Vous êtes sur la page 1sur 3

Encryption - Decryption

Problem Definition
In the current trends of the world, the technologies have advanced so much that most of the
individuals prefer using the internet as the primary medium to transfer data from one end to
another across the world. However, one of the main problems with sending data over the
internet is the security threat it poses i.e. the personal or confidential data can be stolen or
hacked in many ways. Therefore it becomes very important to take data security into
consideration, as it is one of the most essential factors that need attention during the process
of data transferring.
.
Data security basically means protection of data from unauthorized users or hackers and
providing high security to prevent data modification. This area of data security has gained
more attention over the recent period of time due to the massive increase in data transfer rate
over the internet.
In order to improve the security features in data transfers over the internet, many techniques
have been developed like: Cryptography and Steganography. While Cryptography is a
method to conceal information by encrypting it to cipher texts and transmitting it to the
intended receiver using an unknown key, Steganography provides further security by hiding
the cipher text into a seemingly invisible image or other formats.
According to Johnson et al., (2001), Steganography is the art of hiding and transmitting data
through apparently innocuous carriers to conceal the existence of data. The level of visibility
is decreased using techniques in ,Image Modelling like LSB Manipulation. These techniques
are performed by steganographic algorithms and the act of detecting the information hidden
through these algorithms is called Steganalysis. Cryptography is the art of science used
to achieve security by encoding the data to transform them into non readable formats so that
unauthorized users cannot gain access to it.
The aim of the project is to encrypt the data i.e., hide the data over an image using
steganographic and cryptography algorithms.
Objective
The main objective of the proposed system is to come up with a secured, flexible, and stateof-the-art integrated software solution for providing secured and effective channel for sending
data.

To test the efficiency and accuracy of hiding the data through algorithms
To provide the Company details to the Institutes and Students.
To provide a suitable interface to interact.
To provide the service on time.
Send the results quicker as compared to manual notification.
Page
1

Ensure availability and reliability of the system.

Scope

Methodology

Providing intra-city and intercity services


After registration of a Company, it can create its own profile.
Students can see results of the placements
It will minimize manual data entry.

Data Collection

Primary Data
Interview Questions were used to collect the data. Questions would be asked to those
who have good knowledge.

Secondary Data
Following sites are used:
1)
2)
3)
4)
5)

http://www.google.com (last visited 16/1/2013)


http://www.sakshieducation.com (last visited 16/1/2013)
http://recruitmentandresultsandjobs.blogspot.in (last visited 16/1/2013)
http://www.myamcat.com (last visited 16/1/2013)
http://en.wikipedia.org (last visited 16/1/2013)

System Analysis, Design and Development


System Analysis is a term used to describe the process of calculating and analyzing facts in
respect of existing operation of the prevailing situations that an effective computerized
systemmay be designed and implemented if provided feasible. This is required in order to
understand the problem that has to be solved. The problem may be of any kind like
computerizing an existing system or developing an entirely new system or it can be a
combination of two.
ITERATIVE ENHANCEMENT MODEL

Page
2

Reasons for choosing the iterative model

They are effective in the situations where requirements are defined precisely.
They are effective in the situations where there is no confusion about the functionality
of the final product
After every cycle a feedback is provided to the other phases of the system
In iterative model we are building and improving the product step by step. Hence we
can track the defects at early stages. This avoids the downward flow of the defects.
In iterative model less time is spent on documenting and more time is given for
designing.

Hardware and Software Requirement

Hardware Interface

RAM-1GB
PROCESSOR- Pentium 4/ AMD Athlone XP
Hard disk-40 GB

Software Interface

Operating System Required : Windows XP, Windows Vista and Windows 7


Front End : Microsoft Visual Studio 2005 or higher
Back End : Microsoft Sql Server 2005 or higher

Page
3

Vous aimerez peut-être aussi