Professional Documents
Culture Documents
Report of Secure Data Transmission
Report of Secure Data Transmission
Report of Secure Data Transmission
ON
SECURE DATA TRANSMISSION
submitted to
SHARDA UNIVERSITY
by
Asjadullah Sarosh
Nitesh Kumar
Nishant Kumar
in partial fulfillment for the award of the degree of
BACHELOR OF TECHNOLOGY
IN
COMPUTER SCIENCE & ENGINEERING
<March,2014>
ACKNOWLEDGEMENT
It would be prudent to commence this report with a serious tribute to those who
played an indispensable role in the accomplishment of this work and obliged
whenever and wherever their guidance was required. It is great pleasure to have
the opportunity to extend our thanks to everybody who helped through the
successful completing of this report.
In the first place I would like to thank our teacher Dr. Manoj Veetil Sir for his help,
co-operation and guidance to me for this project. I deeply thank him for his gesture
without which the project would have been possible. He gave us the most needed
inspiration and motivation to help make this project a wonderful reality.
Last but not the least I am grateful to my family without whose active support and
encouragement this project would not have been completed.
.
Contents
S.No
1.
CONTENTS
Page No.
Introduction
Feasibility Study
3.
Development Environment
4.
System Design
5.
Implementation
12
6.
Methodology
22
7.
Conclution
26
8.
Bibliography
26
2.
1. Introduction
In computer science, Secure Transmission refers to the transfer of data such
as confidential or proprietary information over a secure channel. Many
secure transmission methods require a type of encryption.
Secure transmissions are put in place to prevent attacks such as ARP
spoofing and general data loss. Software and hardware implementations
which attempt to prevent the unauthorized transmission of information from
the computer systems to an organization on the outside.
1.1AES Algorithm
1.2 Steganography
Steganography is an art and science of hidding information within other
information. The word itself comes\ from Greek and means .hidden writting..
In
recent
years
cryptography
become
very
popular
science.
As
Steganography is
the practice of hiding private or sensitive information within something that
appears to be nothing out of the usual. Steganography is often confused with
cryptology because the two are similar in the way that they both are used to
protect important information. The difference between the two is that
Steganography involves hiding information so it appears that no information
is hidden at all. If a person or persons views the object that the information is
hidden inside of he or she will have no idea that there is any hidden
information, therefore the person will not attempt to decrypt the information.
Steganography comes from the Greek words Stegans (Covered) and
Graptos (Writing). Steganography in the modern day sense of the word
usually refers to information or a file that has been concealed inside a digital
Picture, Video or Audio file. What Steganography essentially does is exploit
human perception, human senses are not trained to look for files that have
information hidden inside of them, although there are programs available
that can do what is called Steganalysis (Detecting use of Steganography.)
The most common use of Steganography is to hide a file inside another file.
When information or a file is hidden inside a carrier file, the data is usually
encrypted with a password.[12]
Data which hold effective information often has some redundancy. End users
usually tend to think that redundancy is evil which cost extra money, as
more disk space or network bandwidth is needed. Well, they are partially
right, but optimal compression hardly ever exists. Moreover common
compress ratio is mostly question of efficience.
Now we know, there are almost always few bytes, one can play with, without
destroying carried information. Least Signi_cant Byte (LSB) substitution is
well known and widely used method. Take for example a True-Color BMP
image _le format. A color of pixel is coded in 3 byte array of indices to RGB
palete. If you change only LSB bit in each color element, then the picture will
seem still the same, but is not. It carries hidden information. A picture with
size 120x100 pixels can hold approximately up to 4500B of hidden data, if
this method is used.
When files are created there are usually some bytes in the file that aren't
really needed, or at least aren't that important. These areas of the file can be
replaced with the information that is to be hidden, with out significantly
altering the file or damaging it. This allows a person to hide information in
the file and make sure that no human could detect the change in the file. The
LSB method works best in Picture files that have a high resolution and use
many different colors, and with Audio files that have many different sounds
and that are of a high bit rate. The LSB method usually does not increase the
file size, but depending on the size of the information that is to be hidden
inside the file, the file can become noticeably distorted.
1.5 .1 Injection
Injection is quite a simple method which simply involves directly injecting the
secret information into the carrier file. The main problem with this method is
that it can significantly increase the size of the carrier file[15]
When information is hidden inside video the program or person hiding the
information will usually use the DCT (Discrete Cosine Transform) method.
DCT works by slightly changing the each of the images in the video, only so
much though so its isnt noticeable by the human eye. To be more precise
about how DCT works, DCT alters values of certain parts of the images, it
usually rounds them up.
For example if part of an image has a value of 6.667 it will round it up to 7.
Steganography in Videos is similar to that of Steganography in Images, apart
from information is hidden in each frame of video. When only a small amount
of information is hidden inside of video it generally isnt noticeable at all,
however the
1.7 ANALYSIS
1.7.1 Existing System
In the traditional architecture there existed only the server and the client. In
most cases the server was only a data base server that can only offer data.
Therefore majority of the business logic had to be placed on the clients
system. This makes maintenance expensive. This also means that every
client has to be trained as to how to use the application and even the
security in the communication is also the factor to be considered.
Since the actual processing of the data takes place on the remote client the
data has to be transported over the network, which requires a secured
format of the transfer method. Present day transactions are considered to be
"un-trusted" in terms of security, i.e. they are relatively easy to be hacked.
And also we have to consider the transfer the large amount of data through
the network will give errors while transferring. Nevertheless, sensitive data
transfer is to be carried out even if there is lack of an alternative. Network
security in the existing system is the motivation factor for a new system with
higher-level security standards for the information exchange.
file will do the operations like de embedding, and decryption in their level of
hierarchy.
2. Feasibility Study
When complex problem and opportunities are to be defined, it is generally desirable
to conduct a preliminary investigation called a feasibility study. A feasibility study is
conduct to obtain an overview of the problem and to roughly assess whether
feasible solution exists prior to committing substantial resources to a project. During
a feasibility study, the system analyst usually works with representatives from the
departments(s) expected to benefit from the solution.
Every project is feasible if given unlimited resource and infinite time. Unfortunately,
the development of computer based systems is more likely to be plagued by
scarcity of resources and difficult delivery of data it is both necessary and prudent
to evaluate the feasibility of a project at the earliest possible time. Precious time
and money can be saved and untold professional embarrassment can be averted if
an ill conceived system is recognized early in the definition phase. So a detailed
study is carried out to check the workability of the system.
Feasibility study is undertaken to evaluate its workability, impact on the
organization, ability to meet user needs, and effective se of resources. The main
objective of feasibility study is to test the technical, operational and economical
feasibility of developing the computer system. Thus, during feasibility analysis for
this project the following three primary areas of interest were considered very
carefully. The feasibility of a project can be ascertained in terms of technical factors,
economic factors, or both. A feasibility study is documented with a report showing
all the ramification of the project.
The primary objective of a feasibility study is to assess three types of feasibility.
The existing computer system has a good hardware configuration and good
software facilities in such a way that any alteration can be implemented with
slight modifications of the existing process. Hence this project is technically
feasible.
Economic feasibility
The proposed system can be easily developed using the resources available
in the organization and they do not invest in procurement of additional
hardware or software. The cost of developing the system, including all the
phases have been taken into account and it is strict minimum. Hence the
system is economically feasible.
Operational feasibility
The system has been developed after extensive discussion with the end user
and all the operational requirements has been taken into account during the
planning and implementation stages. Hence the system is operationally
feasible.
3. Development Environment
1) Hardware Configuration
Processor
Pentium 4 processor
Memory
1 GB RAM
Display
14 LCD
80 GB
2) Software Configuration
Operating System
Environment
Database
MySql
3.1.1)
Windows XP professional
NetBeans
NetBeans is the most comprehensive J2EE IDE() for the open Source
netbeans platform.It incorporates most innovative open standard
technologies to provide a development environment for J2EE WEB,XML,UML
& database & a wide array of application server connectors to streamline
development ,deployment, testing & portability.Its a cross-platform.
3.1.2) Java
Java is pure object oriented programming language, which has derived C
syntax and C++ object oriented programming features. Is compiled and
interpreted language and is platform independent and can do graphics,
networking, multithreading. It was initially called as OAK. Java was conceived
by James Gosling, Patrick Naughton, Chris Warth, Ed Frank, and Mike
Sheridan at Sun Microsystems, Inc. in 1991. Java can used to create two
types of programs: application and applets. Application is a program that
runs on your computer, under the operating system of that computer. That is
Simple
Secure
Portable
Object-oriented
Robust
Multithreading
Architecture-neutral
Interpreted
High Performance
Distributed
Dynamic
Java supports the different types of editors are EditPlus, Eclips, NetBean,
Notepad. EditPlus editor are different types of used in editor such as Text,
HTML, PHP, JAVA Script, JAVA, JSP, XML, VBSscript, C#, C/C++, Perl, .NET
Config, CSS. Etc. Most of the Eclipse SDK is "pure" JavaTM code and has no
direct
dependence
on
the
underlying
operating
system.
The
chief
dependence is therefore on the Java 2 Platform itself. The 3.1 release of the
Eclipse Project is written and compiled against version 1.4 of the Java 2
Platform APIs, and targeted to run on version 1.4 of the Java 2 Runtime
Environment, Standard Edition
Java technology are performed the different types of version are JDK1.2,
JDK1.3, JDK1.4, JDK1.5. etc.
[HAVING<CONDITION>]
insert
into
<table>
field1,
field2,
field3
values(values1,
values2,values3);
Identified by <password>
4 System Design
4.1 Data Flow Diagram
Register/Logi
n
Encription
Database
Server
Database
1.
Register/Forgot
Password
Register
User
SDT
Photogallery
2.
Transfer
SDT
Server
Encrypt and
3.
SDT
Photogallery
name
gender
id
User
registration
Reg_user
id
login
Encrypt/decript/embed/dem
uname
pwd
sender
Enter key file
Receiver
EmbedForm
jButton1 : JButton
jButton2 : Jbutton
jLabel1 : JLabel
jLabel2 : JLabel
public EmbedForm()
private void initComponents()
EncryptionForm
inputfile : File
outDirectory : File
jButton1 : JButton
jLabel1 : JLabel
Filedialog
name : String
public EncryptionForm()
private void initComponents()
package filedialog()
public String getfile()
MainForm
jMenu1 : JMenu
jMenubar1 : JMenuBar
jMenuitem1 : JMenuItem
TEA
name : String
Public void Encrypt()
Public void Decrypt()
DecryptionForm
inputfile : File
outDirectory : File
jButton1 : JButton
jLabel1 : JLabel
ServerThread
public DecryptionForm()
private void initComponents()
EmbProcess
embfilename : String
public class EmbPocess()
Public String emb()
Public String deemb()
DeembedForm
jButton1 : JButton
JButton2 : JButton
jLabel4 : JLabel
jLabel5 : JLabel
Public DeembedForm()
private void initComponents()
Client
socket : Socket
name : String
addr : String
public Client()
Server
dir1 = "" : String
dir2 = "" : String
serversocket : ServerSocket
public Server()
: Sender
:MainForm
:EncryptionF
orm
2: Select
Encrypt in
security
:TEA
:EmbedFor
m
:EmbProces
s
6: Browse
Encrypted
Data file and
Video file
7: Create Embeded
video file
: Receiver
:MianForm
:De-embed
:EmbProces
s
:DecryptionF
orm
:TEA
3: Browse
De-embedding
video file
4: Seperate encrypted file
Collaboration Diagrams
1: opens the
main window
: Sender
:EmbedF
orm
7: Create Embeded video file
:De-emb
ed
:EmbPro
cess
Sender
Receiv er
Selects the
data file
Encrypt the
data file
De-embeds
the data file
Enter Key
file
Enter key
file
Decrypt the
data file
5. Implementation
Project Description
The project Secure Data Transmission is basically aimed to transfer a file in
local area network with security. In this project we use two layer security. i.e
cryptography and stenography for secure sensitive data.
MODULES:
1.
2.
3.
4.
5.
6.
7.
8.
Register
Login.
Forgot Password
Encryption
Decryption
Embed text file in video fils
Dembed text file from video files.
Transfer file one system to another system
Databases Involved
Databases used in this project are as follows :1. Registration
2. Login Details
6. Technical Specification
What is a Methodology?
Software engineering is carry out of using preferred procedure techniques to
progress the quality of a software development effort. A methodology is
defined as a collection of procedures, techniques, tools, and documentation
aids which will help developers in their efforts (both product and process
related
activities)
to
implement
new
system.
For
successful
several
methodologies
approach
implementation.
to
were
planning,
Methodologies offer
developed
analysis,
various
to
design,
tools and
encourage
the
testing
and
techniques
to
Methodology
provides
support
for
large
documentation.
Analysis and Design Support: A well defined structure of the
methodology helps for analysis and designing to development
process..
Implementation: The system should be implemented as per plan.
Testing Support: More testing, more reliable the product is.
Object Oriented Approach: Object oriented concepts will be used in
developing the project as it supports component reusability.
Suitable Methodologies:
Waterfall Methodology: All projects can be managed better when
segmented into a hierarchy of chunks such as phases, stages, activities,
tasks and steps. It follows a linear structure starting from requirement
analysis, through design, implementation and maintenance. Most widely
accepted methodology for student projects, this model has been well tried
and tested. Each phase of it has sub phases which produce deliverables.
Requirements are fixed at initial stages before proceeding with development
plans in system development projects; the simplest rendition of this is called
the "waterfall" methodology, as shown in the following figure:
7.
Conclusion
This Desktop Application provides facility to transfer sensitive file from one
user to another user through security system. This project work on client
server architecture that means if server is start then server receive client
file.
8.
BIBLOGRAPHY