Вы находитесь на странице: 1из 8

AUTOMATED AND DIGITALIZED CAMPUS MANAGEMENT SYSTEM OF IIL

Project Report submitted by V.C.GAUTHAM (REG. NO: 08FD015)

in partial fulfillment of the requirements for the award of the degree of Bachelor of Technology in Information Technology of KarunyaUniversity

Under the guidance of Mrs. S.Durga, M.E., Assistant Professor, Information Technology.

DEPARTMENT OF INFORMATION TECHNOLOGY School of Computer Science and Technology KARUNYA UNIVERSITY (Karunya Institute of Technology and Sciences)
Declared asDeemed to be University under sec.3 of the UGC Act, 1956

KARUNYA NAGAR, COIMBATORE - 641 114. APRIL 2012

KARUNYA UNIVERSITY
(Karunya Institute of Technology and Sciences)
Declared as Deemed to be University under sec.3 of the UGC Act, 1956

Karunya Nagar, Coimbatore -641 114 DEPARTMENT OF INFORMATION TECHNOLOGY

CERTIFICATE
This is to certify that the project report entitled, AUTOMATED AND DIGITALIZED CAMPUS MANAGEMENT SYSTEM OF IIL is a bonafide record of project work done during the academic year 2011-2012 by

V.C.GAUTHAM (Reg.No:08FD015)

in partial fulfillment of the requirements for the award of the degree of Bachelor of Technology(Information Technology) of Karunya University.

Internal Guide

Head of the Department

Submitted for the Viva Voce held on _________________

Internal Examiner

External Examiner

ACKNOWLEDGEMENT
First and foremost, I praise and thank ALMIGTHY GOD whose blessings have bestowed in me the will power and confidence to carry out my project. I am grateful to our beloved founders late. Dr. D.G.S. Dhinakaran, C.A.I.I.B, Ph.D and Dr. Paul Dhinakaran, M.B.A, Ph.D, for their love and always remembering us in their prayers. I extend my thanks to our Vice Chancellor Dr. Paul P. Appasamy M.S.(Chemical Engg.), M.B.A., Ph.D.,and our Registrar Dr. (Mrs) Anne Mary Fernandez M.A., M.Phil., Ph.D., for giving me this oppurtunity to do the project. I would like to place my heart-felt thanks and gratitude to Dr. R.Elijah Blessing Vinoth, M.E, Ph.D., Director School of Computer Science and Engineering and Dr.J.Dinesh Peter, Ph.D., HOD IT, for their encouragement and guidance. I feel it a pleasure to be indebted to my guide, Mrs. S. Durga, M.E., Assistant Professor, Department of Information Technology for her valuable support, advice and encouragement. I also thank all the staff members of the Department for extending their helping hands to make this project a success. I would also like to thank all my friends and my parents who have prayed and helped me during the project work.

ANNEXURE 4

SYNOPSIS
Security has become an inseparable issue as information technology is ruling the world now. Cryptography is the study of mathematical techniques related aspects of Information Security such as confidentiality, data security, entity authentication and data origin authentication, but it is not the only means of providing information security, rather one of the techniques. Visual cryptography is a new technique which provides information security which uses simple algorithm unlike the complex, computationally intensive algorithms used in other techniques like traditional cryptography. This technique allows Visual information (pictures, text, etc) to be encrypted in such a way that their decryption can be performed by the human visual system, without any complex cryptographic algorithms. This technique represents the secret image by several different shares of binary images. It is hard to perceiveany clues about a secret image from individual shares. The secretmessage is revealed when parts or all of these shares are aligned andstacked together. In this paper we provide an overview of theemerging Visual Cryptography (VC) and related work which isbased on the recovering of secret image. A binary logo is used torepresent the ownership of the host image and verifies the reliabilityof the reconstructed image. The logo is used to generate shadows byvisual cryptography algorithms. An error correction-coding schemeis also used to create the appropriate shadow. The logo extractedfrom the half-toned host image identifies the cheating types.Furthermore, the logo recovers the reconstructed image whenshadow is being cheated.

ANNEXURE 5

CONTENTS Acknowledgement Synopsis List of Tables List of Figures List of Symbols, Abbreviations And Nomenclature 1 Introduction 1.1 image stitching 1.2 state-of-the-art 1.3 work done in this thesis 1.4 chapter-wise summary Literature survey / System analysis System Design (Module Explanation With Dataflow, Flowchart, Activity Diagrams) Implementation And Result Analysis 5.1 Implementation Of Gist1 Algorithm 5.1.1 Computing The Gradient 5.1.2 Gradient In Any Arbitrary Direction 5.1.3 Calculation Of Weighting Mask 5.2 Minimum Error Boundary Cut Method 5.2.1 Algorithm 5.3 Performance Analysis Conclusion and Future Work References Appendix A-Sample Source Code Appendix B-Output Screen 1 1 2 3 4 11 20 29 29 30 30 30 31 32 32 36 37 38 39 i ii iii iv v

2 3 4

ANNEXURE 6

REFERENCES
[1] A.Berson and S.Smirth,Transients in Power Systems,3rd Edition, McGraw Hill,1998, ISBN:81-265-0280-0. [2] Larry M.Stephens, Consensus Ontologies in Web Page Design, IEEE Transactions On Pattern Recognition and Machine Intelligence, vol.29, no.4, pp. 120-135, September 1999. [3] K.E.Barner,Joint Region Merging Criteria,Proceedings of International Conference on Image Processing,vol.25, pp. 108-111, Sept.2007. [4] [online] http://www.vicomsoft.com/knowledge/reference/firewalls1.html. .

ANNEXURE 7

CHAPTER 1 INTRODUCTION
Visual cryptography is introduced by first in Noar and Shamir. Visual cryptography is a cryptographic technique which allows visual information (e.g. printed text, handwritten notes and pictures) to be encrypted in such a way that the decryption can be performed by the human visual system, without the aid of computers. Visual cryptography scheme eliminates complex computation problem in decryption process, and the secret images can be restored by stacking operation. This property makes visual cryptography especially useful for the low computation load requirement. Visual cryptography is a unique technique in the sense that the encrypted messages can be decrypted directly by the human visual system. Therefore, a system employing visual cryptography can be used by anyone without any knowledge of cryptograph. Secret sharing is a way to distributing secret among a group of members such that each member owns a share of the secret. Only some specific combinations of shares can reconstruct the secret. Individual shares reveal nothing about the secret. Visual Secret Sharing is an encryption technique that doesnt need complex calculations in order to decrypt a message. The cipher text and the key consist of transparencies (or images). When properly stacked these transparencies (or stacked by image editing package), one can reveal the plaintext.The important parameters of this visual cryptography are, a) Pixel expansion m, which refers to thenumber of pixels in a share used to encrypta pixel of the secret image. This implies lossof resolution in the reconstructed image. b) Contrast , which is the relativedifference between black and white pixels inthe reconstructed image. This implies thequality of the reconstructed image.Generally, smaller the

value of m willreduce the loss in resolution and greater the value of will increase the quality of thereconstructed image.As mentioned above if m is decreased, thequality of the reconstructed image will beincreased but security will be a problem.

1.1 OBJECTIVE To verify the reliability of the reconstructed secret image and the set of collected shadows to identifies the cheating types when some of collected shadows are fake during the revealing phase. Then recover the reconstructed secret image when the shadow is being cheated.

1.2 STATE-OF-THE-ART Existing visual secret sharing schemes allow participants to verify the shadows they receive during theshares construction phase. However, most of these schemes do not allow participants to verify the reconstructed secret image during the revealing phase.They do not consider the following situation:the dealer generates valid shadows and registers a correcthalftone logo that will be embedded into the intermediate shadow S1 at the trusted third party during the shares constructionphase, but s/he replaces some valid shadows with the fakeshadows before distributing shadows to honest participants. Inother words, there is no change of shadows on the participantsside during the revealing phase. When some fake shadows are collected during the reveling phase, verifyingthe reconstructed secret image is another problem having no answeruntil this day.

1.3 CHAPTER-WISE SUMMARY This project aims at introducing a self-verifying technique which provides an effective solution for verifying the reliability of the set of collected shadows as well as the reconstructed secret image.The second chapter describes in detail about the self verifying visual secret scheme using error diffusion and interpolation techniques proposed by the authors of the base paper.

Вам также может понравиться