Professional Documents
Culture Documents
A Project Report
Submitted to Swarnandhra College of Engineering and Technology
in partial fulfillment of the requirements for the award of the degree
MASTER OF COMPUTER APPLICATIONS
by
NETHALA RAJU
(18A25F0012)
Under the guidance of
A.N.L. KUMAR
Professor, Department of MCA
SEETHARAMPURAM, NARASAPUR-534280
DEPARTMENT OF MASTER OF COMPUTER APPLICATIONS
SWARNANDHRA COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
Seetharampuram, Narsapur – 534 280.
CERTIFICATE
This is to certify that this project work entitled “An Efficient and privacy-
I certify that
a. The work contained in the project work is original and has been done by me under the
guidance of my supervisor
b. The work has not been submitted to any other University for the award of any degree or
diploma
c. The guidelines of the University are followed in writing this report.
Date : N. Raju
(18A25F0012)
ACKNOWLEDGEMENT
I extend my heartfelt gratitude to the Almighty for giving me strength in proceeding with
this project title “An Efficient and privacy-preserving Biometric Identification scheme in
cloud computing”.
I express my heartfelt gratitude to my parents for supporting me in all the ways in every
walk of my life.
I express my sincere thanks to Honorable Dr. S.Ramesh Babu, Secretary & Correspondent
of our college for making necessary arrangement for doing the project
I wish to express my gratitude to Dr. S. Suresh Kumar, principal of our college, for giving
us permission to carry out this project.
I express my sincere thanks to Mr. A.N.L. Kumar, Head of the Department of M.C.A. for
his learned suggestions and encouragement which made this project a successful one.
I convey my sincere thanks to my project guide Mr. V.D. Ratna Kumar, for his learned
suggestions and encouragement which made this project a success.
I express my sincere thanks of all the faculty members of our Department of MCA for their
valuable support throughout this project work.
I wish to express my thanks to my friends for their enthusiasm, support and encouragement
for the completion of this project.
N. Raju
1 INTRODUCTION 2
2 LITERATURE SURVEY 4
3 SYSTEM ANALYSIS 6
6 SAMPLE CODE 29
7 SYSTEM TESTING 70
9 CONCLUSION 89
References 90
LIST OF FIGURES
Abstract
Biometric Identification has become most popular in present years. With the
development of cloud computing, database owners are forced to the large size of biometric
data and identification tasks to the cloud to get clear of the expensive storage and estimation
cost. It brings potential threats to user’s privacy.
In this project we proposed an Efficient and privacy-preserving Biometric
identification scheme for cloud data. Specifically, the biometric data is encrypted. To
execute a biometric identification, the database owner encrypts the data and submits it to the
cloud. The cloud performs identification tasks on the encrypted database and submit the
result to the database owner. Compared with previous scheme, The proposed scheme
achieves a better performance for identification procedures.
1
1. INTRODUCTION
BIOMETRIC identification has raised increasingly attention since it provides a promising
way to identify users. Compared with traditional authentication methods based on
passwords and identification cards, biometric identification is considered to be more reliable
and convenient. Additionally, biometric identification has been widely applied in many
fields by using biometric traits such as fingerprint, iris , and facial patterns , which can be
collected from various sensors. In a biometric identification system, the database owner
such as the FBI who is responsible to manage the national fingerprints database, may desire
to outsource the enormous biometric data to the cloud server (e.g., Amazon) to urge obviate
the expensive storage and computation costs. However, to preserve the privacy of biometric
data, the biometric data has to be encrypted before outsourcing. Whenever a FBI’s partner
(e.g., the police station) wants to authenticate an individual’s identity, he turns to the FBI
and generates an identification query by using the individual’s biometric traits (e.g.,
fingerprints, irises, voice patterns, facial patterns etc.). Then, the FBI encrypts the query and
submits it to the cloud to find the close match. Thus, the challenging problem is how to
design a protocol which enables efficient and privacy preserving biometric identification in
the cloud computing.
2
BI-II which use drandom diagonal matrices to realize biometric identification. However,
their work was proven insecure. In this project, we propose an efficient and privacy
preserving biometric identification scheme which can resist the collusion attack launched by
the users and the cloud. Specifically, our main contributions can be summarized as follows:
We examine the biometric identification scheme and show its in sufficiencies and security
weakness under the proposed level-3 attack. Specifically, we demonstrate that the attacker
can recover their secret keys by colluding with the cloud, and then decrypt the biometric
traits of all users. We present a novel efficient and privacy-preserving biometric
identification scheme. The security analysis shows that the proposed scheme can achieve a
required level of privacy protection. Specifically, our scheme is secure under the biometric
identification outsourcing model and can also oppose the attack proposed. compares with
the existing biometric identification schemes, the presentation analysis shows that the
proposed scheme provides a lesser computational cost in both preparation and identification
procedures.
3
2. LITERATURE SURVEY
Wong and Kim proposed a privacy preserving biometric matching protocol for iris
codes verification. In their protocol, it is computationally infeasible for a malicious user to
impersonate as an sincere user. Iris verification consists of five operations; they are image
acquisition, iris segmentation, iris normalization and unwrapping, feature encoding, and
matching algorithm. In image acquisition step the system takes a high-quality image of the
iris, Iris localization takes place to detect the edge of the iris as well as that of the pupil; thus
extracts the iris region, Normalization is used to transform the iris region to have permanent
dimensions, and hence removing the dimensional inconsistencies between eye images, The
normalized iris region is unwrapped into a rectangular region. The feature encoding is used
to extract the most selective feature in the iris pattern so that a comparison between
templates can be done. Lastly a decision can be made in the matching step.
4
2.3 FINGER CODE VERFICATION
AUTHOR: BARNI AND EVANS
Evans proposed a novel protocol which reduces the identification time. They used an
improved Homomorphic encryption algorithm to compute the Euclidean distance and
designed novel garbled circuits to find the minimum distance. By exploiting a backtracking
protocol, the best match Finger- Code can be found. However, in, the whole encrypted
database has to be transmitted to the user from the database server.
5
3. SYSTEM ANALYSIS
Existing System:
Related works on privacy-preserving biometric identification are provided in this section.
An efficient biometric identification scheme has been exists.
In this scheme presented a finger code identification protocol they used an improved
Homomorphic encryption algorithm to compute the Euclidean distances, these distances are
computed between the query and sample Finger codes in the database, which introduces too
much burden as the number of finger prints increases.
• The system doesn’t implement proper secure for attack launched by the
attackers in Biometric Identification Scheme.
• There is no an affective privacy preserving encryption techniques in this system.
Proposed System:
In our proposed system, presented a Finger Code identification protocol based on the RSA
Encryption technique, In this technique we use Base 64 encoder to encrypts the query data.
The cloud server figures out the best match for the encrypted query and returns the
associated index to the database owner. It generates the digital sign during upload the data.
• It provides more Security than existing system. It generates digital sign and
secret key.
• Digital sign helps to identify if the data stored in the cloud is either attacked or in
safe. If the attacker modified our data then we can able to get the original data.
6
3.1 FEASIBILITY STUDY:
The feasibility of the project is analyzed during this phase and business proposal is
put forth with a really general plan for the project and a few cost estimates. During system
analysis the feasibility study of the proposed system is to be administered. This is to make
sure that the proposed system isn’t a burden to the corporate. For feasibility analysis, some
understanding of the main requirements for the system is important.
• ECONOMICAL FEASIBILITY
• TECHNICAL FEASIBILITY
• SOCIAL FEASIBILITY
ECONOMICAL FEASIBIITY:
This study is administered to see the economic impact that the system will wear the
organization. The amount of fund that the corporate can pour into the research and
development of the system is restricted. The expenditures must be justified. Thus the
developed system as well within the budget and this was achieved because most of the
technologies used are freely accessible. Only the customized products had to be purchased.
TECHNICAL FEASIBILITY:
This study is administered to see the technical feasibility, that is, the technical
requirements of the system. Any system developed mustn’t have a high demand on the
available technical resources. This will cause high demands on the available technical
resources. This will cause high demands being placed on the client. The developed system
must have a modest requirement, as only smallest or null changes are required for
implementing this technique.
SOCIAL FEASIBILITY:
The aspect of study is to see the extent of acceptance of the system by the user. This
includes the method of coaching the user to use the system efficiently.
7
The user mustn’t feel threatened by the system, instead must accept it as a necessity.
The level of acceptance by the users solely depends on the methods that are employed to
teach the user about the system and to form him conversant in it. His level of confidence
must be raised in order that he’s also ready to make some constructive criticism, which is
welcomed, as he’s the ultimate user of the system.
3.2 SOFTWARE REQUIREMENTS SPECIFICATION:
What is SRS?
8
The following are the functional requirements of our project.
❖ Owner registration.
❖ User registration.
❖ Cloud login.
❖ Upload Files.
❖ Search Files.
❖ Download image.
Reliability:
The System should be reliable and must not degrade the performance of the
prevailing system and will not cause the hanging of the system.
Accuracy:
The level of accuracy is very high. All the operations would be done well. The
system can perform accuracy in uploading and downloading the files.
Security:
The system provides more security to the users. Only authorized users can access the
system. The authorization can be given by the cloud server to the users and owners. The
system is having a priority role in keeping the privacy of the user. It helps in storing
important files or documents. Nobody can directly access the documents. The user can use
the biometric identification passwords for more security.
9
HARDWARE REQUIREMENTS:
➢ System : PIV 3.5 GHz
➢ Hard Disk : 320 GB.
➢ Ram : 1 GB
SOFTWARE REQUIREMENTS:
➢ Operating System: Windows XP/ Later Version
➢ Database : MySQL.
10
Fig 3.3.1 : Use Case Diagram
Pre condition: Owner must have the basic details to register in this page.
Flow of Events:
Post Condition: If the Owner is success fully registered by giving the required details
then he/she enter into the login page.
11
2. User Register Use Case:
Pre condition: User must have the basic details to register in this page.
Flow of Events:
Post Condition: If the user is success fully registered by giving the required details then
he/she enter into the login page.
Pre Condition: Cloud Server can activate the registered Owner and user.
Flow of Events:
• Cloud server enter into server page by entering Cloud server id and password.
Post Condition: If the Cloud Server activate the registered owner and user then both can
upload the files.
12
Pre Condition: Owner must have the valid username, password and biometric finger
print to enter into the system.
Flow of Events:
• Verify the username.
• Verify the password.
• Verify the Biometric finger print.
• Login into the Owner page.
Post Condition: If the name, password and biometric finger print is valid then the Owner
enter into the Owner page, otherwise it will ask for the valid username and password.
Pre Condition: User must have the valid username, password and biometric finger print
to enter into the system.
Flow of Events:
• Verify the username.
• Verify the password.
• Verify the Biometric finger print.
• Login into the User page.
Post Condition: If the name, password and biometric finger print is valid then the User enter
into the User page, otherwise it will ask for the valid username and password.
13
• Owner must select the file.
• Upload the file.
Post Condition: Successfully the file will be uploaded.
7. Download Biometric image Use Case:
Use case name: Download Biometric image
Pre Condition: The Owner can have the right to delete the files.
Flow of Events:
• Owner delete the biometric image.
Post Condition: The files can deleted by the Owner.
14
4. SYSTEM DESIGN
4.1 Architectural Design:
The design of the system can provide the information about the functionalities and
behaviour. It is a blue print of the system. The entire process is shown in this design.
SYSTEM ARCHITECTURE:
15
4.2 UML DESIGN:
UML stands for Unified Modeling Language, UML may be a standardized common
purpose modeling language within the field of object-oriented software engineering. The
standard is managed, and was created by, the thing Management Group. The goal is for
UML to become a standard language for creating models of object oriented computer
software.
In its current form UML is comprised of two main components: a Meta- model and a
notation. In the future, some sort of method or process can also be added to; or related to
UML. The Unified Modeling Language may be a standard language for Specifying,
Visualization, Constructing and documenting the artifacts of software system, as well as for
business modeling and other non-software systems.
The UML is very important part of developing objects oriented software and the
software development process. The UML uses mostly graphical notations to precise the
planning of software projects.
GOALS:
The Primary goals within the design of the UML are as follows:
1. Provide users a ready-to-use, communicative visual modeling language so that they can
develop and exchange meaningful models.
2. Give extendibility and specialization mechanisms to extend the core concepts.
Support high level development concepts such as collaborations, Frameworks, Patterns and
Architecture.
4.2.1 CLASS DIAGRAM:
16
A class notation consists of three parts:
Class Name
Class Attributes
Class Name
Class Attributes
Class Operations
17
Fig 4.2.1 : Class Diagram
18
Fig 4.2.2: Sequence Diagram
Activity diagram defines the flow of control in a system. The activity diagram consists
of activities and links. The activity diagrams contains different type of activities that are
present in the system. The activities are the functionalities. We have to prepare number of
activity diagrams to identify the How of the system. These are used to visualize the flow of
controls in a system. This is prepared to prossess a thought of how the system will work
when executed.
19
Fig 4.2.3(a): Activity Diagram for Owner
20
Fig 4.2.3 (c): Activity Diagram for Cloud
State charts are used to identify the different states. The diagram look like activity
diagram. A state diagram sometimes called as a state machine diagram or state chart
diagram.
A State diagram look like a flow chart in which the initial state is represented by a large
black dot and subsequent states are represented as box with rounded corners. There are
some some lines between the states to connect the activities. The final state is denoted with
a large black dot with a circle around it.
state chart Diagrams for owner and cloud server are shown below:
21
Fig 4.2.4(a) : state chart diagram for owner
22
4.3 Detailed description of Tables tables and databases :
Data base design:
Normalization:
• X is a super key.
• Y is a prime attribute.
23
▪ Boyce-Codd Normal Form (BCNF):
A relation R is in BCNF if R is in Third Normal Form and for each FD, LHS is super key.
A relation is in BCNF iff in every non-trivial functional dependency X –> Y, X may be a
super key.
Data dictionary :
It contains all the information about the database tables. The data that can be given
by the user is stored in the database. The data can be searched by the user is displayed on the
screen.
Owner Registration :
Owner Login :
Leave lo
S.NO FIELD NAME DATA TYPE SIZE CONSTRAINT
1 User Name Varchar2 20 Primary Key
2 Password Varchar2 20 Not Null
3 Biometric Image Longblob 30 Not Null
24
User Registration :
S.NO FIELD NAME DATA TYPE SIZE CONSTRAINT
1 User Name Varchar2 20 Primary Key
2 Password Varchar2 20 Not Null
3 Email Varchar2 20 Not Null
4 Mobile Integer 10 Not Null
5 Address Varchar2 30 Not Null
6 DOB date 20 Not Null
7 Gender Varchar2 10 Not Null
8 Pincode Integer 10 Not Null
9 Image longblob 30 Not Null
10 Biometric Image Longblob 30 Not Null
User Login :
25
Upload Biometric image :
26
5. SYSTEM IMPLEMENTATION
Implementation is the phase of the project when the theoretical design is turned out
into a operational system. Thus it can be careful to be the furthermost dangerous stage in
attaining a successful new system and in charitable the user, sureness that the new system
will work and be real. The implementation stage includes careful development, examination
of the existing system and it’s restraints on operation, designing of methods to realize
exchange and evaluation of exchange methods.
MODULAR DESCRIPTION:
MODULES:
• Data Owner
• Cloud Server
• Users.
Data Owner:
In this module, the data owner uploads their Biometric images with their
contents data to the Cloud server. For the security purpose the data owner assigns the
digital sign and then store in the Cloud and also performs the following operations
such as Upload Biometric image with its digital sign based on title, description, List
all uploaded Biometric images, View all comments on the biometric image Verify
Biometric image details, check the biometric image whether the image is attacked or
not and Delete Biometric image details.
Cloud Server:
The Cloud service manages a Cloud to provide data storage service. And
performs the following operations such as Activate the registered Owner and User,
Store all details about the Owner and User, View all Owners and Users Store all
Biometric image files with their signature, View all Biometric image Files with its
details, View all Biometric image comments, View all biometric image transactions,
View all attackers and View all Data owners and Users.
27
Users:
The Cloud User who has a large amount of data to be stored in Cloud Servers
and have the permissions to access and manipulate stored Biometric image and its
data. The consumer will search the data and accessing the Biometric image data if he
is authorized and performs the following operations such as Search Biometric image,
Access Biometric image and its details, Download Biometric image & make
comments.
28
6. CODE
InsertDataAction.java
/*
*/
package com.biometric.actions;
import com.bio.db.GetDBConnection;
import java.io.IOException;
import java.io.PrintWriter;
import java.sql.Connection;
import java.sql.PreparedStatement;
import javax.servlet.ServletException;
import javax.servlet.annotation.MultipartConfig;
import javax.servlet.http.HttpServlet;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import javax.servlet.http.Part;
/**
29
* @author welcome
*/
@MultipartConfig
@Override
try {
PreparedStatement ps = null;
30
con = GetDBConnection.getDbConnection();
ps.setString(2, pass);
ps.setString(3, email);
ps.setString(4, mno);
ps.setString(5, addr);
ps.setString(6, dob);
ps.setString(7, gender);
ps.setString(8, pincode);
ps.setString(9, status);
ps.setBinaryStream(10, filepart.getInputStream());
ps.setBinaryStream(11, fileBio.getInputStream());
ps.setString(12, fileBio.getSubmittedFileName());
int x = ps.executeUpdate();
if (x > 0) {
out.print("Registered Successfully");
} catch (Exception e) {
e.printStackTrace();
31
}
OBioUdentityAction.java
/*
*/
package com.biometric.actions;
import com.bio.db.GetDBConnection;
import java.io.IOException;
import java.io.PrintWriter;
import java.sql.Connection;
import java.sql.ResultSet;
import java.sql.Statement;
import javax.servlet.ServletException;
import javax.servlet.annotation.MultipartConfig;
import javax.servlet.http.HttpServlet;
import javax.servlet.http.HttpServletRequest;
32
import javax.servlet.http.HttpServletResponse;
import javax.servlet.http.Part;
/**
* @author welcome
*/
@MultipartConfig
@Override
try {
String sql1 = "SELECT * FROM owner where thumbname='" + thbname + "' ";
if (rs1.next() == true) {
33
response.sendRedirect("ownerMain.jsp");
}else{
} catch (Exception e) {
e.printStackTrace();
}}
UBioIdentityAction.java
/*
*/
package com.biometric.actions;
import com.bio.db.GetDBConnection;
import java.io.IOException;
import java.io.PrintWriter;
import java.sql.Connection;
import java.sql.ResultSet;
import java.sql.Statement;
34
import javax.servlet.ServletException;
import javax.servlet.annotation.MultipartConfig;
import javax.servlet.http.HttpServlet;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import javax.servlet.http.Part;
/**
* @author welcome
*/
@MultipartConfig
@Override
try {
String sql1 = "SELECT * FROM consumer where thumbname='" + thbname + "' ";
35
Statement stmt1 = con.createStatement();
if (rs1.next() == true) {
response.sendRedirect("consumerMain.jsp");
}else{
} catch (Exception e) {
e.printStackTrace();
OImageInsertAction.java
/*
*/
package com.biometric.actions;
import com.bio.db.GetDBConnection;
import java.io.IOException;
36
import java.io.PrintWriter;
import java.sql.Connection;
import java.sql.PreparedStatement;
import java.text.SimpleDateFormat;
import java.util.Date;
import javax.servlet.ServletException;
import javax.servlet.annotation.MultipartConfig;
import javax.servlet.http.HttpServlet;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import javax.servlet.http.HttpSession;
import javax.servlet.http.Part;
import org.bouncycastle.util.encoders.Base64;
/**
* @author welcome
*/
@MultipartConfig
@Override
37
protected void doPost(HttpServletRequest request, HttpServletResponse response)
PreparedStatement ps = null;
desc = request.getParameter("desc");
mac = request.getParameter("mac");
key = request.getParameter("key");
try {
con = GetDBConnection.getDbConnection();
38
String dt = strDate + " " + strTime;
int rank = 0;
con.createStatement().executeUpdate(strQuery2);
con.createStatement().executeUpdate(strQuery3);
ps1.setString(1, title);
ps1.setString(2, name);
ps1.setString(3, owner);
ps1.setString(4, desc);
ps1.setString(5, mac);
ps1.setString(6, key);
ps1.setString(7, dt);
ps1.setBinaryStream(8, filePart.getInputStream());
ps1.setInt(9, rank);
39
ps1.executeUpdate();
ps.setString(2, name);
ps.setString(3, owner);
ps.setString(4, desc);
ps.setString(5, mac);
ps.setString(6, key);
ps.setString(7, dt);
ps.setInt(8, rank);
ps.executeUpdate();
} catch (Exception e) {
GetDBConnection.java
/*
40
* To change this license header, choose License Headers in Project Properties.
*/
package com.bio.db;
import java.sql.Connection;
import java.sql.DriverManager;
/**
* @author welcome
*/
try {
Class.forName("com.mysql.jdbc.Driver");
con = DriverManager.getConnection("jdbc:mysql://localhost:3306/Bio_Indentification",
"root", "root");
} catch (Exception e) {
e.printStackTrace();
41
return con;
A_AllAttackers.jsp
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<style type="text/css">
<!--
42
.style10 {font-size: 14px}
-->
</style>
</head>
<body>
<div class="main">
<div class="header">
<div class="header_resize">
<div class="menu_nav">
<ul>
<li><a href="ownerLogin.jsp"><span>Owner</span></a></li>
<li><a href="consumerLogin.jsp"><span>Users</span></a></li>
<li class="active"></li>
<li></li>
</ul>
</div>
<div class="clr"></div>
43
<div class="logo">
</div>
<div class="clr"></div>
<div class="slider">
<div id="coin-slider">
</div>
<div class="clr"></div>
</div>
<div class="clr"></div>
</div>
</div>
<div class="content">
<div class="content_resize">
<div class="mainbar">
<div class="article">
44
<p> </p>
<div class="clr"></div>
<p>
<tr>
</tr>
45
<%
String title,name,mac,date,attacker;
int id=0,i=1;
try
id = rs1.getInt(1);
attacker = rs1.getString(2);
title = rs1.getString(3);
name = rs1.getString(4);
mac = rs1.getString(6);
date = rs1.getString(7);
%>
<tr>
46
<td valign="baseline" height="30"><p class="style3 style10 style11"> </p><div
align="center" class="style3 style10 style11"><%out.println(decryptedTitle);%></div></td>
</tr>
<%
%>
<tr>
47
</tr>
<p></p>
<%
connection.close();
catch(Exception e)
out.println(e.getMessage());
%>
</table> </p>
<div class="clr"></div>
</div>
</div>
<div class="sidebar">
<div class="gadget">
<div class="clr"></div>
48
</ul>
</div>
<div class="gadget">
<h2 class="star"> </h2>
</div>
</div>
<div class="clr"></div>
</div>
</div>
<div class="fbg"></div>
<div class="footer">
<div class="footer_resize">
<div style="clear:both;"></div>
</div>
</div>
</div>
</body>
</html>
C_searchImage.jsp
49
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Search Images</title>
<style type="text/css">
<!--
.style5 {
font-size: 25px;
color: #333333;
50
.style14 {
font-size: 14px;
color: #FFFF00;
font-weight: bold;
.style16 {
color: #FF0000;
font-weight: bold;
-->
</style>
</head>
<body>
<div class="main">
<div class="header">
<div class="header_resize">
<div class="menu_nav">
<ul>
51
<li><a href="index.html"><span>Home Page</span></a></li>
<li><a href="ownerLogin.jsp"><span>Owner</span></a></li>
<li><a href="auditorLogin.jsp"></a></li>
<li></li>
</ul>
</div>
<div class="clr"></div>
<div class="logo">
</div>
<div class="clr"></div>
<div class="slider">
<div id="coin-slider">
</div>
<div class="clr"></div>
52
</div>
<div class="clr"></div>
</div>
</div>
<div class="content">
<div class="content_resize">
<div class="mainbar">
<div class="article">
<div class="clr"></div>
<p>
<DIV CLASS="article">
<H2> </H2>
<DIV STYLE="width:600px;">
<TR>
53
</div></TD>
</TR>
<TR>
</TR>
</TABLE>
</DIV>
</FORM>
</DIV>
<%
try{
String strDate,strTime,dt;
String consumer,input,input1;
String status=null;
String title,imgName,desc,desc1,rank;
54
int i=0;
consumer=(String)session.getAttribute("consumer");
input1= request.getParameter("keyword");
input = input1.toLowerCase();
strDate = sdfDate.format(now);
strTime = sdfTime.format(now);
if(!input.equalsIgnoreCase(""))
st3.executeUpdate (query3);
if(rs4.next())
55
status=rs4.getString(10);
Statement stmt=connection.createStatement();
ResultSet rs = stmt.executeQuery(strQuery);
<tr>
56
</tr><%
while(rs.next()){
i=rs.getInt(1);
title = rs.getString(2);
imgName = rs.getString(3);
desc1 = rs.getString(5);
rank = rs.getString(9);
desc = encryptedDesc1.toLowerCase();
String encryptedTitle1=encryptedTitle.toLowerCase();
%>
</P>
<tr>
57
<input name="image" type="image" src = "w_ProfilePic.jsp? id= <%=i%>
&type=<%="serverimages"%>" style="width:110px; height:100px;" /></a></div></td>
</tr>
<%
58
}catch(Exception e){
e.printStackTrace();
%>
</table>
</P>
<div class="clr"></div>
</div>
</div>
<div class="sidebar">
<div class="gadget">
<div class="clr"></div>
<ul class="sb_menu">
</ul>
</div>
</div>
<div class="clr"></div>
59
</div>
</div>
<div class="fbg"></div>
<div class="footer">
<div class="footer_resize">
<div style="clear:both;"></div>
</div>
</div>
</div>
</body>
</html>
O_addImage1.jsp
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Upload Imge</title>
60
<script type="text/javascript" src="js/cufon-marketingscript.js"></script>
<style type="text/css">
<!--
-->
</style>
</head>
<body>
<div class="main">
<div class="header">
<div class="header_resize">
<div class="menu_nav">
<ul>
61
<li><a href="consumerLogin.jsp"><span>Users</span></a></li>
<li></li>
<li></li>
</ul>
</div>
<div class="clr"></div>
<div class="logo">
</div>
<div class="clr"></div>
<div class="slider">
<div id="coin-slider">
</div>
<div class="clr"></div>
</div>
<div class="clr"></div>
</div>
62
</div>
<div class="content">
<div class="content_resize">
<div class="mainbar">
<div class="article">
<p> </p>
<div class="clr"></div>
<p>
try
63
{
String title=request.getParameter("title");
String name=request.getParameter("name");
String desc=request.getParameter("desc");
String h1="";
String filename="D:\\biodoc\\filename.txt";
KeyPairGenerator kg = KeyPairGenerator.getInstance("RSA");
KeyPair kp = kg.generateKeyPair();
p.print(new String(forMac));
MessageDigest md = MessageDigest.getInstance("SHA1");
64
BufferedInputStream bis1 = new BufferedInputStream(dis1);
while (true) {
int b1 = bis1.read();
if (b1 == -1)
break;
h1 = bi1.toString(16);
%>
<tr>
65
<td width="357" valign="middle" height="45" style="color:#000000;"><div align="left"
style="margin-left:20px;"><input type="text" name="title"
value=<%=encryptedTitle%>></div></td>
</tr>
<tr>
</tr>
<tr>
</strong></div></td>
</div></td>
</tr>
<tr>
66
<td width="243" height="45" valign="middle" bgcolor="#FF0000" style="color:
#2c83b0;"><div align="left" class="style3 style7" style="margin-left:20px;"><strong>Digital
Sign </strong></div></td>
</tr>
<tr>
</tr>
</tr>
</strong></span>
<tr>
</tr>
67
<div > <tr><td height="45" colspan="2" id="learn_more" align="center"
style="color:#FFFFFF;"><input type="submit" value="Submit" style="width:100px;
height:35px; background-color:#000000; color:#FFFFFF;"/></td></tr></div>
</table>
</form>
<%
connection.close();
catch(Exception e)
out.println(e.getMessage());
%>
</p>
<div class="clr"></div>
</div>
</div>
<div class="sidebar">
<div class="gadget">
68
<div class="clr"></div>
<ul class="sb_menu">
</ul>
</div>
</div>
<div class="clr"></div>
</div>
</div>
<div class="fbg"></div>
<div class="footer">
<div class="footer_resize">
<div style="clear:both;"></div>
</div>
</div>
</div>
</body> </html>
69
7. SYSTEM TESTING
OBJECTIVE:
The purpose of testing is to discover errors. Testing is that the process of trying to
get every conceivable fault or weakness during a work product. It provides a way to check
the functionality of components, subassemblies, assemblies and/or a finished product. This
is the procedure of exercising software with the objective of ensuring that the software
meets its requirements and user expectations and doesn’t fail in an undesirable manner.
There are various types of test. Each test type addresses a specific testing requirement.
7.1 TYPES OF TESTS:
7.1.1 UNIT TESTING:
Unit testing involves the planning of test cases that validate that the interior
program logic is functioning properly, which program inputs produce valid outputs. every
decision branches and internal code flow must be validated. It is the testing of individual
software units of the appliance. It is done after the completion of a private unit before
integration. This is a structural testing, that relies on facts of its construction and is
enveloping. Unit tests perform basic tests at component level and test a selected business
process, application, and/or system configuration. Unit tests confirm that every single path
of a business process performs perfectly to the documented specifications and contains
clearly defined inputs and expected results.
Unit testing is typically conducted as a part of a combined code and unit test phase
of the software lifecycle, although it’s not uncommon for coding and unit testing to be
conducted as two distinct phases.
Test strategy and approach:
Field testing are going to be performed manually and functional tests are going to be
written in detail.
Test objectives:
70
Features to be tested:
Software integration testing could also be the incremental integration testing of two
or extra integrated software components on a 1 platform to bring failures caused by
interface defects.
The task of the mixing test is to see that components or software applications, e.g.
components during a software system or – one intensify – software applications at the
corporate level – interact without error.
7.1.3 FUNCTIONAL TESTING:
Functional tests offer efficient demonstrations that functions tested are accessible
specified by the business and technical requirements, system documents and user manuals.
Functional testing is centered on the following items:
Valid Input : identified classes of valid input should be accepted.
Invalid Input: identified classes of invalid input should be rejected.
Functions : identified functions must be exercised.
71
Organization and preparation of functional tests is concentrated on requirements,
key functions, or special test cases. In addition, systematic reporting regarding to recognize
Business process flows; data fields, predefined processes, and successive processes must
be considered for testing. Before functional testing is complete, additional tests are
identified and therefore the effective value of current tests is decided.
7.1.4 SYSTEM TESTING:
System testing ensures that the whole integrated software meets requirements. It
tests a configuration to make sure known and predictable results. An example of system
testing is that the configuration oriented system integration test. System testing is
predicated on process descriptions and flows, emphasizing pre-driven process links and
integration points.
7.1.5 WHITE BOX TESTING:
White Box Testing it is a testing during which the software tester has knowledge of
the inner workings, structure and language of the software, or a minimum of its purpose. It
is wont to test areas that can’t be reached from a recorder level.
7.1.6 BLACK BOX TESTING:
Black Box Testing is testing the software with none knowledge of the inner
workings, structure or language of the module being tested. Black box tests, as most other
forms of tests, must be written from a perfect source document, like specification or
requirements document. It is a testing during which the software under test is treated, as a
recorder. you cannot “see” into it. The test gives inputs and responds to outputs without
considering how the software works.
72
7.2 TEST CASES:
Test case 1: Registration For Owner Login
73
Test Case 3: Registration for User:
74
Test Case 5: All Actions Performed the Owner:
75
Test Case 7: All Actions Performed the Cloud Server
76
8. OUTPUTS
77
Fig 8.3 Owner login page
78
Fig 8.5 Owner Main page
79
Fig 8.7 Biometric Image Upload page
80
Fig 8.9: View All Uploaded Biometric Image Files
81
Fig 8.11: Comments on Biometric Image Page
82
Fig 8.13 Login failed page
83
Fig 8.15 User Profile Page
84
Fig 8.17 users comments Page
85
Fig 8.19 Cloud Server Login page
86
Fig 8.21 List of All Owners Page
87
Fig 8.23 List of attackers Page
88
9. CONCLUSION
89
REFERENCES
1. A. Jain, L. Hong and S. Pankanti, “Biometric identification,” Communications of
the ACM, vol. 43, no. 2, pp. 90-98, 2000.
6. X.Du, Y.Xiao, M.Guizani, H.H.Chen, “An effective key management scheme for
heterogeneous sensor networks,” Ad Hoc Networks, vol. 5, no. 1, pp. 24-34, 2007.
90
security, pp. 231-240, 2010.
11. M. Osadchy, B. Pinkas, A. Jarrous, et al., “SCiFI-a system for secure face
identification, ”in Security and Privacy(SP),2010IEEESymposiumon,pp. 239-
254,2010
12.D.Evans,Y.Huang,J.Katz,etal.,“Efficientprivacy-preservingbiometric
identification,” in Proceedings of the 17th conference Network and
Distributed System Security Symposium, NDSS, 2011.
19. A.Jain, S.Prabhakar, L.Hong, etal., “Filter bank-based finger print matching, ”
IEEE Transactions on Image Processing, vol. 9, no. 5, pp. 846-859, 2000.
91
20. H. Delfs, H. Knebl, and H. Knebl, “Introduction to cryptography,” Berlin etc.:
Springer, 2002.
21. K. Liu, C. Giannella, and H. Kargupta, “An attacker’s view of distance
preservingmapsforprivacypreservingdatamining,”KnowledgeDiscovery in
Databases, pp. 297-308, 2006.
92