DOCUMNT - Copy

Embed Size (px)

Citation preview

  • 8/7/2019 DOCUMNT - Copy

    1/35

    IMAGE SECURITY

    ( A.Ramachandra Reddy ) (07261A05B9)

    Department of Computer Science and Engineering

    Mahatma Gandhi Institute of Technology

    (Affiliated to JNT University, Hyderabad)

    Gandipet, Hyderabad-75

  • 8/7/2019 DOCUMNT - Copy

    2/35

    IMAGE SECURITY

    projectreport submitted in partial fulfilmentoftherequirement fortheawardofthe DegreeofB.Tech

    By

    A.Ramachandra Reddy

    07261A05B9

    Department of Computer Science and Engineering

    Mahatma Gandhi Institute of Technology

    (Affiliated to JNT University, Hyderabad)

    Gandipet, Hyderabad-75

  • 8/7/2019 DOCUMNT - Copy

    3/35

  • 8/7/2019 DOCUMNT - Copy

    4/35

    Acknowledgement

    I appreciate the assistance given to me by my Project GuideMs. K.Uma, for her constant

    encouragementandguidancethroughouttheproject.

    I express my profoundgratitudetoourprincipalDR.G.CHANDRA MOHAN REDDY andour

    indebtedness to our institute MAHATMA GANDHI INSTITUTE OF TECHNOLOGY,

    GANDIPET.

    I am deeply indebted to Mr. Nagesh, Head of the Department of Computer Science and

    Engineering, MGIT fortheirvaluableguidanceandencouragementthroughoutthecourse.

    I would like to express sincere thanks to, Ms. K.Uma Assistant Professor, Department of

    ComputerScienceand Engineering, forhis kindcooperation in completion ofthis project.

    Itgives me immensepleasuretoexpress my deep senseofgratitudeand indebtedness toallthosewhohelped mealot forthe successfulcompletion of my project.

  • 8/7/2019 DOCUMNT - Copy

    5/35

    ABSTRACT

    Project name Image security

    Objective

    The main aim oftheproject is toprovidethe secure imagetransmission. This is

    the new technique of providing the security at the time of data transmission without

    usingany cryptography techniquelikealgorithms. The Image Security is an application,

    whichconcentrates on the standards ofdata security andcontentauthentication ofany

    system. In this application wecan provide the security by change the content of the

    image. Wecan placethealpha numerickeys insidethecontent in threedifferentplaces

    than thecontentofthe imagecan bechanged. Afterthan the imagecannot bedisplayed.

    Then itwill be sended. Ifany hackercan hack the file the imagecannot bedisplayed.

    Only thereceiversideapplication can knowaboutthe modifiedplaces. Aftergettingthe

    filethereceivercan easily removethekeys andthen the imagecan bedisplayed.

    We need to design software, which provides the users with the flexibility of

    sendingandreceiving images in a secured format. Here theTCP (Transaction control

    Protocol) Was involved forsending.

    Modules

    1. GUI Module.2. Authentication Module.3. Security Module.4. Communication Module.

    Software Requirements

    y Operating SystemWindows NT/2000 (Client/Server).

  • 8/7/2019 DOCUMNT - Copy

    6/35

    TABLE OF CONTENTS

    1. Introduction

    2. System Analysis

    a. Existing System

    b. proposed System

    3. Feasibility Report

    a. Technical Feasibility

    b. Operational Feasibility

    c. Economical Feasibility

    4. System Requirement Specification Document

    a. Overview

    b. Modules Description

    c. Process Flow

    d. SDLC Methodology

    e. Software Requirements

    f. Hardware Requirements

  • 8/7/2019 DOCUMNT - Copy

    7/35

    5. System Design

    a. DFD

    b. E-Rdiagram

    c. UML

    d. Data Dictionary

    6. Technology Description

    7. Coding

    8. Testing & Debugging Techniques

    9. Output Screens

    10. Reports

    11. Bibliography

  • 8/7/2019 DOCUMNT - Copy

    8/35

    INTRODUCTION

    SYSTEM ANALYSIS

    Existing System

    In theprevious applications alsoprovidingthe security forthe files atthetimeof

    sending by using some cryptography techniques. Like symmetric cryptography and

    asymmetriccryptography. In the symmetriccryptography bothare usingthe samekey.

    And in the asymmetric cryptography both are using the different keys. But by using

    thesealgorithmictechniques weare facing someproblems.

    Proposed System

    This application can overcome all thedrawbacks of the previous applications.

    This is the new technique I have to prepare. In this application I am using the string

    formatteddata. Generally every graphical filelike video, audio, image, in string format.

    This format is helpful for my project. Whenever you can modify the string formatted

    datathen the filewillturn as not valid. aboutthekey places andkey. Sohecan easily

    decryptandhegottheoriginal image.

    Advantage

    Theprocess is very speedcomparetoprevious application. Existingapplicationscan take much moretime forconvertingtheplain texttociphertext.

    Thekey was included in the string formatteddata. It is very complicatedto findoutthat.

    Drawbacks of this application

    Senderandreceiverhavethe sameapplication. It is used foronly the image, video, audio files only.

    Future Enhancements

    I wanttopreparethis application forall files.

  • 8/7/2019 DOCUMNT - Copy

    9/35

    FEASIBILITY REPORT

    ActFinding Techniques

    In this system wearegoingtodevelopa facility toa userthathewill not faceany

    difficulty atthetimeof usagelikedata missing, oneway contacts, one viewcontacts

    Feasibility Study

    A feasibility study is ahigh-levelcapsule version oftheentire System analysis and

    Design Process. The study begins by classifyingtheproblem definition. Feasibility is to

    determine if its worthdoing.

    Operational Feasibility

    Question thatgoingto beaskedare

    y Willthe system be used if itdevelopedand implemented.y Iftherewas sufficient support fortheproject from the managementand from the

    users.

    Technical feasibility

    y Does the necessary technology existtodowhat is been suggestedy Does theproposedequipmenthavethetechnicalcapacity forusingthe new system?

    Sothere is no needofadditionalhardwareand software forthe system.

    Financial and Economical Feasibility

    The system developedand installedwill begood benefittotheorganization. The system

    will bedevelopedandoperated in theexistinghardwareand software infrastructure.

  • 8/7/2019 DOCUMNT - Copy

    10/35

    SDLC METHDOLOGIES

    This documentplay a vitalrole in thedevelopmentoflifecycle (SDLC) as it

    describes thecompleterequirementofthe system. It means foruse by developers

    andwill bethe basicduringtestingphase.

    SPIRAL MODEL was defined by Barry Boehm in his 1988 article, A spiral

    Modelof Software Developmentand Enhancement. This modelwas notthe first

    modeltodiscuss iterativedevelopment, but itwas the first modeltoexplain why the

    iteration models.

    The steps forSpiral Modelcan begeneralizedas follows:

    y The new system requirements aredefined in as muchdetails as possible.y A preliminary design is created forthe new system.y A firstprototypeofthe new system is constructed from thepreliminary

    design

    y A secondprototype is evolved by a fourfoldprocedure:1. Evaluatingthe firstprototype in terms of its strengths, weakness, and

    risks.

    2.

    Definingtherequirements ofthe secondprototype.

    3. Planningan designingthe secondprototype.4. Constructingandtestingthe secondprototype.

  • 8/7/2019 DOCUMNT - Copy

    11/35

    The following diagram shows how a spiral model acts like:

    Fig 1.0-Spiral Model

  • 8/7/2019 DOCUMNT - Copy

    12/35

    APPLICATION DEVELOPMENT

    N-TIER APPLICATIONS

    N-TierApplications can easily implementtheconcepts of Distributed Application

    Design and Architecture. The N-TierApplications provide strategic benefits to

    Enterprise Solutions. While 2-tier, client-servercan help us createquickandeasy

    solutions and may be used forRapid Prototyping, they can easily becomea maintenance

    and security night mare

    DEFINITION

    Simply stated, an n-tierapplication helps us distributetheoverall functionality into

    various tiers orlayers:

    y Presentation Layery Business Rules Layery Data Access Layery Database/Data Store

  • 8/7/2019 DOCUMNT - Copy

    13/35

  • 8/7/2019 DOCUMNT - Copy

    14/35

    SYSTEM DESIGN

    PROCESS FLOW

    DATA FLOW DIAGRAMS

    A graphicaltool usedtodescribeandanalyzethe momentofdatathrougha

    system manualorautomated includingtheprocess, stores ofdata, anddelays in the

    system.

    The Basic Notation usedtocreatea DFDs areas follows:

    1. Dataflow Data move in a specificdirection from an origin toa destination.

    2. Process People, procedures, ordevices that useorproduce (Transform) Data.

    3. Source External sources ordestination ofdata, which may be People, programs,

    organizations orotherentities.

    4. Data Store Heredataare storedorreferenced by aprocess in the System.

  • 8/7/2019 DOCUMNT - Copy

    15/35

    Dataflow Diagrams

    1st

    Level Diagram

    Sender

  • 8/7/2019 DOCUMNT - Copy

    16/35

    2nd

    Level Diagram

    Sender

    Receiver

  • 8/7/2019 DOCUMNT - Copy

    17/35

    UML DIAGRAMS

    Class Diagram

  • 8/7/2019 DOCUMNT - Copy

    18/35

    Use Case Diagram

    Sender

    Receiver

    Sender

    Select the Image

    Place AlphaNumeric Key

    Send File

    Receiver

    Get The Image

    Remove AlphaNumeric Key

    Save Original File

  • 8/7/2019 DOCUMNT - Copy

    19/35

    Sequence Diagram

    Sender

    Receiver

    Sender Authentication Image Sendsecurity

    1 : Login()

    2 : check()

    3 : fails()

    4 : getImage()

    5 : security()

    6 : Send()

    Receiver Authentication Image Savesecurity

    1 : Login()

    2 : check()

    3 : fa ils()

    4 : get Image()

    5 : Remove Keys()

    6 : Save()

  • 8/7/2019 DOCUMNT - Copy

    20/35

    Activity Diagram

    Sender

    Receiver

    Sender

    Place A lpha Numeric Keys Send

    Check

    No

    yes

    Logout

    Receiver

    Remove Keys Save

    Check

    No

    yes

    Logout

  • 8/7/2019 DOCUMNT - Copy

    21/35

    Component Diagram

    Deployment Diagram

    F

    il

    l

    i

    s

    l

    ! " #

    Fil

    $

    l"

    %

    &

    '

    (

    s

    L) #

    i0

    s 0 1

    s"

    2

  • 8/7/2019 DOCUMNT - Copy

    22/35

    CODING

    importjava.io.FileOutputStream;

    importjava.io.*;

    publicclass image {

    public image(String name)

    {

    try

    {

    byte[] mystr="*.;@%".getBytes();

    System.out.println(mystr.length);

    FileInputStream fis=new

    FileInputStream(name);

    byte[] b=new byte[fis.available()];

    byte[] bb=new

    byte[fis.available()+mystr.length*2];

    System.out.println(b.length);

    System.out.println(bb.length);

    fis.read(b);

    intj=0;

  • 8/7/2019 DOCUMNT - Copy

    23/35

    for(intk=0;k

  • 8/7/2019 DOCUMNT - Copy

    24/35

    saveFile(bb);

    /* FileOutputStream fos=new

    FileOutputStream(name1,true);

    fos.write(bb);

    fos.close();

    FileInputStream fiss=new

    FileInputStream(name1);

    byte[] mb=new byte[fiss.available()];

    fiss.read(mb);

    int myc=mb.length-5;

    byte[] bc=new byte[mb.length-myc];

    for(int i=0;i

  • 8/7/2019 DOCUMNT - Copy

    25/35

    {

    Stringtxt ;

    filedialog fd=new filedialog();

    txt=fd.getfile();

    try

    {

    FileOutputStream out= new FileOutputStream(txt);

    out.write(toSave);

    out.close();

    }

    catch(IOException e)

    {

    System.out.println("Sorry, butthere seems tohave been a

    problem\n" +

    "saving yourfile. Perhaps yourhard-

    drive is full\n" +

    "orthewritepermissions needto be

    changed\n");

    }

    } }

  • 8/7/2019 DOCUMNT - Copy

    26/35

    TESTING

    Testing Concepts

    y Testing Methodologies Blackbox Testing: White box Testing. Gray Box Testing.

    y Levels of Testing Unit Testing. Module Testing. Integration Testing. System Testing. UserAcceptance Testing.

    y Types Of Testing Smoke Testing. Regression Testing. Static Testing. Dynamic Testing. Alpha-Testing. Beta-Testing. Compatibility Testing. Installation Testing. Adhoc Testing.

  • 8/7/2019 DOCUMNT - Copy

    27/35

    Testing

    y Theprocess ofexecutinga system withthe intentof findingan error.y Testing is definedas theprocess in whichdefects are identified, isolated,

    subjected forrectification andensuredthatproduct is defect free in orderto

    producethequality productandhencecustomersatisfaction.

    y Quality is definedas justification oftherequirementsy Defect is nothing butdeviation from therequirementsy Defect is nothing but bug.y Testing --- Thepresenceof bugsy Testingcan demonstratethepresenceof bugs, but nottheirabsencey Debuggingand Testingare notthe samething!y Testing is a systematicattemptto breakaprogram orthe AUT

    Testing Methodologies

    y Black box Testing is thetestingprocess in whichtestercan perform testingon an application withouthavingany internal structuralknowledgeof

    application.

    Usually Test Engineers are involved in the blackboxtesting.

    y White box Testing is thetestingprocess in whichtestercan perform testingon an application withhaving internal structuralknowledge.

    Usually The Developers are involved in white boxtesting.

    y Gray Box Testing is theprocess in whichthecombination of blackboxandwhite boxtonicsare used.

  • 8/7/2019 DOCUMNT - Copy

    28/35

    Levels of Testing

    Module1 Module2 Module3

    Units Units Units

    i/p Integration o/p i/p Integration o/p

    System Testing: Presentation + business +Databases

    bUAT: user acceptance testing

    Test Planning

    1.Test Plan is definedas a strategicdocumentwhich

    describes theprocedurehowtoperform various testingon thetotal

    application in the mostefficientway.

    2.This document involves the scopeoftesting,

    3. Objectiveoftesting,

  • 8/7/2019 DOCUMNT - Copy

    29/35

    4. Areas that needto betested,

    5. Areas that should not betested,

    6. Scheduling Resource Planning,

    7. Areas to beautomated, various testingtools

    Used.

    Test Development

    1. Testcase Development (checklist)

    2. Test Procedurepreparation. (Description ofthe Testcases).

    1. Implementation oftestcases. Observingtheresult.

    Result Analysis 1. Expected value: is nothing butexpected behavior

    Ofapplication.

    2. Actual value is nothing butactual behaviorof

    application

    Bug Tracing Collectallthe failedcases, preparedocuments.

    Reporting Preparedocument (status oftheapplication)

  • 8/7/2019 DOCUMNT - Copy

    30/35

    SCREENSHOTS

  • 8/7/2019 DOCUMNT - Copy

    31/35

  • 8/7/2019 DOCUMNT - Copy

    32/35

  • 8/7/2019 DOCUMNT - Copy

    33/35

    `

  • 8/7/2019 DOCUMNT - Copy

    34/35

  • 8/7/2019 DOCUMNT - Copy

    35/35

    BIBLIOGRAPHY

    REFERENCES

    (1) Java Complete Reference By Herbert Shield

    (2) Database Programmingwith JDBC and Java By George Reese

    (3) Javaand XML By Brett McLaughlin

    (4) Wikipedia, URL: http://www.wikipedia.org.

    (5) Answers.com, Online Dictionary, Encyclopediaand much more, URL:

    http://www.answers.com

    (6) Google, URL: http://www.google.co.in

    (7)Project Management URL: http://www.startwright.com/project.htm

    (8) http://it.toolbLox.com/wiki/index.php/Warehouse_Management