Personal Identity Card Automatic Reader

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

PROJECT REPORT ON

PERSONAL IDENTITY CARD AUTOMATIC READER

Submitted in partial fulfillment for the

Award of degree of

Master in Computer Science of

University of Kerala

SUBMITTED BY

SOUMYA P (14823021)

DEPARTMENT OF COMPUTER SCIENCE

COLLEGE OF APPLIED SCIENCE, DHANUVACHAPURAM

(Affiliated to University of Kerala)

Managed By IHRD

APRIL 2016
COLLEGE OF APPLIED SCIENCE, DHANUVACHAPURAM

(Affiliated to University of Kerala)

CERTIFICATE

This is certify that the project entitled “PERSONAL IDENTITY CARD

AUTOMATIC READER” is a bonafide report work done by SOUMYA P and

in partial fulfilment of the requirement for the award of the Master Degree in

Computer Science at University of Kerala.

Mrs. Helena Lauren L Mrs. Helena Lauren L

(Head of the Department) (Faculty Guide)

Mr. Unnikrishnan Nair . K ( Principal )

Evaluated for internal viva voce on date: ................................................

1)

2)
ACKNOWLEDGEMENT

If the word are considered as symbol of approval a token of


acknowledgement then lets words play the heralding role of expressing our
gratitude. Putting a page titled thus at the beginning of this has its share of
formality. But we thank those who were elemental in the success of our project.
We try to shake it off with our unalloyed gratitude. We sincerely salute and thank
the almighty for his shower of blessings which has enabled us to attain in this
endeavour.

We thank our project internal guide Mrs. Helena Lauren L HOD of


computer science for his invaluable guidance throughput the project work. Their
immense encouragement and firm advice has helped us o complete the project in
time.

Last but least we are extremely thankful to parents and friends for their
help, encouragement, and moral support during our course work. Words are not
enough to thank these people.
ABSTRACT

Personal Identity Card Automatic Reader is a software application to


automate the process for utilization of various schemes provided by government.
Personal Identity Card Automatic Reader Software takes care of the activities
related to the schemes provided by the government. The major responsibility is to
take care of the proper utilization of different schemes in a transparent way. This
system clearly keeps track of the status of user’s application by tracking the actual
activities that are under process within the Panchayat or at higher level at any point
of time, by the administrators.
Distributed Image Steganography (DIS) is a method of hiding secret
information in multiple carrier images, making it more difficult to trace than
conventional steganographic techniques, and requiring a collection of affected
images for the retrieval of the secret data. The concept of steganography is used in
the paper to store the details of the users securely. The user data is in encrypted
format. So the officer can view the details only after decrypting the data.
This system provides effective way to manage the important information in
a very secure manner by authenticating users at various levels. This system design
is modularized into various categories covering the internal official management
concepts associated with the information of the Panchayat and user applications
with different levels of abstraction. This system has very good GUI so that a
novice user did not feel any operational difficulties.
When the user applies for a scheme, his details will be stored in the
database and sent to the government authority for verification. These details are
sent to final approving authority and help him to approve or disapprove the person
for the scheme. The same details can be viewed by the user so that the user would
get a clear picture of what is happening from time to time.
Id card will be generated with a Photograph, Qrcode, barcode and thump
impression. Also users medical history is uploaded and is saved, user can stick his
qrcode in helmets, vechicle etc which help to retrieve his medical details during an
accident.
CONTENTS

1. INTRODUCTION 1

2. PROJECT DESCRIPTION 2

2.1 DATA ENCRYPTION 2

2.2 ADVANCED ENCRYPTION STANDARDS 2

2.3 DATA EMBEDDING 5

2.4 IMAGE ENCRYPTION 6

2.5 DATA EXTRACTION 6

3. LITERATURE REVIEW 8

4. SYSTEM SPECIFICATION 9

4.1 SOFTWARE SPECIFICATION 9

4.2 HARDWARE SPECIFICATION. 9

4.3 ABOUT DEVELOPING TOOLS 9

4.4. FRONT END J2EE

14

4.5. ECLIPSE IDE CLASSIC 15

4.6. APACHE TOMCAT 16

4.7 DREAMWEAVER 16

4.8. BACK END MYSQL SERVER 16

5. SYSTEM ANALYSIS 17

5.1. EXISTING SYSTEM 17

5.2. FEASIBILITY ANALYSIS 18

5.3. PROPOSED SYSTEM 21


6. SYSTEM DESIGN 23

6.1. INPUT DESIGN 24

6.2. OUTPUT DESIGN 25

6.3. DATAFLOW DIAGRAM 26

6.4. DATABASE DESIGN 32

6.5 USECASE DIAGRAM 40

6.6. STRUCTURED CHART 41

6.7. MENU TREE 42

6.8. ER DIAGRAM 43

7. SYSTEM TESTING 44

7.1. PURPOSE 46

7.2. TESTING OBJECTIVES 46

7.3. TESTING STRATERGIES 47

7.4. DIMENSIONS OF TESTING 48

8. SYSTEM IMPLEMENTATION 50

9. SOFTWARE MAINTANENCE 51

9.1. CORRECTIVE MAINTENANCE 51

9.2. ADAPTIVE MAINTENANCE 51

9.3. PERFECTIVE MAINTENANCE 52

10. CONCLUSION 53

11. FUTURE ENHANCEMENTS 54

12. APPENDIX 55
13. BIBLIOGRAPHY 144

You might also like