Académique Documents
Professionnel Documents
Culture Documents
ON
SECURE DATA TRANSMISSION
Contents
1. Introduction 1
2. Feasibility Study 2
3. Development Environment 5
4. System Design 9
5. Implementation 12
6. Methodology 22
7. Conclution 26
8. Bibliography 26
1. Introduction
In computer science, Secure Transmission refers to the transfer of data such
as confidential or proprietary information over a secure channel. Many
secure transmission methods require a type of encryption.
1.1AES Algorithm
1.2 Steganography
Steganography is
the practice of hiding private or sensitive information within something that
appears to be nothing out of the usual. Steganography is often confused with
cryptology because the two are similar in the way that they both are used to
protect important information. The difference between the two is that
Steganography involves hiding information so it appears that no information
is hidden at all. If a person or persons views the object that the information is
hidden inside of he or she will have no idea that there is any hidden
information, therefore the person will not attempt to decrypt the information.
Data which hold effective information often has some redundancy. End users
usually tend to think that redundancy is evil which cost extra money, as
more disk space or network bandwidth is needed. Well, they are partially
right, but optimal compression hardly ever exists. Moreover common
compress ratio is mostly question of efficience.
Now we know, there are almost always few bytes, one can play with, without
destroying carried information. Least Signi_cant Byte (LSB) substitution is
well known and widely used method. Take for example a True-Color BMP
image _le format. A color of pixel is coded in 3 byte array of indices to RGB
palete. If you change only LSB bit in each color element, then the picture will
seem still the same, but is not. It carries hidden information. A picture with
size 120x100 pixels can hold approximately up to 4500B of hidden data, if
this method is used.
1.4 How Does It Work?
When files are created there are usually some bytes in the file that aren't
really needed, or at least aren't that important. These areas of the file can be
replaced with the information that is to be hidden, with out significantly
altering the file or damaging it. This allows a person to hide information in
the file and make sure that no human could detect the change in the file. The
LSB method works best in Picture files that have a high resolution and use
many different colors, and with Audio files that have many different sounds
and that are of a high bit rate. The LSB method usually does not increase the
file size, but depending on the size of the information that is to be hidden
inside the file, the file can become noticeably distorted.
1.5.1 Injection
Injection is quite a simple method which simply involves directly injecting the
secret information into the carrier file. The main problem with this method is
that it can significantly increase the size of the carrier file[15]
When information is hidden inside video the program or person hiding the
information will usually use the DCT (Discrete Cosine Transform) method.
DCT works by slightly changing the each of the images in the video, only so
much though so its isnt noticeable by the human eye. To be more precise
about how DCT works, DCT alters values of certain parts of the images, it
usually rounds them up.
In the traditional architecture there existed only the server and the client. In
most cases the server was only a data base server that can only offer data.
Therefore majority of the business logic had to be placed on the clients
system. This makes maintenance expensive. This also means that every
client has to be trained as to how to use the application and even the
security in the communication is also the factor to be considered.
Since the actual processing of the data takes place on the remote client the
data has to be transported over the network, which requires a secured
format of the transfer method. Present day transactions are considered to be
"un-trusted" in terms of security, i.e. they are relatively easy to be hacked.
And also we have to consider the transfer the large amount of data through
the network will give errors while transferring. Nevertheless, sensitive data
transfer is to be carried out even if there is lack of an alternative. Network
security in the existing system is the motivation factor for a new system with
higher-level security standards for the information exchange.
The proposed system should have the following features. The transactions
should take place in a secured format between various clients in the network.
It provides flexibility to the user to transfer the data through the network very
easily. It should also identify the user and provide the communication
according to the prescribed level of security with transfer of the file requested
and run the required process at the server if necessary. In this system the data
will be sending through the network as a video file. The user who received the
file will do the operations like de embedding, and decryption in their level of
hierarchy.
2. Feasibility Study
When complex problem and opportunities are to be defined, it is generally desirable
to conduct a preliminary investigation called a feasibility study. A feasibility study is
conduct to obtain an overview of the problem and to roughly assess whether
feasible solution exists prior to committing substantial resources to a project. During
a feasibility study, the system analyst usually works with representatives from the
departments(s) expected to benefit from the solution.
Every project is feasible if given unlimited resource and infinite time. Unfortunately,
the development of computer based systems is more likely to be plagued by
scarcity of resources and difficult delivery of data it is both necessary and prudent
to evaluate the feasibility of a project at the earliest possible time. Precious time
and money can be saved and untold professional embarrassment can be averted if
an ill conceived system is recognized early in the definition phase. So a detailed
study is carried out to check the workability of the system.
The existing computer system has a good hardware configuration and good
software facilities in such a way that any alteration can be implemented with
slight modifications of the existing process. Hence this project is technically
feasible.
These costs may include the time, budget and staff resources invested
during the design and implementation phase as well as infrastructure,
support, training and maintenance costs incurred after implementation. In
these high risk situations it may be appropriate assessments of financial
feasibility.
2.3Operational Feasibility
The feasibility study of the proposed system has been carried out in all the
three areas.
Technical Feasibility
Economic feasibility
The proposed system can be easily developed using the resources available
in the organization and they do not invest in procurement of additional
hardware or software. The cost of developing the system, including all the
phases have been taken into account and it is strict minimum. Hence the
system is economically feasible.
Operational feasibility
The system has been developed after extensive discussion with the end user
and all the operational requirements has been taken into account during the
planning and implementation stages. Hence the system is operationally
feasible.
3. Development Environment
1) Hardware Configuration
Memory : 1 GB RAM
Display : 14 LCD
2) Software Configuration
Database : MySql
3.1.1) NetBeans
NetBeans is the most comprehensive J2EE IDE() for the open Source
netbeans platform.It incorporates most innovative open standard
technologies to provide a development environment for J2EE WEB,XML,UML
& database & a wide array of application server connectors to streamline
development ,deployment, testing & portability.Its a cross-platform.
3.1.2) Java
Simple
Secure
Portable
Object-oriented
Robust
Multithreading
Architecture-neutral
Interpreted
High Performance
Distributed
Dynamic
Java supports the different types of editors are EditPlus, Eclips, NetBean,
Notepad. EditPlus editor are different types of used in editor such as Text,
HTML, PHP, JAVA Script, JAVA, JSP, XML, VBSscript, C#, C/C++, Perl, .NET
Config, CSS. Etc. Most of the Eclipse SDK is "pure" JavaTM code and has no
direct dependence on the underlying operating system. The chief
dependence is therefore on the Java 2 Platform itself. The 3.1 release of the
Eclipse Project is written and compiled against version 1.4 of the Java 2
Platform APIs, and targeted to run on version 1.4 of the Java 2 Runtime
Environment, Standard Edition
Java technology are performed the different types of version are JDK1.2,
JDK1.3, JDK1.4, JDK1.5. etc.
3.2 Back END:
A query language for RDBMS based on. Non procedure approach to retrieve
record from RDBMS.
SQL was proposed byIBM and got its standardization by ANSI and adopted
by different corporation with bit modification.
4System Design
4.1 Data Flow Diagram
Register/Logi Encription
n
Database
Server
Database
1. Login
Register/Forgot User
Password SDT
Register
Photogallery
Transfer
2.
Server SDT
Encrypt and
3.
Dembed and decrypt
SDT
Photogallery
registration
User Reg_user
id
login uname
Encrypt/decript/embed/dem pwd
4.2 Functional Model
sender
Receiver
Deembed the Data file from video
file
EmbedForm
EmbProcess
jButton1 : JButton
embfilename : String
jButton2 : Jbutton
jLabel1 : JLabel
public class EmbPocess()
jLabel2 : JLabel
Public String emb()
Public String deemb()
public EmbedForm()
private void initComponents()
EncryptionForm DeembedForm
inputfile : File Filedialog jButton1 : JButton
outDirectory : File JButton2 : JButton
name : String
jButton1 : JButton jLabel4 : JLabel
jLabel1 : JLabel jLabel5 : JLabel
package filedialog()
public String getfile()
public EncryptionForm() Public DeembedForm()
private void initComponents() private void initComponents()
MainForm
jMenu1 : JMenu Client
TEA jMenubar1 : JMenuBar socket : Socket
name : String jMenuitem1 : JMenuItem name : String
addr : String
Public void Encrypt() public static void main()
Public void Decrypt() public MainForm() public Client()
private void initComponents()
DecryptionForm
inputfile : File
Server
outDirectory : File
jButton1 : JButton dir1 = "" : String
jLabel1 : JLabel ServerThread dir2 = "" : String
serversocket : ServerSocket
public DecryptionForm() public void run()
private void initComponents() public Server()
4: Create
Encrypted file
2: select De-embed
in steganography
3: Browse
De-embedding
video file
4: Seperate encrypted file
Collaboration Diagrams
1: opens the
main window 2: Select Encrypt in security 3: Browse the Data file Enters key file
:MainFor :EncryptionF :TEA
m orm
4: Create Encrypted file
: Sender
1: opens the main window 5: Select decrypt in security 6: Browse encrypted file
:MianFor :Decryption :TEA
m Form
7: Receive original file
: Receiver
Enter Key
Enter key
file
file
Embed the data
with video file Decrypt the
data file
Sends video
file to network
MODULES:
1. Register
2. Login.
3. Forgot Password
4. Encryption
5. Decryption
6. Embed text file in video fils
7. Dembed text file from video files.
8. Transfer file one system to another system
Databases Involved
1. Registration
2. Login Details
6. Technical Specification
What is a Methodology?
Why Methodology?
1. To complete a project within time and budget with the expected scope
and quality we need methodologies which provide for a framework.
2. Most methodologies have a general planning, developing and
managing stages in common. They suggest the development team the
ways of thinking, learning and arriving at a regular feasible solution.
Suitable Methodologies:
Each methodology was evaluated against set criteria and performance rating
was given. The evaluation proved RUP as a well disciplined industry standard
approach that perfectly matches the set criteria. Apart from allowing
flexibility in requirement analysis, it also provides strong support for object
oriented analysis and design.
7. Conclusion
This Desktop Application provides facility to transfer sensitive file from one
user to another user through security system. This project work on client
server architecture that means if server is start then server receive client
file.
8. BIBLOGRAPHY