documnt - copy
Post on 08-Apr-2018
219 Views
Preview:
TRANSCRIPT
-
8/7/2019 DOCUMNT - Copy
1/35
IMAGE SECURITY
( A.Ramachandra Reddy ) (07261A05B9)
Department of Computer Science and Engineering
Mahatma Gandhi Institute of Technology
(Affiliated to JNT University, Hyderabad)
Gandipet, Hyderabad-75
-
8/7/2019 DOCUMNT - Copy
2/35
IMAGE SECURITY
projectreport submitted in partial fulfilmentoftherequirement fortheawardofthe DegreeofB.Tech
By
A.Ramachandra Reddy
07261A05B9
Department of Computer Science and Engineering
Mahatma Gandhi Institute of Technology
(Affiliated to JNT University, Hyderabad)
Gandipet, Hyderabad-75
-
8/7/2019 DOCUMNT - Copy
3/35
-
8/7/2019 DOCUMNT - Copy
4/35
Acknowledgement
I appreciate the assistance given to me by my Project GuideMs. K.Uma, for her constant
encouragementandguidancethroughouttheproject.
I express my profoundgratitudetoourprincipalDR.G.CHANDRA MOHAN REDDY andour
indebtedness to our institute MAHATMA GANDHI INSTITUTE OF TECHNOLOGY,
GANDIPET.
I am deeply indebted to Mr. Nagesh, Head of the Department of Computer Science and
Engineering, MGIT fortheirvaluableguidanceandencouragementthroughoutthecourse.
I would like to express sincere thanks to, Ms. K.Uma Assistant Professor, Department of
ComputerScienceand Engineering, forhis kindcooperation in completion ofthis project.
Itgives me immensepleasuretoexpress my deep senseofgratitudeand indebtedness toallthosewhohelped mealot forthe successfulcompletion of my project.
-
8/7/2019 DOCUMNT - Copy
5/35
ABSTRACT
Project name Image security
Objective
The main aim oftheproject is toprovidethe secure imagetransmission. This is
the new technique of providing the security at the time of data transmission without
usingany cryptography techniquelikealgorithms. The Image Security is an application,
whichconcentrates on the standards ofdata security andcontentauthentication ofany
system. In this application wecan provide the security by change the content of the
image. Wecan placethealpha numerickeys insidethecontent in threedifferentplaces
than thecontentofthe imagecan bechanged. Afterthan the imagecannot bedisplayed.
Then itwill be sended. Ifany hackercan hack the file the imagecannot bedisplayed.
Only thereceiversideapplication can knowaboutthe modifiedplaces. Aftergettingthe
filethereceivercan easily removethekeys andthen the imagecan bedisplayed.
We need to design software, which provides the users with the flexibility of
sendingandreceiving images in a secured format. Here theTCP (Transaction control
Protocol) Was involved forsending.
Modules
1. GUI Module.2. Authentication Module.3. Security Module.4. Communication Module.
Software Requirements
y Operating SystemWindows NT/2000 (Client/Server).
-
8/7/2019 DOCUMNT - Copy
6/35
TABLE OF CONTENTS
1. Introduction
2. System Analysis
a. Existing System
b. proposed System
3. Feasibility Report
a. Technical Feasibility
b. Operational Feasibility
c. Economical Feasibility
4. System Requirement Specification Document
a. Overview
b. Modules Description
c. Process Flow
d. SDLC Methodology
e. Software Requirements
f. Hardware Requirements
-
8/7/2019 DOCUMNT - Copy
7/35
5. System Design
a. DFD
b. E-Rdiagram
c. UML
d. Data Dictionary
6. Technology Description
7. Coding
8. Testing & Debugging Techniques
9. Output Screens
10. Reports
11. Bibliography
-
8/7/2019 DOCUMNT - Copy
8/35
INTRODUCTION
SYSTEM ANALYSIS
Existing System
In theprevious applications alsoprovidingthe security forthe files atthetimeof
sending by using some cryptography techniques. Like symmetric cryptography and
asymmetriccryptography. In the symmetriccryptography bothare usingthe samekey.
And in the asymmetric cryptography both are using the different keys. But by using
thesealgorithmictechniques weare facing someproblems.
Proposed System
This application can overcome all thedrawbacks of the previous applications.
This is the new technique I have to prepare. In this application I am using the string
formatteddata. Generally every graphical filelike video, audio, image, in string format.
This format is helpful for my project. Whenever you can modify the string formatted
datathen the filewillturn as not valid. aboutthekey places andkey. Sohecan easily
decryptandhegottheoriginal image.
Advantage
Theprocess is very speedcomparetoprevious application. Existingapplicationscan take much moretime forconvertingtheplain texttociphertext.
Thekey was included in the string formatteddata. It is very complicatedto findoutthat.
Drawbacks of this application
Senderandreceiverhavethe sameapplication. It is used foronly the image, video, audio files only.
Future Enhancements
I wanttopreparethis application forall files.
-
8/7/2019 DOCUMNT - Copy
9/35
FEASIBILITY REPORT
ActFinding Techniques
In this system wearegoingtodevelopa facility toa userthathewill not faceany
difficulty atthetimeof usagelikedata missing, oneway contacts, one viewcontacts
Feasibility Study
A feasibility study is ahigh-levelcapsule version oftheentire System analysis and
Design Process. The study begins by classifyingtheproblem definition. Feasibility is to
determine if its worthdoing.
Operational Feasibility
Question thatgoingto beaskedare
y Willthe system be used if itdevelopedand implemented.y Iftherewas sufficient support fortheproject from the managementand from the
users.
Technical feasibility
y Does the necessary technology existtodowhat is been suggestedy Does theproposedequipmenthavethetechnicalcapacity forusingthe new system?
Sothere is no needofadditionalhardwareand software forthe system.
Financial and Economical Feasibility
The system developedand installedwill begood benefittotheorganization. The system
will bedevelopedandoperated in theexistinghardwareand software infrastructure.
-
8/7/2019 DOCUMNT - Copy
10/35
SDLC METHDOLOGIES
This documentplay a vitalrole in thedevelopmentoflifecycle (SDLC) as it
describes thecompleterequirementofthe system. It means foruse by developers
andwill bethe basicduringtestingphase.
SPIRAL MODEL was defined by Barry Boehm in his 1988 article, A spiral
Modelof Software Developmentand Enhancement. This modelwas notthe first
modeltodiscuss iterativedevelopment, but itwas the first modeltoexplain why the
iteration models.
The steps forSpiral Modelcan begeneralizedas follows:
y The new system requirements aredefined in as muchdetails as possible.y A preliminary design is created forthe new system.y A firstprototypeofthe new system is constructed from thepreliminary
design
y A secondprototype is evolved by a fourfoldprocedure:1. Evaluatingthe firstprototype in terms of its strengths, weakness, and
risks.
2.
Definingtherequirements ofthe secondprototype.
3. Planningan designingthe secondprototype.4. Constructingandtestingthe secondprototype.
-
8/7/2019 DOCUMNT - Copy
11/35
The following diagram shows how a spiral model acts like:
Fig 1.0-Spiral Model
-
8/7/2019 DOCUMNT - Copy
12/35
APPLICATION DEVELOPMENT
N-TIER APPLICATIONS
N-TierApplications can easily implementtheconcepts of Distributed Application
Design and Architecture. The N-TierApplications provide strategic benefits to
Enterprise Solutions. While 2-tier, client-servercan help us createquickandeasy
solutions and may be used forRapid Prototyping, they can easily becomea maintenance
and security night mare
DEFINITION
Simply stated, an n-tierapplication helps us distributetheoverall functionality into
various tiers orlayers:
y Presentation Layery Business Rules Layery Data Access Layery Database/Data Store
-
8/7/2019 DOCUMNT - Copy
13/35
-
8/7/2019 DOCUMNT - Copy
14/35
SYSTEM DESIGN
PROCESS FLOW
DATA FLOW DIAGRAMS
A graphicaltool usedtodescribeandanalyzethe momentofdatathrougha
system manualorautomated includingtheprocess, stores ofdata, anddelays in the
system.
The Basic Notation usedtocreatea DFDs areas follows:
1. Dataflow Data move in a specificdirection from an origin toa destination.
2. Process People, procedures, ordevices that useorproduce (Transform) Data.
3. Source External sources ordestination ofdata, which may be People, programs,
organizations orotherentities.
4. Data Store Heredataare storedorreferenced by aprocess in the System.
-
8/7/2019 DOCUMNT - Copy
15/35
Dataflow Diagrams
1st
Level Diagram
Sender
-
8/7/2019 DOCUMNT - Copy
16/35
2nd
Level Diagram
Sender
Receiver
-
8/7/2019 DOCUMNT - Copy
17/35
UML DIAGRAMS
Class Diagram
-
8/7/2019 DOCUMNT - Copy
18/35
Use Case Diagram
Sender
Receiver
Sender
Select the Image
Place AlphaNumeric Key
Send File
Receiver
Get The Image
Remove AlphaNumeric Key
Save Original File
-
8/7/2019 DOCUMNT - Copy
19/35
Sequence Diagram
Sender
Receiver
Sender Authentication Image Sendsecurity
1 : Login()
2 : check()
3 : fails()
4 : getImage()
5 : security()
6 : Send()
Receiver Authentication Image Savesecurity
1 : Login()
2 : check()
3 : fa ils()
4 : get Image()
5 : Remove Keys()
6 : Save()
-
8/7/2019 DOCUMNT - Copy
20/35
Activity Diagram
Sender
Receiver
Sender
Place A lpha Numeric Keys Send
Check
No
yes
Logout
Receiver
Remove Keys Save
Check
No
yes
Logout
-
8/7/2019 DOCUMNT - Copy
21/35
Component Diagram
Deployment Diagram
F
il
l
i
s
l
! " #
Fil
$
l"
%
&
'
(
s
L) #
i0
s 0 1
s"
2
-
8/7/2019 DOCUMNT - Copy
22/35
CODING
importjava.io.FileOutputStream;
importjava.io.*;
publicclass image {
public image(String name)
{
try
{
byte[] mystr="*.;@%".getBytes();
System.out.println(mystr.length);
FileInputStream fis=new
FileInputStream(name);
byte[] b=new byte[fis.available()];
byte[] bb=new
byte[fis.available()+mystr.length*2];
System.out.println(b.length);
System.out.println(bb.length);
fis.read(b);
intj=0;
-
8/7/2019 DOCUMNT - Copy
23/35
for(intk=0;k
-
8/7/2019 DOCUMNT - Copy
24/35
saveFile(bb);
/* FileOutputStream fos=new
FileOutputStream(name1,true);
fos.write(bb);
fos.close();
FileInputStream fiss=new
FileInputStream(name1);
byte[] mb=new byte[fiss.available()];
fiss.read(mb);
int myc=mb.length-5;
byte[] bc=new byte[mb.length-myc];
for(int i=0;i
-
8/7/2019 DOCUMNT - Copy
25/35
{
Stringtxt ;
filedialog fd=new filedialog();
txt=fd.getfile();
try
{
FileOutputStream out= new FileOutputStream(txt);
out.write(toSave);
out.close();
}
catch(IOException e)
{
System.out.println("Sorry, butthere seems tohave been a
problem\n" +
"saving yourfile. Perhaps yourhard-
drive is full\n" +
"orthewritepermissions needto be
changed\n");
}
} }
-
8/7/2019 DOCUMNT - Copy
26/35
TESTING
Testing Concepts
y Testing Methodologies Blackbox Testing: White box Testing. Gray Box Testing.
y Levels of Testing Unit Testing. Module Testing. Integration Testing. System Testing. UserAcceptance Testing.
y Types Of Testing Smoke Testing. Regression Testing. Static Testing. Dynamic Testing. Alpha-Testing. Beta-Testing. Compatibility Testing. Installation Testing. Adhoc Testing.
-
8/7/2019 DOCUMNT - Copy
27/35
Testing
y Theprocess ofexecutinga system withthe intentof findingan error.y Testing is definedas theprocess in whichdefects are identified, isolated,
subjected forrectification andensuredthatproduct is defect free in orderto
producethequality productandhencecustomersatisfaction.
y Quality is definedas justification oftherequirementsy Defect is nothing butdeviation from therequirementsy Defect is nothing but bug.y Testing --- Thepresenceof bugsy Testingcan demonstratethepresenceof bugs, but nottheirabsencey Debuggingand Testingare notthe samething!y Testing is a systematicattemptto breakaprogram orthe AUT
Testing Methodologies
y Black box Testing is thetestingprocess in whichtestercan perform testingon an application withouthavingany internal structuralknowledgeof
application.
Usually Test Engineers are involved in the blackboxtesting.
y White box Testing is thetestingprocess in whichtestercan perform testingon an application withhaving internal structuralknowledge.
Usually The Developers are involved in white boxtesting.
y Gray Box Testing is theprocess in whichthecombination of blackboxandwhite boxtonicsare used.
-
8/7/2019 DOCUMNT - Copy
28/35
Levels of Testing
Module1 Module2 Module3
Units Units Units
i/p Integration o/p i/p Integration o/p
System Testing: Presentation + business +Databases
bUAT: user acceptance testing
Test Planning
1.Test Plan is definedas a strategicdocumentwhich
describes theprocedurehowtoperform various testingon thetotal
application in the mostefficientway.
2.This document involves the scopeoftesting,
3. Objectiveoftesting,
-
8/7/2019 DOCUMNT - Copy
29/35
4. Areas that needto betested,
5. Areas that should not betested,
6. Scheduling Resource Planning,
7. Areas to beautomated, various testingtools
Used.
Test Development
1. Testcase Development (checklist)
2. Test Procedurepreparation. (Description ofthe Testcases).
1. Implementation oftestcases. Observingtheresult.
Result Analysis 1. Expected value: is nothing butexpected behavior
Ofapplication.
2. Actual value is nothing butactual behaviorof
application
Bug Tracing Collectallthe failedcases, preparedocuments.
Reporting Preparedocument (status oftheapplication)
-
8/7/2019 DOCUMNT - Copy
30/35
SCREENSHOTS
-
8/7/2019 DOCUMNT - Copy
31/35
-
8/7/2019 DOCUMNT - Copy
32/35
-
8/7/2019 DOCUMNT - Copy
33/35
`
-
8/7/2019 DOCUMNT - Copy
34/35
-
8/7/2019 DOCUMNT - Copy
35/35
BIBLIOGRAPHY
REFERENCES
(1) Java Complete Reference By Herbert Shield
(2) Database Programmingwith JDBC and Java By George Reese
(3) Javaand XML By Brett McLaughlin
(4) Wikipedia, URL: http://www.wikipedia.org.
(5) Answers.com, Online Dictionary, Encyclopediaand much more, URL:
http://www.answers.com
(6) Google, URL: http://www.google.co.in
(7)Project Management URL: http://www.startwright.com/project.htm
(8) http://it.toolbLox.com/wiki/index.php/Warehouse_Management
top related