Vous êtes sur la page 1sur 11

ONLINE FEEDBACK SYSTEM

A PROJECT REPORT
(Phase-I)

Submitted by

SINDHUJA S (1517106083)

SUJITHA V (1517106089)

SWETHA P (1517106094)

in partial fulfillment for the award of the degree

of
BACHELOR OF TECHNOLOGY

IN

INFORMATION TECHNOLOGY

SONA COLLEGE OF TECHNOLOGY, SALEM-5

(Autonomous)

NOVEMBER 2019

ANNA UNIVERSITY: CHENNAI 600 025

BONAFIDE CERTIFICATE

Certified that this project report “ONLINE FEEDBACK SYSTEM” is the bonafide

work of “SINDHUJA S(1517106083), SUJITHA V(1517106089), SWETHA

P(1517106094)” who carried out the project work under my supervision.


SIGNATURE SIGNATURE

Dr.J.Akilandeswari Dr.P.Shanmugaraja

HEAD OF THE DEPARTMENT SUPERVISOR

Professor Professor

Department of Information Technology Department of Information Technology

Sona College of Technology, Sona College of Technology,

Salem-636 005. Salem-636 005.

Submitted for mini Project viva voce examination held on......................................

INTERNAL EXAMINER EXTERNAL EXAMINER


ABSTRACT

This project describes a class which allows encrypting and decrypting data with

the CAST-128 algorithm. This algorithm belongs to the class of encryption

algorithm known as Fiestel ciphers. It encrypts the data at the source and it is

decrypted in the destination so that the data is transmitted with high security.

The key values are used in encrypting and decrypting data. A highly secured and

unique key is generated using the algorithm and MD5 hashing technique. This

algorithm is faster than AES-256 algorithm. The main objective is to provide fast

and strong security for confidential information. A simple test is carried out

initially to check the encryption and decryption. Text encryption and decryption

is used to encrypt and decrypt the text which is given by the user. File encryption

and decryption is used to encrypt and decrypt the files such as text document and

pdf . Similarly image files such as bmp,jpg and gif and audio and video files such

as wav, mpeg, mp4 are encrypted and decrypted. Browser data such as

information passed through e-mail can also be transferred with high security

using this algorithm.


ACKNOWLEDGEMENT

First and foremost, we thank to power of almighty for showing us inner


peace and for all blessings. Special gratitude to our parents, for showing their
support and love always.

We express our sincere thanks to Chairman Sri.C.Valliappa and Principal


Dr.S.S.Senthilkumar for providing adequate facilities to complete the project.

We are immensely grateful to Head of Information Technology,


Dr.J.Akilandeswari for the continues encouragement to complete the project.
We express our heartfelt thanks to our project supervisor Ms.I.Janani for
his valuable guidance and fruitful discussions throughout the course of the project
work.

We feel proud in sharing this success with all our staff members and friends
who helped directly or indirectly in completing this project successfully.

TABLE OF CONTENTS
CHAPTER NO. TITLE PAGE NO.
ABSTRACT iii
LIST OF FIGURES vii

LIST OF SYMBOLS AND ABBREVIATIONS viii

1. INTRODUCTION 1
1.1 About the project 1

1.2 Problem description 3

1.3 Scope for Future Development 4

2. LITERATURE SURVEY 5

2.1 Message Communication 5

2.2 Image encryption using AES 7

2.3 Audio File on low frequency band 8

2.4 Bit Shifting and Stuffing (BSS) methodology 9

3. HARDWARE AND SOFTWARE 11

REQUIREMENTS

4. PROJECT DESCRIPTION 12

4.1 Scope of the project 12

4.2 System Architecture and Design 13

4.2.1 Feature Extraction in Encryption System 15

4.2.2 File Types 15


4.2.3 Implementation of strong and fast Algorithm 15

4.2.4 Hashing Algorithm for Security 15

5. RESULTS 16

5.1 User Interface 16

6. CONCLUSIONS AND FUTURE ENHANCEMENTS 25

6.1 Conclusion 25

6.2 Future enhancement 26

APPENDICES 28

Appendix 1 Sample Script 28

REFERENCES 64

LIST OF PUBLICATIONS 66

PROOF FOR PUBLICATIONS 67


LIST OF FIGURES

FIGURE NO. TITLE PG NO.

2.1 Simplified block diagram of the encryption scheme


6

2.2 Detailed block diagram of the encryption part 8

4.1 Level 1 DFD 13

4.2 Level 2 DFD 14


5.1 Login page 16

5.2 Testing and generation of new GUID 17

5.3 Viewing the users of the interface 18

5.4 Performing Encryption 19

5.5 Performing Decryption 20

5.6 After performing Encryption and Decryption 21

5.7 Home page 22

5.8 Image Encryption and Decryption 23

5.9 File Encryption and Decryption 24


LIST OF ABBREVIATIONS

ABBREVIATIONS

GUID - Global Unique IDentifier.

MD5 - Message Digest (5-Version)

CAST 128 - Algorithm, also called as Cast 5

Vous aimerez peut-être aussi