Вы находитесь на странице: 1из 20

Introduction

In the current trends of the world, the technologies have advanced so much that most of the
individuals prefer using the internet as the primary medium to transfer data from one end to
another across the world. There are many possible ways to transmit data using the internet:
via e-mails, chats, etc. The data transition is made very simple, fast and accurate using the
internet. However, one of the main problems with sending data over the internet is the
security that it poses i.e. the personal or confidential data can be stolen or hacked in many
ways. Therefore it becomes very important to take data security into consideration, as it is
one of the most essential factors that need attention during the process of data transferring.
Data security basically means protection of data from unauthorized users providing high
security to prevent data modification. This area of data security has gained more attention
over the recent period of time due to the massive increase in data transfer rate over the
internet. In order to improve the security features in data transfers over the internet, many
techniques have been developed like: Cryptography, Steganography and digital
watermarking.

The main purpose for preparing this document is to give a general insight into the analysis and
requirements of the existing system or situation and for determining the operating characteristics
of the system. The main objective of this system is to avoid drawing suspicion to the
transmission of hidden message.

Methodology
The Systems Development Life Cycle (SDLC) is a conceptual model used in project
management that describes the stages involved in an information system development project
from an initial feasibility study through maintenance of the completed application. System is an
organized collection of independent tasks and processes that is designed to work together in
order to accomplish specific objectives. The SDLC methodology may be condensed to include
only those activities that are appropriate for a particular project, whether the system is automated
or manual, whether it is a new system, or an enhancement to existing systems. The SDLC
methodology tracks a project from an idea developed by the user, through a feasibility study,
systems analysis and design, programming, implementation and analysis. SDLC methodology
follows the following steps:

If there is an existing system, its deficiencies are identified. This is accomplished by


interviewing users and consulting with support personnel.

The new system requirements are defined including addressing any deficiencies in the
existing system with specific proposals for improvement.

The proposed system is designed. Plans are created detailing the hardware, operating
systems, programming, and security issues.

The new system is developed. The new components and programs must be obtained and
installed. Users of the system must be trained in its use, and all aspects of performance
must be tested. If necessary, adjustments must be made at this stage.

The system is put into use. This can be done in various ways. The new system can phased
in, according to application or location, and the old system gradually replaced.

In some cases, it may be more cost-effective to shut down the old system and implement
the new system all at once.

Once the new system is up and running for a while, it should be exhaustively evaluated.
Maintenance must be kept up rigorously at all times.

In our project work we have gone through the following phases of Systems Development Life
Cycle (SDLC) to develop the various modules of the site, including requirements, validation and
training.
SDLC methodology has the following main stages:

Assess need, opportunities and issues. The existing system was evaluated. Deficiencies
were identified. This was done by personally going through systems available and
learning the experiences of users.
Define functional and performance specifications for the new system. The new
system requirements were defined. Deficiencies in the existing system should be
addressed along with proposals for improvement.

Design/Develop/Test Software for Systems Integration: The proposed system was


designed. Plans were prepared for the logical and physical construction, hardware,
operating systems, programming, communications, training, and security issues. The new
system was developed. The new components and programs were be obtained, installed
and integrated. All aspects of performance were tested.

Support Program Implementation: The system was put into use.

Support Operations: System performance was monitored; tuning and synchronization


are performed.

Evaluate/assess program performance: Once the new system is up and running for a
while, it should be exhaustively evaluated. Maintenance would be kept up rigorously at
all times. Users of the system would be kept up-to-date concerning the latest
modifications and procedures.
The project is concentrated on the data security issues when sending the data over the
network using steganographic and cryptographic techniques, providing database backup
and features of desktop and webcam recording. The main objectives of the project are:
Hidden Ink has been developed to provide confidentiality security service.

Audio/Video Steganography tool allows user to hide information or message in any


audio/video files and provide the path where the user wants to save Image and
extruded file.
Steganocrypt tool allows sending the encrypted messages in an image file as a
carrier to hide a message using the steganography and cryptography technique, it
does not reveal any difference in attributes like size, content etc from that of the
original file. It is difficult for someone to find out that this image contains a message.
The encrypted message is further decrypted using cryptography.
User Requirement Analysis
Software Requirements

A set of programs associated with the operation of a computer is called software.


Software is the part of the computer system which enables the user to interact with
several physical hardware devices.
The minimum software requirement specifications for developing this project are as
follows:

Operating System : Window 2000, XP


Presentation layer : Java, Servlets, JavaServer Pages
Presentation : Power Point 2003
Documentation Tool : Ms Office
Designing Tool : Photoshop

Hardware Requirement Specification

The Collection of internal electronic circuits and external physical devices used in
building a computer is called Hardware.
The minimum hardware requirement specification for developing this project is as
follows:

Processor : Pentium IV/AMD Athelon (1.6 GHz)


RAM : 512MB RAM
Hard Disk : 10GB
Monitor : Standard Color Monitor
Keyboard : Standard Keyboard
Mouse : Standard Mouse

Functional Requirements

The system has the following functional Requirements.


New User can Sign up the details to the website
The already signed in user can login to avail the network security facilities.
The logged in user can change his Password as and when required.
Already signed in users can report suggestions/complaints in the website.
Users can view the details of various tools available on website.
Non functional requirements
Secure access of confidential data.
Access to the various subsystems will be protected by a user log in screen that
requires a user name and password. After user logs out, the browser should display
his pages without password.
Flexible service based architecture will be highly desirable for future extension
Development and Implementation
Introduction to Language
Java
Initially the language was called as oak but it was renamed as Java in 1995. The
primary motivation of this language was the need for a platform-independent (i.e.,
architecture neutral) language that could be used to create software to be embedded in
various consumer electronic devices.
Java is a programmers language.

Java is cohesive and consistent.

Except for those constraints imposed by the Internet environment, Java gives the
programmer, full control.
Finally, Java is to Internet programming where C was to system programming.

Features of Java

Simple: The Java language is easy to learn. Java code is easy to read and write.

Secure: The Java platform is designed with security features built into the
language and runtime system such as static type-checking at compile time and
runtime checking (security manager), which let you creating applications that
cant be invaded from outside. You never hear about viruses attacking Java
applications.

High Performance: Java code is compiled into bytecode which is highly


optimized by the Java compiler, so that the Java virtual machine (JVM) can
execute Java applications at full speed. In addition, compute-intensive code can be
re-written in native code and interfaced with Java platform via Java Native
Interface (JNI) thus improve the performance.
Object-Oriented: Unlike C++ which is semi object-oriented, Java is a fully
object-oriented programming language. It has all OOP features such as
abstraction, encapsulation, inheritance and polymorphism.
Multithreaded: The Java platform is designed with multithreading capabilities
built into the language. That means you can build applications with many
concurrent threads of activity, resulting in highly interactive and responsive
applications.
Platform Independence: Java code is compiled into intermediate format
(bytecode), which can be executed on any systems for which Java virtual machine
is ported. That means you can write a Java program once and run it on Windows,
Mac, Linux or Solaris without re-compiling.
Netbeans
NetBeans IDE is the official IDE for Java 8. With its editors, code analyzers, and
converters, you can quickly and smoothly upgrade your applications to use new Java 8
language constructs, such as lambdas, functional operations, and method references.
Batch analyzers and converters are provided to search through multiple applications at
the same time, matching patterns for conversion to new Java 8 language constructs.
With its constantly improving Java Editor, many rich features and an extensive range
of tools, templates and samples, NetBeans IDE sets the standard for developing with
cutting edge technologies out of the box. The NetBeans Editor indents lines, matches
words and brackets, and highlights source code syntactically and semantically. It lets
you easily refactor code, with a range of handy and powerful tools, while it also
provides code templates, coding tips, and code generators.

The editor supports many languages from Java, C/C++, XML and HTML, to PHP,
Groovy, Javadoc, JavaScript and JSP. Because the editor is extensible, you can plug in
support for many other languages.

Any other supporting language


Html
HyperText Markup Language, commonly referred to as HTML, is the standard markup
language used to create web pages. Along with CSS, and JavaScript, HTML is a
cornerstone technology, used by most websites to create visually engaging webpages,
user interfaces for web applications, and user interfaces for many mobile
applications. Web browsers can read HTML files and render them into visible or
audible web pages. HTML describes the structure of a website semantically along with
cues for presentation, making it a markup language, rather than a programming
language.
HTML elements form the building blocks of all websites. HTML allows images and
objects to be embedded and can be used to create interactive forms. It provides a
means to create structured documents by denoting structural semantics for text such as
headings, paragraphs, lists, links, quotes and other items.
The language is written in the form of HTML elements consisting of tags enclosed
in angle brackets (like <html>). Browsers do not display the HTML tags and scripts,
but use them to interpret the content of the page. HTML can embed scripts written in
languages such as JavaScript which affect the behavior of HTML web pages. Web
browsers can also refer to Cascading Style Sheets (CSS) to define the look and layout
of text and other material. The World Wide Web Consortium (W3C), maintainer of
both the HTML and the CSS standards, has encouraged the use of CSS over explicit
presentational HTML since 1997.

MySQL
MySQL is a popular choice of database for use in web applications, and is a central
component of the widely used LAMP open source web application software stack
(and other 'AMP' stacks). LAMP is an acronym for "Linux, Apache,
MySQL, Perl/PHP/Python." Free-software-open source projects that require a full-
featured database management system often use MySQL.

MySQL can be built and installed manually from source code, but this can be
tedious so it is more commonly installed from a binary package unless special
customizations are required. On most Linux distributions the package management
system can download and install MySQL with minimal effort, though further
configuration is often required to adjust security and optimization settings.

Though MySQL began as a low-end alternative to more powerful proprietary


databases, it has gradually evolved to support higher-scale needs as well. It is still
most commonly used in small to medium scale single-server deployments, either as
a component in a LAMP-based web application or as a standalone database server.
Much of MySQL's appeal originates in its relative simplicity and ease of use, which
is enabled by an ecosystem of open source tools such as phpMyAdmin. In the
medium range, MySQL can be scaled by deploying it on more powerful hardware,
such as a multi-processor server with gigabytes of memory.

There are however limits to how far performance can scale on a single server, so on
larger scales, multi-server MySQL deployments are required to provide improved
performance and reliability. A typical high-end configuration can include a
powerful master database which handles data write operations and is replicated to
multiple slaves that handle all read operations. The master server synchronizes
continually with its slaves so in the event of failure a slave can be promoted to
become the new master, minimizing downtime. Further improvements in
performance can be achieved by caching the results from database queries in
memory using memcached, or breaking down a database into smaller chunks
called shards which can be spread across a number of distributed server clusters.

JavaScript

JavaScript is a high-level, dynamic, untyped, and interpreted programming


language. It has been standardized in the ECMA Script language
specification. Alongside HTML and CSS, it is one of the three essential
technologies of World Wide Web content production; the majority
of websites employ it and it is supported by all modern web browsers without plug-
ins. JavaScript is prototype-based with first-class functions, making it a multi-
paradigm language, supporting object-oriented, Imperative,
and functional programming styles. It has an API for working with text, arrays,
dates and regular expressions, but does not include any I/O, such as networking,
storage or graphics facilities, relying for these upon the host environment in which
it is embedded.
Despite some naming, syntactic, and standard library similarities, JavaScript
and Java are otherwise unrelated and have very different semantics. The syntax of
JavaScript is actually derived from C, while the semantics and design are
influenced by the Self and Scheme programming languages.

JavaScript is also used in environments that are not web-based, such as PDF
documents, site-specific browsers, and desktop widgets. Newer and faster
JavaScript virtual machines (VMs) and platforms built upon them have also
increased the popularity of JavaScript for server-side web applications. On the
client side, JavaScript has been traditionally implemented as an interpreted
language, but more recent browsers perform just-in-time compilation. It is also used
in game development, the creation of desktop and mobile applications, and server-
side network programming with runtime environments such as Node.js.

Modules
There are four modules developed so far which are as follows:

Sign Up

A new user creates his account on the website by filling his credentials eg name,
email, password. If all the details are filled by the user, he clicks on the Sign up
button which further leads him to the login page.

Login

An already signed in user enters his valid email and password and clicks the login
button. If the details entered by the user are valid then it opens his/her account
otherwise an error message pops up on the page.

Tools

There are four tools available which provide varying functionality:


Stegnocrypt

The sender can send a message to the destination securely using the combined
technique of stegnography and cryptography. In this a sender can encrypt a
message by clicking the encrypt button and then attaching the encrypted
message to a image file. The same procees is repeated for decoding it.
Audio/Video Stegnography

The sender can send a message to the destination securely using the technique
of stegnography. This can be done by attaching a audio/video file to the
message. So the third party can be unaware of the secret message. They think
that a video file is sending and they not at all know about this secret sending of
the message.

Contact

For any queries or additional help, a user can contact the admin by filling the details
in the form. The message sent by the user is received by the admin in his gmail
account.

Implementation with Screenshots


A. Logo : HIDDEN ink go unseen......

Fig-(4.1 Logo)
B. Navigation Bar :
Navigation Bar is fixed on the Top.

I. Non-Signed In User
Bar contains three options in the centre of the bar :
Home
Work
Contact us
Another three options on the right corner of the bar :
Sign Up
Login

Fig-(4.2 Navigation bar : Non-Signed In User )
II. Signed In User
Bar contains three options in the centre of the bar :
Home
Work
Tools
Contact us
Another two options on the right corner of the bar :
Signed In User First Name
LOG OUT

Fig-(4.3 Navigation bar : Signed In User )


III. Loged In Admin
Bar contains three options in the centre of the bar :
Admin
User Information
User Actions
Another two options on the right corner of the bar :
Admin Link
LOG OUT

Fig-(4.4 Navigation bar : Signed In Admin )

C. User Module :

Home Page :
Fig-(4.5 Home Page )

Work Page :

Fig-(4.6 Work Page )

Sign Up Popup Window :


Fig-(4.7 Sign-Up Pop-Up Window )
Login Popup Window :

Fig-(4.8 Login Pop-Up Window )

Change Password for Signed in User :


Fig-(4.9 Change-Password Pop-Up Window )
Contact Us :
Contact Us for Not-Signed in User :
In this page, any user whether a member or not can able to contact sending
an email to the Admin for any queries.

Fig-(4.10 Contact Us Page (Non-Signed In User) )


Contact Us for Signed in User :
In this page, Only Signed user will be able to send an email to the Admin
for any queries.
Two input fields are already filled non-changeable too.
Fig-(4.11 Contact Us Page (Signed In User) )
Tools :
Video and Audio Steganography Introduction Page :

Fig-(4.12 Video and Audio Steganography Page )

Video Steganography Tool :


For Encoding : Write Your Message in the box and Choose the
Container File of .Flv extension and click on Encoding button. A
Download Link is appeared, This Link has Message with the Video
file of extension .Flv .
Fig-(4.13.1 Video Steganography Page )

For Decoding : Choose the Encoded Container File of .Flv extension


and click on Decoding button. Decoded Message will appear on the
Message Box.

Fig-(4.13.2 Video Steganography Page )

Audio Steganography Tool :


For Encoding : Write Your Message in the box and Choose the
Container File of .AU extension and click on Encoding button. A
Download Link is appeared, This Link has Message with the Video
file of extension .WAV .
Fig-(4.14.1 Audio Steganography Page )
For Decoding : Choose the Encoded Container File of .Flv extension
and click on Decoding button. Decoded Message will appear on the
Message Box.

Fig-(4.14.2 Audio Steganography Page )

Stegno-Crypt Introduction :
Introduction about the Features of the Stegno-Crypt and also to move to
Image Steganography Page.

Fig-(4.15 Stegano-Crypt Page )


Image Steganography Tool :
For Encoding : Write Your Message in the box and Click on Encrypt
button to encrypt the message. Choose the Container File of .Jpg
extension and click on Encoding button. A Download Link is
appeared, This Link has Encrypted Message with the Image file of
extension .Png .

Fig-(4.16.1 Image Steganography Page )


For Decoding : Choose the Encoded Container File of .Png extension
and click on Decoding button. Decoded Message will appear on the
Message Box. The message will be in encrypted form, to decrypt the
message click on Decrypt button.

Fig--(4.16.2 Image Steganography Page )

Вам также может понравиться