Professional Documents
Culture Documents
Project Synopsis
Project Synopsis
Objective: A digital watermark is a digital signal or pattern inserted into a digital image. Since this signal or pattern is present in each unaltered copy of the original image, the digital watermark may also serve as a digital signature for the copies. A given watermark may be unique to each copy (e.g., to identify the intended recipient), or be common to multiple copies (e.g., to identify the document source). In either case, the watermarking of the document involves the transformation of the original into another form. This distinguishes digital watermarking from digital fingerprinting where the original file remains intact, but another file is created that "describes" the original file's content. As a simple example, the checksum field for a disk sector would be a fingerprint of the preceding block of data. Similarly, hash algorithms produce fingerprint files. Description: Digital watermarking is also to be contrasted with public-key encryption, which also transform original files into another form. It is a common practice nowadays to encrypt digital documents so that they become un-viewable without the decryption key. Unlike encryption, however, digital watermarking leaves the original digital data (image or file) basically intact and recognizable. In addition, digital watermarks, as signatures, may not be validated without special software. Digital watermarks are designed to be persistent in viewing, printing, or subsequent re-transmission or dissemination. Thus, watermarking does not prevent copying, but it deters illegal copying by providing a means for establishing the original ownership of a redistributed copy. Digital Watermarking Watermarking is not a new technique. It is descendent of a technique known as Steganography which had been in existence for at least a few hundred years. Steganography is a technique for concealed communication. In contrast to cryptography where the content of a communicated message is secret, in Steganography the very existence of the message that is communicated is a secret and its presence is known only by parties involved in the communication. Steganography is technique where a secret message is hidden within another unrelated message and then communicated to the other party. Some of the techniques of Steganography like use of invisible ink, word spacing patterns in printed documents, coding messages in music compositions, etc., have been used by military intelligence since the times of ancient Greek civilization
Watermarking can be considered as a special technique of Steganography where one message is embedded in another and the two messages are related to each other in some way. The most common examples of watermarking are the presence of specific patterns in currency notes which are visible only when the note is held to light and logos in the background of printed text documents. The watermarking techniques prevent forgery and unauthorized replication of physical objects.
Digital watermarking is similar to watermarking physical objects except that the watermarking technique is used for digital content instead of physical objects. In digital watermarking a low-energy signal is imperceptibly embedded in another signal. The low-energy signal is called watermark and it depicts some metadata, like security or rights information about the main signal. The main signal in which the watermark is embedded is referred to as cover signal since it covers the watermark. The cover signal is generally a still image, audio clip, video sequence or a text document in digital format.
HARDWARE REQUIREMENTS Processors Hard Disk Key Board Mouse : Pentium, Celeron, Athol on etc. : Minimum 10 GB & maximum 40GB : Logitech (Multimedia compatible) : Logitech (Scroll or Optical)
SOFTWARE REQUIREMENTS Operating System Language Memory Data Base : Windows 95 / 98 / 2000 XP : Java 2 Standard edition 1.5 : Virtual Memory : ORACLE 8i or later versions
Steganography is the art and science of hiding that communication is happening. Classical Steganography systems depend on keeping the encoding system secret, but modern steganography is detectable only if secret information is known, e.g. a secret key. Because of their invasive nature, steganography systems leave detectable traces within a medium's characteristics. This allows an eavesdropper to detect media that has been modified, revealing that secret communication is taking place. Although the secrecy of the information is not degraded, its hidden nature is revealed, defeating the main purpose of Steganography.
For JPEG images, Outguess preserves statistics based on frequency counts. As a result, statistical tests based on frequency counts are unable to detect the presence of steganographic content. Before embedding data into an image, Outguess can determine the maximum message size that can be hidden while still being able to maintain statistics based on frequency counts.
Outguess uses generic iterators object to select which bits in the data should be modified. A seed can be used to modify the behavior of the iterator. It is embedded in the data along with the rest of the message. By altering the seed, Outguess tries to find a sequence of bits that minimizes the number of changes in the data that have to be made.
Compression reduces the average code length used to represent the symbols of an alphabet. Symbols of the source alphabet which occur frequently are assigned with short length codes. The general strategy is to allow the code length to vary from character to character and to ensure that the frequently occurring
character have shorter codes. In Radix64 compression technique, maps arbitrary input into printable character output. The form of encoding has the following relevant characteristics. The range of the function is a character set that is universally re-presentable at all sites, not a specific binary encoding of that character set. Thus, the characters themselves can be encoded into whatever form is needed by a specific system. For instance, the character 'E' is represented in ASCII system as a hexadecimal 45 and in EDCDIC- based system as hexadecimal- c5.
The character set consists of 65 printable characters, one of which is used for padding. With 2^6 = 64 available characters, each character can be used to represent 6 bits of input. No control characters are included in the set. Thus, the message encoded in Radix-64 can traverse mail-handling system. That scans the data stream for control characters. The hyphen character "- is not included.
manipulation .CRC set is the most effective weapons against computer viruses. This the Cyclic Redundancy Check, or CRC, is an error-checking algorithm used in many types of computer operations, especially in data transfer.
Before transmitting the data, the utility want to calculate the CRC value and attach with data. In receiving end, the CRC recalculated and based on that calculated value, it will specify the acceptation or rejection. Module Description: Description: This project contains five modules. They are Graphical User Interface Data Embed and Retrieve Compression and Decompression CRC generation. CRC Verification Software Software Requirements: Operating System Software : window 2000 or XP : jdk 1.4 or above
Hardware:
Processor Memory
SNOWBOARDS
Objective: Now a days company lunching there products and there are giving information is not sufficient to the costumer. Costumer facing the problems and company cant able to give aver problems solution to ever bid. By forums they well get solution. Member can interact with each other by sending massages. Member can post news. Unlimited members, categories, forums, posts etc. Powerful and extensive authorization system, strong encryption to keep user information safe and designed with security as a priority. Support thousands of online with database pool. Controlled forum interface with CSS styling template easy and quick. Description: A cost-effective, user-friendly, easy to use, efficient, stable, secure and flexible JSP FORUM application solution. Key Features: 1. Unlimited members Personal profile creation Post counting and administrator-definable ranks for users Email-like private messaging system 2. Unlimited Forums & Categories Unlimited forums can be organized into as many categories as you like Private forums and those only for specified user groups Powerful search facility 3. Security Designed with security as a priority Powerful and extensive authorization system Strong encryption to keep passwords safe in the database 4. Posting Messages Message formatting with various font styles and sizes as well as allowing quoting, code display, image posting. Support of standard and extended Code tags and controlled HTML tags Polls can be simply added to posts Topic editing
5. Easy to Use Administration Centre General configuration Forum & category setup Easy database backup and restore User authorization IP tracking of posts and posters Control forum access to specified user groups Mass delete/move/lock/unlock/stick/recommend of posts Complete control of fonts and colors with cascading style sheets (CSS) Hardware Requirements: Processor Processor Speed RAM Hard Disk Software Requirements: Language Web Components Control Components Scripting Language Web Server Database (Back End) : : : : : : Java Html, Jsp Servlets JavaScript Tomcat Mysql : : : : Intel P-III based system 250 MHz to 833MHz 64MB to 256MB 2GB to 30GB
T TA AN NR RO OX XW WO OR RK KF FO OR RC CE E
Objectives: Tanrox work force is time collection software that is streamlined for billing and invoicing purposes. Tanrox work force allows time tracking for customer and project related tasks. After being collected the data can then be exported for invoice generation. Description: This guide describes how to execute these activities using Tanrox work force interfaces. In addition, section Getting started describes initial data setup up to the point when you are ready to start registering working time with Tanrox work force. Section contents:
Overview Submit time-track for the current week Submit and modify time-track for the selected date/week View time-track for a selected month Delete reported time-track Remove tasks from the Submit Time-Track interface
Overview Registration of time expenses consists of the following activities related to registering and managing your personal time expenses:
Submitting time-track Viewing personal time-track Modifying personal time-track Deleting personal time-track
Time-track is Tanrox work force's term used to refer to working time submitted and stored in the system. To access the interfaces for submission of time-track use the top-level menu option 'Submit Time-track'. To access the interfaces for browsing the submitted time-track use the top-level menu option 'My Timetrack'. Users shall have the 'Submit Time-Track' access right to access interfaces for submission and browsing of time-track. Note that the users who do not have this right as well as user 'root' will not see these interfaces at all.
The interfaces for submission and management of personal time-track always show and store time tracked by the user who is currently logged in. To browse the time-track submitted by other users use the Staff output report (see section Generate staff output report). To access the interfaces for Tasks, Projects, and Customers Management use top-level menu option 'Projects & Tasks'. Each of the access rights regulates user access to the corresponding subset of system interfaces. System users may have any combination of these access rights. For example:
A user who has only 'Manage Tasks' access right will be able to create new tasks to track time expenses for, but will not be allowed to create new projects and customers.
A user who has only 'Manage Customers' access right will be able to create and modify customers but will not be able to create projects and tasks.
Grant these access rights to users according their responsibilities in everyday work. If you do not need to introduce subordination between users and responsibilities, just grant all three access rights to those users who are responsible for project/task management in your organization. For example, you can grant them to project managers. Note that users who do not have some access right will not see the interfaces associated with this right at all. See section User management about information on how to grant access rights to system users. Hardware Requirements: Processor Processor Speed RAM Hard Disk Software Requirements: Language Web Components Control Components Framework Scripting Language Web Server Database (Back End) : : : : : : : Java Html, Jsp Servlets Struts JavaScript Tomcat Oracle8i : : : : Intel P-III based system 250 MHz to 833MHz 64MB to 256MB 2GB to 30GB
M-banking
Objective: The improvement in technologies, lot of traditional works are been done using internet. The systems like reservations, banking and other things wear done using internet. The main advantage of this was person need not be present at the place and was done quickly which saved the time. The main draw back of this was, it compulsorily required the costly pc. Now the things had changed, the scenario is changing i.e. using of simple and cheaper hardware such as mobiles and handheld devices. Which provides much better mobility than PCs. Technology is moving towards mobiles which has wide spread usage and acceptability. Lot of protocols and softwares are been developed to server the concept. Here we just are trying to be with the scenario. We are connecting the mobile to bank database using wml scripts and java technology. Software Requirements: Platform Languages Database Software Windows (NT/XP) JSP,XML, wml, usebean, servlet &java script My SQL 4.0 web logic server 7.0 Nokia tool kit J2SDK 1.4
Hardware Specification:
: : : :
Intel P-III based system 250 MHz to 833MHz 64MB to 256MB 2GB to 30GB
Description: In todays age of new opportunism and emerging technologies, there is a new communications infrastructure on offer to transform the way business is done. This opportunity is mobile commerce, and it will drive new levels of intense competition in the finance industry. Mobile commerce achieves this by removing the traditional restrictions of geographical location and high entry costs. This time the assult on the finance industry will be led by a new weapon, the mobile phone. We are providing a wise range of mobile banking for individual clients, including balance checking, amount transfer, stop payment, request check book, mini statement, etc. 1. Check Balance: users may check the balance of account and the latest transactions. 2. Transfer Funds: User may transfer the amount to the required customer of his choice. 3. Stop Payment: user is allowed to stop payment of cheques based on his request. 4. Request Cheque Book: user may request the cheque books according to his requirements (10 leaves, 50 leaves, 100 leaves). 5. Mini statement: user is also allowed to view the transactions made. 6. Configuration: User configures the functions concerning account payment and code. Etc. One report also suggested that this trend might grow as the number of mobile device users continues to grow, and also those users show more wiling to consider using new applications such as mobile cash and payments.
Mobile Gadgeteer
Objectives: This application is designed to provide the user Access a PC from his mobile device. This project is to enable the mobile users to control his PC information at their finger tips. The application must consider the limitations of mobile devices. This project involves flow of data on the Wireless Application Protocol. The application must work properly without problems on all targeted devices, power supply and network support. Environment: J2ME 2.0 TOOL KIT J2SDK 1.4.1 MIDP 2.0 XML Java / Java servlets / Java Server Pages Windows NT/200X
Scope & Limitations: The proposed software targets resource constrained and more specifically wireless computing devices. Deployment requires formatting the display in a generic way so that it works for all different types of devices. Special attention is needed regarding complexities of network limitations. Introduction: The Mobile Information Device Profile (MIDP) is the first and most mature J2ME profile. MIDP is based on the CLDC and is currently supported by major device manufacturers such as Motorola, Nokia, Ericsson, and RIM, and by carriers like SprintPCS, Nextel, and NTT DoCoMo. Many independent software vendors also support MIDP. Table summarizes the target devices for MIDP 2.0.
Table Device Requirements for Mobile Information Device Profile 2.0 Requirement Description Display Input Screen- size: 96x54,. Display depth: 1- bit. Pixel shape (aspect ratio): approximately 1:1. One or more of the following user-input mechanisms: one-handed keyboard, two-handed keyboard, or touch screen. Memory 256 kilobytes of non-volatile memory for the MIDP implementation, beyond whats required for CLDC. 8 kilobytes of non-volatile memory for application-created persistent data. 128 kilobytes of volatile memory for the Java runtime. Networking Two-way, wireless, possibly intermittent, with limited bandwidth. Power Limited power, typically battery-operated.
MIDP, led by Motorola, was initially defined by JSR 37, which produced the MIDP 1.0 specification, and then by JSR 118, which defined the MIDP 2.0 specification. MIDP2.0 enhanced version 1.0 quite a bit. Even though the MIDP specification indicates the use of CLDC 1.0, nothing would preclude MIDP 2.0 (or 1.0) using CLDC 1.1 as its base. In addition to the MIDP 1.0 APIs for networking, user interfaces, local persistence, and MIDlet life-cycle, MIDP 2.0 adds APIs for networking, including socket (TCP) streams, UDP datagrams, serial, push-initiated, and secure connections, as well as a robust security API and policy, and APIs for sound and even gaming. MIDP 2.0 also formally includes in the profile specification an update of the MIDP 1.0 Over the Air (OTA) User Initiated Provisioning recommendation (originally defined as an addendum to the MIDP 1.0 specification), which describes how applications are to be discovered and downloaded over wireless networks. Table summarizes the packages available in MIDP 1.0 and MIDP 2.0.
Scope & Limitations: 1. The proposed software targets resource constrained and more specifically wireless computing devices. 2. Deployment requires formatting the display in an generic way so that it work for all different types of devices. 3. Special attention is needed regarding complexities of network limitations.
Mobile Invoice
Objective: This project deals with paying the bill through the mobile. It provides the features of paying the bill for Telephone, EB bill, Water bill through the mobile this project uses J2ME and J2EE technology. An added benefit is time consumption. Description: Java Platform, Micro Edition (Java ME) is the most ubiquitous application platform for mobile devices across the globe. It provides a robust, flexible environment for applications running on a broad range of other embedded devices, such as mobile phones, PDAs , TV set-top boxes, and printers. The Java ME platform is deployed on millions of devices, supported by leading tool vendors, and used by companies worldwide. In short, it is the platform of choice for today's consumer and embedded devices. Modules: Authentication Module Communication Module Service Module Billing Module Checking Module Language Used: Java,J2ee,J2me Scope & Limitations: The proposed software targets resource constrained and more specifically wireless computing devices. Deployment requires formatting the display in a generic way so that it works for all different types of devices. Special attention is needed regarding complexities of network limitations
The WAVE DM is an interface between the wireless CDMA mobile and the PC. The WAVE DM is used to extract the information from the mobile by using the USB cable. By using this interface the use will get all the information regarding CDMA mobile to his PC. The user can get the information about the mobile settings and service information and network information. By using this application we can make a call from the system and we can send messages and even fax.
Description:
The use of fax service in a wireless CDMA network comprises of two different types. Digital PC Fax and Analog Fax. Both categories of services employ digital fax technology for encoding/decoding the fax image, known as Group 3 Fax. The International Telecommunications Union (ITU) standard T4 specifies the Group 3 digital image encoding. Group1 and Group2 Fax services employ analog image encoding and are rarely used in; modern fax equipment. For Digital PC Fax, a Data Terminal Equipment (DTE), normally a laptop or PC running fax application software, is connected via an USB to a CDMA mobile. The DTEs Fax software is responsible for the encoding/decoding the fax images using the T.4 standard. The Data Circuit Terminating Equipment (DCE), which comprises the CDMA mobile and the IWF fax modem, is responsible for the digital-to-analog modem interface to the PSTN and fax protocol communication and negotiation with the remote fax machine using the ITU T.30 standard. A fax modem with such responsibilities in a DTE DCE fax setup is known as a Class 2.0 fax modem. In a Class 1 fax modem, the modem has minimal responsibilities except for Vseries modem functions. For this application development we are using Java Swings and USB Based communication to the mobile.
Hardware Requirements: Processor Processor Speed RAM Hard Disk CDMA Mobile USB CABLE Software Requirements: Language : Java Swings Compatible CDMA Mobile Driver Software Comm. jar and win32com.dll : : : : : : Intel P-III based system 250 MHz to 833MHz 64MB to 256MB 2GB to 30GB Any CDMA Mobile CDMA Mobile Supported USB Cable
Future Enhancements: 1. Location Map generation. 2. Signal Graph, PN Graph, and Finger Graph generation. 3. Mobile Call processing.
Description: The capacity of a CDMA forward link sector can be doubled if all the handsets in that sector use dual antenna receivers. Capacity increase comes about because the average signal sensitivity of the phone receiver is effectively doubled through adaptively combining the two antenna-receiver chains. With twice the sensitivity, average base station transmit power per phone can be cut in half. Thus twice as many forward link calls can be served. The forward link capacity is increased incrementally in proportion to the penetration of dual antenna phones into the system. These phones could be pushed only into areas where forward link capacity is tight, allowing the deferral of expensive system wide upgrades. These phones could be selectively subsidized to customers who are identified as high volume users in crowded sectors in the network. The capacity increase can be used in three ways. First, where capacity is limited by the forward link, dual antenna phones will raise total network capacity. Second, dual antenna phones free up capacity for new forward link intensive data services. Finally, the forward link capacity increase can be matched by a reverse link capacity increase. The primary mechanisms by which the sensitivity is improved are Aperture Gain, Interference Rejection, and Diversity Gain. Aperture Gain results from the fact that two antennas absorb more signal power than one. Interference Rejection results from combining the antennas with weights chosen so that interfering signals picked up on both antennas tend to cancel each other. Diversity Gain arises from the fact that when one antenna is in a fade, the other is probably not. Qualcomm may soon have available MSM chips in which two antennas can be combined using the Maximal Ratio Combining (MRC) algorithm in a 4-finger RAKE receiver. This configuration should produce forward link capacity increases of about 50% over a single antenna handset. Future Mobile Station Modem (MSM) chips for dual antenna receivers should 1) implement an Optimum Combining (OC) algorithm and 2) Provide a 6-finger RAKE receiver. This configuration will increase forward link system capacity by more than 100%. Dual Antennas handsets have a primary antenna that is used for both transmit and receive. A secondary antenna, used for receive only, occupies much less volume than the primary antenna. The secondary antennas small volume allows it to be put inside the plastics of even very small phones. The secondary antenna will typically have a lower Mean Effective Gain (MEG) than the primary antenna, because the internal antenna suffers more blockages by the head and the hand of the user. The lower MEG of the secondary antenna does not have a serious impact on capacity increase from antenna combining.
Fading correlation between the two antennas does not degrade the performance of any of the handsets we have tested. The highest correlations we have measured for all handsets considered is about 40%, even when we put the two antennas as close together as we could physically manage. This is well bellow the 70% correlation required to degrade performance. We report on the design, realization, lab testing, field testing, analysis and performance of two antenna receiver handsets in CDMA system. These handsets can receive more that twice the data rate as single-antenna handsets for a given load on the CDMA system. Alternatively, more than twice the number of voice channels can be supported if two-antenna phones replace all single-antenna phones. This excess capacity can be used in conjunction with 4-antenna-receivers at the base-station to nearly double the capacity of CDMA systems. Alternatively, the extra capacity can be used to provide data services without reducing voice capacity of the system. We present two different two antenna handsets, one for Cellular (~800 MHz) and the other for PCS (~1900 MHz). We present antenna range tests as well as field tests from which capacity increases are derived. We present performance improvement for various receiver
architectures, considering the combining of from 4 to 8 fingers in a RAKE receiver, and considering 4 different combining algorithms. We discuss the effect of differences in the Mean Effective Gain (MEG) of the handset antennas. The field tests have been done using two commercial CDMA networks in San Diego as signal sources, one for Cellular frequencies and the other for PCS frequencies. By using our WAVE DM application we are going to generate Finger Graph which will extract near by 6 BTS signal strengths. For this application development we are using Java Swings and USB Based communication to the mobile. Hardware Requirements: Processor Processor Speed RAM Hard Disk GPRS Mobile USB CABLE Software Requirements: Language
: : : : : :
Intel P-III based system 250 MHz to 833MHz 64MB to 256MB 2GB to 30GB Any GPRS Mobile GPRS Mobile Supported USB Cable
Java Swings Compatible GPRS Mobile Driver Software Comm. jar and win32com.dll
Mobile USB Driver Software: Additional Plug in Future Enhancements: 1. Location Map generation. 2. Mobile Call processing. :
Environment: Sun Java 1.4.2 J2ME 2.0 J2METK SIP API SIP TK WEB Server Windows 98 and above.
Scope & Limitations: The proposed software targets resource constrained and more specifically wireless computing devices. Deployment requires formatting the display in a generic way so that it works for all different types of devices.
Special attention is needed regarding complexities of network limitations. Introduction: The Session Initiation Protocol (SIP) is an application-layer control protocol for creating, modifying and terminating sessions with one or more participants. These sessions include Internet multimedia conferences, Internet telephone calls and multimedia distribution. Members in a session can communicate via multicast or via a mesh of unicast relations, o r a combination of these. SIP invitations used top create sessions carry session descriptions which allow participants to agree on a set of compatible media types. SIP supports user mobility by proxying and redirecting requests to the users current location. Users can register their current location. SIP is not tied to any particular conference control protocol. SIP is designed to be independent of the lower-layer transport protocol and can be extended with additional capabilities. [RFC 2543]
Session Initiation Protocol (SIP) is an application-layer control protocol that can establish, modify and terminate multimedia sessions or calls. Java 2 Platform Micro Edition (J2ME) supports layered software for the development of applications, targeted to run on small devices such as mobile phones, pagers etc. The J2ME Wireless toolkit provides development environment for the same specifically targeting MIDP devices. Objective and Scope The application called JMSIP Java Micro Edition SIP Stack for the J2ME phone completely compliant with the RFC 2543. The Project claims to be one of the very few of its kind which is fully functional. Its development tool makes it backward compatible with J2SE and is platform independent. The SIP stack can be used to building applications such as: SIP user agents SIP proxies SIP redirect servers
The User Agent can be used to make Basic SIP call between two User Agents Conferencing Call return Call transfer
Continuous Delivery Message Dissemination Problems under the Multicasting Communication Mode
Abstract: Parallel and distributed systems were introduced to accelerate the execution of programs by a factor proportional to the number of processing elements. To accomplish this goal, a program must be partitioned into tasks, and the communications that must take place between these tasks must be identified to ensure correct execution of the program. To achieve high performance, one must assign each task to a processing unit (statically or dynamically) and develop communication programs to efficiently perform all the intertask communications. Efficiency depends on the algorithms used to route messages to their destinations, which is a function of the underlying communication network, its primitive operations, and the communication model. In general terms, a message dissemination problem consists of a network with a communication model, a set of communication primitives, and a set of messages that need to be exchanged. A message dissemination problem consists of a network with a communication model, a set of communication primitives, and a set of messages that need to be exchanged. The objective is to find a schedule to transmit all the messages in the least total number of communication rounds. Proposed System We consider the CDMD problem. We present an efficient approximation algorithm to construct a message-routing schedule with a total communication time of at most 3:5d, where d is the total length of the messages that each processor may send. The algorithm takes time, where n is the number of processors and q is the total number of messages that the processors receive. The communication network is the n-processor complete static (all links are present and are bidirectional) network N. The communication model is the single-port model where every processor sends at most one message and receives at most one message during each communication round. The communication primitive is called multicasting, which means that the message a processor sends at time t may be concurrently sent to a set of processors. All the messages take one communication round to reach their destination, regardless of the source or destination processor. SYSTEM REQUIREMENTS Hardware Requirements Processor Hard Disk Ram Monitor Mouse : : : : : Pentium III / IV 40 GB 256 MB 15VGA Color Ball / Optical
Keyboard
102 Keys
Software Requirements Operating System Front End Language Back End : : : : Windows XP professional Microsoft Visual Studio .Net 2005 Visual C#.Net SQL Server 2000
Proposed system The proposed method, based on elementary linear algebra, is asymmetric, involving a private key for embedding and a public key for detection. Its robustness against standard image degradation operations has been extensively tested and its security under projection attack has also been proven even though the envisaged applications refer to a collaborative environment, in which malicious attacks are not a critical aspect. Existing System The existing method, only done by a single water marking. That will not give that much security to image. Although some researchers focused on the viability of existing watermarking approaches for the insertion of multiple signatures, the development of specific techniques can provide much more effective results. The general problem of multiple digital watermarking has been the object of several investigations since the pioneering contribution. It is suggested that the insertion of multiple watermarks can be exploited to convey multiple sets of information. More recently, a multiple watermark-embedding procedure was proposed, which allows simultaneous insertions without requiring the key sets to be orthogonal to each other. Specific applications such as the already mentioned medical image management may even require the insertion of two different types of watermark, namely, a robust one for authentication purposes, and a fragile one for data integrity control. This paradigm is often referred to as multipurpose watermarking.
Hardware Requirements SYSTEM : Pentium IV 2.4 GHz HARD DISK : 40 GB FLOPPY DRIVE MONITOR MOUSE RAM : 1.44 MB : 15 VGA colour : Logitech. : 256 MB
Software Requirements Operating system Front End Coding Language :- Windows XP Professional :- Microsoft Visual Studio .Net 2003 :- Visual C# .Net
The advantages over the existing system are, we use an identity tree instead of key tree in our scheme. Each node in the identity tree is associated with an identity. The leaf nodes identity is corresponding to the users identity and the intermediate nodes identity is generated by its childrens identity. Hence, in an identity tree, an intermediate node represents a set users in the sub tree rooted at this node. In our scheme, even though a subgroup controller fails, it does not affect its subgroup. Because every user in the subgroup can act as the subgroup group controller. The keys used in each subgroup can be generated by a group of key generation centers (KGCs) in parallel. All the members in the same subgroup can compute the same subgroup key though the keys for them are generated by different KGCs. This is a desirable feature especially for the large-scale network systems, because it minimizes the the problem of concentrating the workload on a single entity. System Requirement Specification 1. User Interface Java Swing Swing is a set of classes that provides more powerful and flexible components that are possible with AWT. In addition to the familiar components, such as button checkboxes and labels, swing supplies several exciting additions, including tabbed panes, scroll panes, trees and tables. Applet - Applet is a dynamic and interactive program that can run inside a web page displayed by a java capable browser such as hot java. Hardware Interface Hard disk RAM : 40 GB : 512 MB
Processor Speed : 3.00GHz Processor Software Interface JDK 1.5 Java Swing SQL Server Conclusion : The Proposed system is an efficient, authenticated, scalable key agreement for large and dynamic multicast systems, which is based on the bilinear map. Compared with the Existing system, we use an identity tree to achieve the authentication of the group member. Further, it solve the scalability problem in multicast communications. Since a large group is divided into many small groups. Each subgroup is treated almost like a separate multicast group with its own subgroup key. All the keys used in each subgroup can be generated by a group of KGCs in parallel. The intuitively surprising aspect of this scheme is that, even the : Pentium IV Processor
subgroup controller aborts, it does not affect the users in this subgroup. Because every user in the subgroup can act as a subgroup controller. This is a significant feature especially for the mobile and ad hoc networks. From the security analysis we can see that our scheme satisfies both forward and backward secrecy.
Enhancing Search Performance in Unstructured P2P Networks Based on Users Common Interest
Abstract: Peer-to-peer (P2P) networks establish loosely coupled application-level overlays on top of the Internet to facilitate efficient sharing of resources. They can be roughly classified as either structured or unstructured networks. Without stringent constraints over the network topology, unstructured P2P networks can be constructed very efficiently and are therefore considered suitable to the Internet environment. However, the random search strategies adopted by these networks usually perform poorly with a large network Size. In this paper, we seek to enhance the search performance in unstructured P2P networks through exploiting users common interest patterns captured within a probability-theoretic framework termed the user interest model (UIM). A search protocol and a routing table updating protocol are further proposed in order to expedite the search process through self organizing the P2P network into a small world. Both theoretical and experimental analyses are conducted and demonstrated the effectiveness and efficiency of our approach.
Existing System: Peers in unstructured P2P networks to choose their neighbors and locally shared files, using Flooding techniques. In purely unstructured P2P networks such as blind search through flooding mechanisms is usually explored for resource discovery. To find a file, a peer sends out a query to its neighbors on the overlay, until the query has traveled a certain radius. Despite its simplicity and robustness, flooding techniques, in general, do not scale. In large networks, the probability of a successful search may decrease dramatically without significantly enlarging the flooding radius.
Disadvantages: Blind Search. Future reference is not present in routing table. Delay due to absence of Routing Updating table.
Proposed System: In order to improve search performance, guided search. The key problem is what information is actually eligible to guide the search. Used interest-based locality as the general search guidance. The basic assumption is that if a peer p0 has a particular file required by another peer p, and then p0 is likely to have other files to be requested by p in the future. According to previous successful queries, shortcuts from peer p to several peers p0 are established in order to expedite subsequent search processes.
Advantages:
Guided Search. Routing updating table. Fast Search Technique based on UIM.
Java1.3 or More Java Swing front end SQL-back end Windows 98 or more.
HARDWARE REQUIREMENTS:-
: : :
40 GB 128mb Pentium
System Requirements Software Specification Operating System : Windows Front End Middle Ware Back End Hardware Specification: Processor Clock Speed RAM Monitor Keyboard Floppy Drive Compact Disk Drive Hard Disk Mouse : Intel Pentium IV : 700 MHZ : 128 MB : 14 SVGA Digital Color Monitor : 107 Keys Keyboard : 1.44MB : 700MB : 20GB : Logitech Mouse : HTML : Java Servlets, Jsp, Struts : SQL Server
Existing System : When data mining techniques are applied to customer relationship management it resulted in finding out customer models and behaviors as graphical representations
Problem Findings Using graphical representations the exact optimal knowledge could not be found
PROPOSED SYSTEM: Enhanced Decision Tree Algorithm implementation provides the easy way to find out exact optimal actions that can change the customer from undesired status to desired status while maximizing the net profit.
Modules: Main modules: 1. Customer 2. Supporting Team 3. Admin Sub Modules: 1.Customer: a. Customer Registration b. Customer Login c. View products d. Purchasing products e. Apply feedback 2. Supporting Team a. View Customer Details b.View Feedback Information c.Build Customer Profile d.Profit Calculation e.Listing Action Sets 3. Admin a.View Customer Feedback b.View Support team Suggestions c.View Action Set d.Selecting Action Set e.Apply Actions Data Flow Diagram
CUSTOMER INFORMATION
CUSTOMERS
SUPPORTING TEAM
Customer Input
SELECT BEST ACTIONS ACTION SET
Loyal Probability of Customer Decision Tree Implementation Post Processing Steps Exact Actions
Conclusion
Most data mining algorithms and tools produce only the segments and ranked lists of customers or products in the outputs. In this project, we present a novel technique to take these results as input and produce a set of actions that can be applied to transform customers from undesirable classes to desirable ones.
We use as input a small collection of high resolution stills that (under-)samples the dynamic scene. This collection has both the benefit of the high resolution and some indication of the dynamic nature of the scene (assuming that the scene has some degree of regularity in motion). We are also motivated by a need for a more practical solution that allows the user to easily generate the animated scene.
In this paper, we describe a scene animation system that can easily generate a video or video texture from a small collection of stills (typically, 10 to 20 stills are captured within 1 to 2 minutes, depending on the complexity of the scene motion). Our system first builds a graph that links similar images. It then recovers partial temporal orders among the input images and uses a second-order Markov Chain model to generate an image sequence of the video or video texture (Fig. 1). Our system is designed to allow the user to easily fine-tune the animation. For example, the user has the option to manually specify regions where animation occurs independently (which we term independent animated regions (IAR)) so that different time instances of each IAR can be used independently. An IAR with large motion variation can further be automatically decomposed into semi-independent animated regions (SIARs) in order to make the motion appear more natural. The user also has the option to modify the dynamics (e.g., speed up or slow down the motion, or choose different motion parameters) through a simple interface. Finally, all regions are frame interpolated and feathered at their boundaries to produce the final animation.
The user needs only a few minutes of interaction to finish the whole process. In our work, we limit our scope to quasi-periodic motion, i.e., dynamic textures. There are two key features of our system. One is the automatic partial temporal order recovery. This recovery algorithm is critical because the original capture order typically does not reflect the true dynamics due to temporal undersampling. As a result, the input images would typically have to be sorted. The recovery algorithm automatically suggests orders for subsets of stills. These recovered partial orders provide reference dynamics to the animation. The other feature is its ability to automatically decompose an IAR into SIARs when the user requests and treat the interdependence among the SIARs. IAR decomposition can greatly reduce the dependence among the temporal orderings of local samples if the IAR has significant motion variation that results in unsatisfactory animation. Our system then finds the optimal processing order among the SIARs and imposes soft constraints to maintain motion smoothness among the SIARs.
Fig. 1. Outline of our system. All these steps are automatic; user specified operations (A), (B), and (C) may be added to improve the visual quality of the video.
Technologies Used : Operating system Front End Coding Language :- Windows XP Professional :- Microsoft Visual Studio .NET 2003 :- Visual C# .NET with GDI+ Components.
: : : : : :
Software Requirements Operating System Front End Language Back End : : : : Windows XP professional Microsoft Visual Studio .Net 2005 Visual C#.Net SQL Server 2000
EXISTING SYSTEM: The existing RF techniques deal with a single query in a single retrieval session only. There are no virtual features for session modification and maintenance They are using short term cross session Relevant information is collected online via the users feedback, and this information is very limited The system cannot output the retrieval results to a given query based on a sufficiently large set of training data The system has no knowledge about which database images are relevant and which are no relevant to a set of known labels, since we do not know the users intention until the user starts the feedback iteration.
PROPOSED SYSTEM: CBIR(Content Based Image retrieval) System modern image databases are queried by image content. Relevance feedback is an interactive process, which fulfills the requirements of the query formulation. The user initializes a query session by submitting an image.
The system then compares the query image to each image in the database and returns the r images that are the nearest neighbors to the query. If the user is not satisfied with the retrieved result, the user can activate an RF process by identifying which retrieved images are relevant and which are non relevant. Based on the retrieved result users can give notification to the system which is relevant and which is non relevant this will store in virtual feature Virtual feature can adapt that reference with that image category for future effective retrievals
SYSTEM REQUIREMENTS Hardware Requirements Processor Hard Disk Ram Monitor Mouse Keyboard : : : : : : Pentium III / IV 40 GB 256 MB 15VGA Color Ball / Optical 102 Keys
Software Requirements Operating System Front End Language Back End : : : : Windows XP professional Microsoft Visual Studio .Net 2005 Visual C#.Net SQL Server 2000
HARD DISK : 40 GB FLOPPY DRIVE MONITOR MOUSE RAM : 1.44 MB : 15 VGA colour : Logitech. : 256 MB
Software Requirements Operating system Front End Coding Language :- Windows XP Professional :- Microsoft Visual Studio .Net 2003 :- Visual C# .Net
EXISTING SYSTEM PEER-TO-PEER systems have emerged as cost-effective alternatives for scalable data sharing, backup, and archival storage. Peers contribute data and storage and, in return, gain access to data at other peers. Effective storage management is an important issue in the deployment of such systems. Data replication and caching are key enabling techniques for scalability, performance, and availability. In the Existing System, an important problem relates to pruning unwanted copies of data efficiently and safely. Attempts at aggressive replication may lead to significant overheads associated with thrashing in resource constrained environments. Even if eplication at peers is controlled, as in systems such as Samsara, the network as a whole must provide mechanisms for eliminating replicas that are not accessed, while leaving a minimum number of replicas in the network to satisfy availability constraints.
More Duplicates Administrative Overhead Need More Amount of Memory space Transaction Time is high
PROPOSED SYSTEM
In the proposed system, we investigate the problem of eliminating duplicate data items in peer-topeer systems. We examine this issue in the context of unstructured networks, where no assumptions can be made about the relationship between an object and the peers at which it resides. Unstructured networks differ from their structured counterparts in several important respects. Structured networks provide a simple primitive for locating an object which relies on a distributed hash table (DHT) abstraction. The associated lookup techniques provide bounds on the number of hops as a function of the number of peers. These bounds are achieved by establishing and maintaining a well-defined overlay topology. In networks with a high transient population, the overhead associated with this may be significant. In contrast to structured peer-to-peer networks, unstructured networks are resilient to node failures and incur low overhead on node arrivals and departures. These characteristics make unstructured networks attractive for use in highly transient networks, where peers do not have significant resources. Unfortunately, the issue of object location, which is central to the problem of identifying redundant copies, is significantly more complex in this environment. The primary focus of this paper is on systems where peers are cooperative and non malicious. Peers divide their storage into two spaces: a private and a public space. The private space contains the peers data and is not subject to duplicate elimination. The public space holds data from other peers and is subject to duplicate elimination. We can view the public space as backup storage or a cache to facilitate availability and performance, respectively. Reduced Duplicates Solve Administrative Overhead Less Memory is Needed Easy Transaction
CONCLUSION This paper addresses the problem of duplicate elimination in storage systems in the context of unstructured peer-to-peer networks in which there is no a priori binding between an object and its location. We abstract the problem of retaining a copy of a data item to one of electing leaders in a distributed system. We show analytically, as well as using simulation and a prototype implementation in PlanetLab, that our protocols are scalable with respect to message complexity and to node resource utilization. The experimental results show that RE performs better than PQ when the number of duplicates in the network is high and the content is similar among the nodes. When the number of different objects in the network is high (nodes have unique objects), PQ performs better than RE. The reason for this behavior is that the first phase of RE is not able to prune the number of contenders and, therefore, becomes an extra overhead. To the best of our knowledge, our work is the first to address the duplicate elimination problem in unstructured networks.
System Requirements: SOFTWARE REQUIREMENTS:Java1.3 or More Java Swing front end Windows 98 or more. SQL Server Back End HARDWARE REQUIREMENTS:Hard disk RAM Processor
Existing System In the exiting system they were used so many types of algorithms to broadcast the packets to the destination.they are 1).Dynamic Neighbor-Designating broadcast algorithm(DNDBA) 2).Forwarding Node Set Selection Process(FNSSP) 3).Adhoc Broadcast algorithm(AHBP). 4).Partial dominant Pruning algotithm(PDP)
1).Dynamic Neighbor-Designating broadcast algorithm(DNDBA) In this algorithm we can send the packets to the destination through the neighboring node.but the 2hop neighbor coverage is higher.so the chances to miss the packet or to loss the packet is higher.so that the end-end delay time is more.this is the only drawback of this algorithm.but we can send the packet by designating the neighboring node as the forwarding node.it will forward the packets to the corresponding node to the destination.MPR-Multi Point Relay is used for selecting the neighboring node to forward the packet
Dominant pruning algorithm(DP) is used to select the forwarding node to relay the packets.in which the total number of forwarding node to broadcast the message is less than the above mentioned algorithm.Only drawback of this algorithm is that if the DP does not properly terminate .it will not cover the full network
Broadcast Relay Gateway(BRG) is used to select the number of forwarding nodes to relay the packets.this algorithm is also prominently suppressing the number of 2-hop neighbors to relay the packet.in which BRG acting intelligently if any of the node is not present in the covered node set,it will automatically select another node to relay the packet immediately without any delay.its performance is better than the previous one.
It is further reducing the coverage of 2-hop neighbors to be covered by 1-hop neighbor.in which a common neighbor is selected to relay the messages. But in all the exiting algorithm is till used is does not perform the reliable communication.it does not get any acknowledgement from the receiver node.in the above mentioned all the algorithm the forwarded node is only waiting for some amount of time I mean the node is waiting for the timers predefined time for acknowledge.unless otherwise it did not get any reply from the forwarding node it will resend the packets for the maximum number of retries.so that latency will be increased.so that the performance will automatically reduce.for that reason I go for DCB-Double Coverage Broadcast algorithm.
Proposed system: DCB-Double Covered Algorithm is used to select the minimum number of nodes to relay the maesages as well as the confirmation from the forwarding also.so that we cant wait unnecessarily for the timers predefined time to be expired.we will retransmit the packet immediately without any delay.as a result the performance as well as the delivery ratio also increased.number of forwarding node also reduced.so that we can achieve our ultimate aim.forwarding nodes send the ACK to the forwared node in the error free transmission environment and also the nonforwarding node also send the NACK to the forwarded node in case of any packet loss.in our proposed system also the packets are sent in 64-byte length in a constant packet rate.so the chances for transmission collision,transmission error is very less
System Requirements
Java Swing front end Windows 98 or more. Sql Server Back End