Академический Документы
Профессиональный Документы
Культура Документы
In the current trends of the world, the technologies have advanced so much that most of the
individuals prefer using the internet as the primary medium to transfer data from one end to
another across the world. There are many possible ways to transmit data using the internet:
via e-mails, chats, etc. The data transition is made very simple, fast and accurate using the
internet. However, one of the main problems with sending data over the internet is the
security that it poses i.e. the personal or confidential data can be stolen or hacked in many
ways. Therefore it becomes very important to take data security into consideration, as it is
one of the most essential factors that need attention during the process of data transferring.
Data security basically means protection of data from unauthorized users providing high
security to prevent data modification. This area of data security has gained more attention
over the recent period of time due to the massive increase in data transfer rate over the
internet. In order to improve the security features in data transfers over the internet, many
techniques have been developed like: Cryptography, Steganography and digital
watermarking.
The main purpose for preparing this document is to give a general insight into the analysis and
requirements of the existing system or situation and for determining the operating characteristics
of the system. The main objective of this system is to avoid drawing suspicion to the
transmission of hidden message.
Methodology
The Systems Development Life Cycle (SDLC) is a conceptual model used in project
management that describes the stages involved in an information system development project
from an initial feasibility study through maintenance of the completed application. System is an
organized collection of independent tasks and processes that is designed to work together in
order to accomplish specific objectives. The SDLC methodology may be condensed to include
only those activities that are appropriate for a particular project, whether the system is automated
or manual, whether it is a new system, or an enhancement to existing systems. The SDLC
methodology tracks a project from an idea developed by the user, through a feasibility study,
systems analysis and design, programming, implementation and analysis. SDLC methodology
follows the following steps:
The new system requirements are defined including addressing any deficiencies in the
existing system with specific proposals for improvement.
The proposed system is designed. Plans are created detailing the hardware, operating
systems, programming, and security issues.
The new system is developed. The new components and programs must be obtained and
installed. Users of the system must be trained in its use, and all aspects of performance
must be tested. If necessary, adjustments must be made at this stage.
The system is put into use. This can be done in various ways. The new system can phased
in, according to application or location, and the old system gradually replaced.
In some cases, it may be more cost-effective to shut down the old system and implement
the new system all at once.
Once the new system is up and running for a while, it should be exhaustively evaluated.
Maintenance must be kept up rigorously at all times.
In our project work we have gone through the following phases of Systems Development Life
Cycle (SDLC) to develop the various modules of the site, including requirements, validation and
training.
SDLC methodology has the following main stages:
Assess need, opportunities and issues. The existing system was evaluated. Deficiencies
were identified. This was done by personally going through systems available and
learning the experiences of users.
Define functional and performance specifications for the new system. The new
system requirements were defined. Deficiencies in the existing system should be
addressed along with proposals for improvement.
Evaluate/assess program performance: Once the new system is up and running for a
while, it should be exhaustively evaluated. Maintenance would be kept up rigorously at
all times. Users of the system would be kept up-to-date concerning the latest
modifications and procedures.
The project is concentrated on the data security issues when sending the data over the
network using steganographic and cryptographic techniques, providing database backup
and features of desktop and webcam recording. The main objectives of the project are:
Hidden Ink has been developed to provide confidentiality security service.
The Collection of internal electronic circuits and external physical devices used in
building a computer is called Hardware.
The minimum hardware requirement specification for developing this project is as
follows:
Functional Requirements
Except for those constraints imposed by the Internet environment, Java gives the
programmer, full control.
Finally, Java is to Internet programming where C was to system programming.
Features of Java
Simple: The Java language is easy to learn. Java code is easy to read and write.
Secure: The Java platform is designed with security features built into the
language and runtime system such as static type-checking at compile time and
runtime checking (security manager), which let you creating applications that
cant be invaded from outside. You never hear about viruses attacking Java
applications.
The editor supports many languages from Java, C/C++, XML and HTML, to PHP,
Groovy, Javadoc, JavaScript and JSP. Because the editor is extensible, you can plug in
support for many other languages.
MySQL
MySQL is a popular choice of database for use in web applications, and is a central
component of the widely used LAMP open source web application software stack
(and other 'AMP' stacks). LAMP is an acronym for "Linux, Apache,
MySQL, Perl/PHP/Python." Free-software-open source projects that require a full-
featured database management system often use MySQL.
MySQL can be built and installed manually from source code, but this can be
tedious so it is more commonly installed from a binary package unless special
customizations are required. On most Linux distributions the package management
system can download and install MySQL with minimal effort, though further
configuration is often required to adjust security and optimization settings.
There are however limits to how far performance can scale on a single server, so on
larger scales, multi-server MySQL deployments are required to provide improved
performance and reliability. A typical high-end configuration can include a
powerful master database which handles data write operations and is replicated to
multiple slaves that handle all read operations. The master server synchronizes
continually with its slaves so in the event of failure a slave can be promoted to
become the new master, minimizing downtime. Further improvements in
performance can be achieved by caching the results from database queries in
memory using memcached, or breaking down a database into smaller chunks
called shards which can be spread across a number of distributed server clusters.
JavaScript
JavaScript is also used in environments that are not web-based, such as PDF
documents, site-specific browsers, and desktop widgets. Newer and faster
JavaScript virtual machines (VMs) and platforms built upon them have also
increased the popularity of JavaScript for server-side web applications. On the
client side, JavaScript has been traditionally implemented as an interpreted
language, but more recent browsers perform just-in-time compilation. It is also used
in game development, the creation of desktop and mobile applications, and server-
side network programming with runtime environments such as Node.js.
Modules
There are four modules developed so far which are as follows:
Sign Up
A new user creates his account on the website by filling his credentials eg name,
email, password. If all the details are filled by the user, he clicks on the Sign up
button which further leads him to the login page.
Login
An already signed in user enters his valid email and password and clicks the login
button. If the details entered by the user are valid then it opens his/her account
otherwise an error message pops up on the page.
Tools
The sender can send a message to the destination securely using the combined
technique of stegnography and cryptography. In this a sender can encrypt a
message by clicking the encrypt button and then attaching the encrypted
message to a image file. The same procees is repeated for decoding it.
Audio/Video Stegnography
The sender can send a message to the destination securely using the technique
of stegnography. This can be done by attaching a audio/video file to the
message. So the third party can be unaware of the secret message. They think
that a video file is sending and they not at all know about this secret sending of
the message.
Contact
For any queries or additional help, a user can contact the admin by filling the details
in the form. The message sent by the user is received by the admin in his gmail
account.
Fig-(4.1 Logo)
B. Navigation Bar :
Navigation Bar is fixed on the Top.
I. Non-Signed In User
Bar contains three options in the centre of the bar :
Home
Work
Contact us
Another three options on the right corner of the bar :
Sign Up
Login
Fig-(4.2 Navigation bar : Non-Signed In User )
II. Signed In User
Bar contains three options in the centre of the bar :
Home
Work
Tools
Contact us
Another two options on the right corner of the bar :
Signed In User First Name
LOG OUT
C. User Module :
Home Page :
Fig-(4.5 Home Page )
Work Page :
Stegno-Crypt Introduction :
Introduction about the Features of the Stegno-Crypt and also to move to
Image Steganography Page.