 Multi view Skin Detection

16

3.4.2 Data Server Deployment

17

3.4.3 Access Previleges

18

3.4.4 Data View

19

3.4.5Automatic E-Mail Alert

20

REQUIREMENT ANALYSIS

21

4.1 General

21

4.2 Functional Requirements

21

4.3 Non-Functional Requirements

22

4.4 Hardware Requirements

22

4.5 Software Requirements

22

DESIGN ENGINEERING

23

5.1 General

23

5.2 UML Notation

23

5.3 Use Case Diagram

26

5.4 Activity Diagram

28

5.5 Sequence Diagram

29

5.6 Collaboration Diagram

30

5.7 Data Flow Diagram

31

5.8 State Transition Diagram

34

5.9 Class Diagram

35

5.10 Component Diagram

35

5.11Deployment Diagram

36

IMPLEMENTATION

38

6.1 General

38

6.2 Sample Code

38

6.3 Snap Shots

45

CONCLUSION
REFERENCES

You might also like