You are on page 1of 31

SECURE DATA

TRANSMISSION THROUGH
NETWORK
Introduction:

 Secure data transmission

• Today in the widespread computer world the security of


the data plays a vital role. Computer security is a process
of preventing and protecting unauthorized use of your
computer.

• Data security measures are needed to protect data during


transmission.
• A system for transmitting secure data between a sender’s
terminal equipment and a recipient’s terminal equipment over
a network.

• The system comprising a sender’s encryption server and a


recipient’s encryption server.

• Each of the encryption serves comprise a data receiver, a


decryptor an encryptor and a transmitter
• The sender’s encryption server being data connectable to the
sender’s terminal equipment over a first link of the network
and to the recipient’s encryption server over a second link of
the network.

• The receiver’s terminal equipment being further data


connectable to the recipient’s terminal equipment over a
third link of the network.
EXISTING SYSTEM
 Reliable data transmission over wireless networks has been
subject of continuous research over the last decade

 The data confronts the security risk during transmission


over wireless network

 It is relatively easy to listen secretly to a private on


video/audio conversation intercept and modify data packets.

 With the increase in the dependence of the organization on the


information system, there exists an opportunity for the
competitive organizations and disruptive forces to gain access
to other organizations information system.
 Any one with a PC and access to the public network
has the ability to capture network traffic, potentially
compromising the privacy and the reliability of the
applications

 It is mandatory for wireless applications to


guarantee authentication, confidentiality and
integrity of data
Proposed System

 The index terms are used in this process are:


 LSB Technique.
 Transmission.
 Image viewer

1. LSB Technique:
The information is hidden in the least significant
bits of the image data of the server sockets.
2. Transmission:
The image containing information transmitted to
network.

3. Image Viewer:
It is used to view the normal and stegoimages.
quality measures gives the variation between original and
stegoimage information.
 In the receiver side the same software is to be installed.

 When the image file is opened the software tells the user
whether that contains any hiding information or not.

 If the image contains hidden information then client sockets


will receive it.

 Most of the 600 filling stations and companys are needs a


powerful and capable system to transport and pick-up data
from each location all over the country
Modules:

• 1. Login.
• 2.Key Exchange Algorithm.
• 3.Encryption Algorithm.
• 4.Send File.
• 5. View File.
 1.Login

• This is one of the module is used to login into the


network.

• Here there are three pc’s are connected to make a


network.
2.Key Exchange Algorithm

• Diffie –Hellman key exchange Algorithm is used in this


project.

• Diffie–Hellman key exchange  is a specific method of


exchanging keys.

• The Diffie–Hellman key exchange method allows two parties


that have no prior knowledge of each other to jointly establish
a shared secret key  over an insecure communications
 channel.
 3.Encryption Algorithm
 Encryption is the process of converting a plaintext message
into ciphertext which can be decoded back into the original
message.

 An encryption algorithm along with a key is used in the


encryption and decryption of data.

 In conventional symmetric encryption a single key is used.


With this key, the sender can encrypt a message and a
recipient can decrypt the message but the security of the
key becomes problematic.
4.Send File
Now the sender can send the file which can be encrypted.

The encrypted file transferred to the receiver through network.

 5.View File
• The receiver receives the file which can be sent by
the sender.

• The Receiver can view the received file and access


the information.
 Scope of the Project:

• A management system is used to secure a communications


channel between at least two clients.

• The management system includes a network management


server which includes network management software.

• The network management server is coupled to the clients for


managing the communication between clients.
• The network management system further includes at least two
secured communication channels established by the network
management server between the network management server
and each of the clients respectively.

• So that at least two clients can securely communicate with each


other
 HardWare Requirements:
1. PIII 1.2 GHz Processor.
2. RAM 512MB.
3. HDD 20GB HARD DISK SPACE.

 Software Requirements:

1.WINDOWS OS(XP)
2.JAVA,JSP,JDBC,SERVLETS
3.TOMCAT 5.0
4.NET BEANS
5.ORACLE 9i
CONCLUSION

 This project “Secured Data Transmission


through Network” handles hiding a secret
message with in an image in such a way others
cannot discern the presence or contents of the
hidden message.
SCREEN SHOTS
By our team:

Arun Kumar
Nagaraju
Govardhan
Naresh

You might also like