Professional Documents
Culture Documents
DOCUMNT
DOCUMNT
By
A.Ramachandra Reddy
07261A05B9
This is to certify that the project report entitled IMAGE SECURITY being
subitted by Mr. A.Ramachandra Reddy in partial fulfillment for the award of the
The results embodied in this project report have not been submitted to any other
Head of Department
CSE Designation
Acknowledgement
I appreciate the assistance given to me by my Project Guide Ms. K.Uma, for her constant
encouragement and guidance throughout the project.
I express my profound gratitude to our principal DR.G.CHANDRA MOHAN REDDY and our
indebtedness to our institute MAHATMA GANDHI INSTITUTE OF TECHNOLOGY,
GANDIPET.
I am deeply indebted to Mr. Nagesh, Head of the Department of Computer Science and
Engineering, MGIT for their valuable guidance and encouragement throughout the course.
I would like to express sincere thanks to, Ms. K.Uma Assistant Professor, Department of
Computer Science and Engineering, for his kind cooperation in completion of this project.
Objective
The main aim of the project is to provide the secure image transmission. This is
the new technique of providing the security at the time of data transmission without
using any cryptography technique like algorithms. The Image Security is an application,
which concentrates on the standards of data security and content authentication of any
system. In this application we can provide the security by change the content of the
image. We can place the alpha numeric keys inside the content in three different places
than the content of the image can be changed. After than the image cannot be displayed.
Then it will be sended. If any hacker can hack the file the image cannot be displayed.
Only the receiver side application can know about the modified places. After getting the
file the receiver can easily remove the keys and then the image can be displayed.
We need to design software, which provides the users with the flexibility of
sending and receiving images in a secured format. Here the TCP (Transaction control
Protocol) Was involved for sending.
Modules
1. GUI Module.
2. Authentication Module.
3. Security Module.
4. Communication Module.
Software Requirements
1. Introduction
2. System Analysis
a. Existing System
b. proposed System
3. Feasibility Report
a. Technical Feasibility
b. Operational Feasibility
c. Economical Feasibility
a. Overview
b. Modules Description
c. Process Flow
d. SDLC Methodology
e. Software Requirements
f. Hardware Requirements
5. System Design
a. DFD
b. E-R diagram
c. UML
d. Data Dictionary
6. Technology Description
7. Coding
9. Output Screens
10. Reports
11. Bibliography
INTRODUCTION
SYSTEM ANALYSIS
Existing System
In the previous applications also providing the security for the files at the time of
sending by using some cryptography techniques. Like symmetric cryptography and
asymmetric cryptography. In the symmetric cryptography both are using the same key.
And in the asymmetric cryptography both are using the different keys. But by using
these algorithmic techniques we are facing some problems.
Proposed System
This application can overcome all the drawbacks of the previous applications.
This is the new technique I have to prepare. In this application I am using the string
formatted data. Generally every graphical file like video, audio, image, in string format.
This format is helpful for my project. Whenever you can modify the string formatted
data then the file will turn as not valid. about the key places and key. So he can easily
decrypt and he got the original image.
Advantage
The process is very speed compare to previous application. Existing applications
can take much more time for converting the plain text to cipher text.
The key was included in the string formatted data. It is very complicated to find
out that.
Future Enhancements
FEASIBILITY REPORT
Act Finding Techniques
In this system we are going to develop a facility to a user that he will not face any
difficulty at the time of usage like data missing, one way contacts, one view contacts
Feasibility Study
A feasibility study is a high-level capsule version of the entire System analysis and
Design Process. The study begins by classifying the problem definition. Feasibility is to
Operational Feasibility
If there was sufficient support for the project from the management and from the
users.
Technical feasibility
Does the proposed equipment have the technical capacity for using the new system?
The system developed and installed will be good benefit to the organization. The system
will be developed and operated in the existing hardware and software infrastructure.
SDLC METHDOLOGIES
This document play a vital role in the development of life cycle (SDLC) as it
describes the complete requirement of the system. It means for use by developers
SPIRAL MODEL was defined by Barry Boehm in his 1988 article, “A spiral
Model of Software Development and Enhancement. This model was not the first
model to discuss iterative development, but it was the first model to explain why the
iteration models.
design
risks.
N-TIER APPLICATIONS
Enterprise Solutions. While 2-tier, client-server can help us create quick and easy
solutions and may be used for Rapid Prototyping, they can easily become a maintenance
DEFINITION
Simply stated, an n-tier application helps us distribute the overall functionality into
Presentation Layer
Database/Data Store
SOFTWARE REQUIREMENT
The software requirement specification can produce at the culmination of the analysis
task. The function and performance allocated to software as part of system engineering are
refined by established a complete information description, a detailed functional description, a
representation of system behavior, an indication of performance and design constrain,
appropriate validation criteria, and other information pertinent to requirements. This project
requires the following H/W and S/W equipment in order to execute them. They are as given
below.
Software Requirements
Operating System
Software requirements
HARDWARE REQUIREMENT
Hardware Requirements
System Configuration
PROCESS FLOW
DATA FLOW DIAGRAMS
A graphical tool used to describe and analyze the moment of data through a
system manual or automated including the process, stores of data, and delays in the
system.
4. Data Store Here data are stored or referenced by a process in the System.
Dataflow Diagrams
UserId,Password Validation
Sender Authentication Server
check
Send
Receiver
UserId,Password Validation
Sender Authentication Server
check
Sender
Sender
Send File
Receiver
Receiver
Sender
1 : Login()
2 : check()
3 : fails()
4 : getImage()
5 : security()
6 : Send()
Receiver
1 : Login()
2 : check()
3 : fails()
4 : getImage()
5 : Remove Keys()
6 : Save()
Activity Diagram
Sender
Sender
No
Check
yes
Receiver
Receiver
No
Check
yes
File
Send
Save
Deployment Diagram
Login
Place AN Keys
send
save
CODING
import java.io.FileOutputStream;
import java.io.*;
try
byte[] mystr="*.;@%".getBytes();
System.out.println(mystr.length);
FileInputStream fis=new
FileInputStream(name);
+mystr.length*2];
System.out.println(b.length);
System.out.println(bb.length);
fis.read(b);
int j=0;
for(int k=0;k<5;k++)
bb[k]=mystr[j++];
for(int i=5;i<1000;i++)
bb[i]=b[i-5];
int p=0;
for(int k=1000;k<1000+5;k++)
bb[k]=mystr[p++];
for(int i=1005;i<2000;i++)
bb[i]=b[i-10];
int q=0;
for(int k=2000;k<2005;k++)
bb[k]=mystr[q++];
for(int i=2005;i<bb.length;i++)
bb[i]=b[i-15];
}
saveFile(bb);
/* FileOutputStream fos=new
FileOutputStream(name1,true);
fos.write(bb);
fos.close();
FileInputStream fiss=new
FileInputStream(name1);
fiss.read(mb);
int myc=mb.length-5;
for(int i=0;i<bc.length;i++)
{ bc[i]=mb[myc+i];
System.out.println(new String(bc));*/
}catch(Exception e)
{ e.printStackTrace();
String txt ;
txt=fd.getfile();
try
out.write(toSave);
out.close();
catch(IOException e)
problem\n" +
drive is full\n" +
changed\n");
} }
TESTING
Testing Concepts
Testing Methodologies
Levels of Testing
Unit Testing.
Module Testing.
Integration Testing.
System Testing.
Types Of Testing
Smoke Testing.
Regression Testing.
Static Testing.
Dynamic Testing.
Alpha-Testing.
Beta-Testing.
Compatibility Testing.
Installation Testing.
Adhoc Testing.
Testing
subjected for rectification and ensured that product is defect free in order to
Testing can demonstrate the presence of bugs, but not their absence
Testing Methodologies
Black box Testing is the testing process in which tester can perform testing
application.
White box Testing is the testing process in which tester can perform testing
Gray Box Testing is the process in which the combination of black box and
Test Planning
3. Objective of testing,
4. Areas that need to be tested,
Used….
Test Development
Of application.
application
REFERENCES
http://www.answers.com
(8) http://it.toolbLox.com/wiki/index.php/Warehouse_Management