You are on page 1of 7

Introduction to the Project

The security of data transmission is a vital problem in communication networks. A communication


system is reliable as long as it provides high level of security. Usually users exchange sensitive
data. In this case, security, confidentiality, integrity and authenticity of data should be provided.
Therefore it is essential to protect data from attackers. The main purpose for preparing this
document is to give a general insight into the analysis and requirements of the existing system or
situation and for determining the operating characteristics of the system. The main objective of this
system is to avoid drawing suspicion to the transmission of hidden message, developing a backup
tool which copies database and stores it in the form of zip file and developing a screen recorder
which provides desktop as well as webcam recording. The goal of cryptography is to make data
unreadable by a third party, the goal of stenography is to hide the data from a third party through
the use of advanced computer software, together, these two are intended to fight piracy.

Encryption software protects internet connected computers from crackers and other online
intruders. The technology is widely used to encrypt credit card information, bank account numbers
and other type of financial records so they can send safely and securely across the internet. Protect
much of the intellectual content thats marketed on the web, such as music, Videos, articles, and
software, restricting its availability to paying customers. This system helps to hide the information
while sending the important and confidential documents in image and video files; it will be
invisible for the third person. This system is helpful for the defense and security departments
sending and receiving the confidential matters in emergency situations.
Backup Utility allows you to provide backup to the data bases with a click of a button. You just
need to turn on the application and enjoy storing all your content on this tool. It configures itself
and stores the date in the server system. It shows we no need to carry any external driver to take
backup.

1
Technology used for the project are as follows:

Servlets
A Java servlet is a Java program that extends the capabilities of a server. Although servlets can
respond to any types of requests, they most commonly implement applications hosted on Web
servers. Such Web servlets are the Java counterpart to other dynamic Web content technologies
such as PHP and ASP.NET.

Servlets are most often used to Process or store a Java class in Java EE that conforms to the Java
Servlet API, a standard for implementing Java classes which respond to requests. Servlets could in
principle communicate over any clientserver protocol, but they are most often used with
the HTTP protocol. Thus "servlet" is often used as shorthand for "HTTP servlet". Thus, asoftware
developer may use a servlet to add dynamic content to a web server using the Java platform. The
generated content is commonly HTML, but may be other data such as XML. Servlets can
maintain state in session variables across many server transactions by using HTTP cookies,
or URL rewriting.

Java Server Pages

JavaServer Pages (JSP) is a technology that helps software developers create dynamically
generated web pages based on HTML, XML, or other document types. Released in 1999 by Sun
Microsystems, JSP is similar to PHP and ASP, but it uses the Java programming language.

To deploy and run JavaServer Pages, a compatible web server with a servlet container, such
as Apache Tomcat or Jetty, is required.

Architecturally, JSP may be viewed as a high-level abstraction of Java servlets. JSPs are translated
into servlets at runtime; each JSP servlet is cached and re-used until the original JSP is modified.[2]

JSP can be used independently or as the view component of a server-side modelview


controller design, normally with JavaBeans as the model and Java servlets (or a framework such
as Apache Struts) as the controller. This is a type of Model 2architecture.

2
JSP allows Java code and certain pre-defined actions to be interleaved with static web markup
content, such as HTML, with the resulting page being compiled and executed on the server to
deliver a document. The compiled pages, as well as any dependent Java libraries, contain Java byte
code rather than machine code. Like any other Java program, they must be executed within a Java
virtual machine (JVM) that interacts with the server's host operating system to provide an abstract,
platform-neutral environment.

JSPs are usually used to deliver HTML and XML documents, but through the use of Output
Stream, they can deliver other types of data as well.

The Web container creates JSP implicit objects like page Context, servlet Context, session, request
& response.

3
Feasibility Study
A feasibility study is a high-level capsule version of the entire System analysis and Design Process.
The study begins by classifying the problem definition. Feasibility is to determine if its worth
doing. Once an acceptance problem definition has been generated, the analyst develops a logical
model of the system. It is a preliminary survey for the systems investigation. It aims to provide
information to facilitate a later in-depth investigation.
The report produced at the end of the feasibility study contains suggestions and reasoned
arguments to help management decide whether to commit further resources to the proposed
project. Within the scheduled duration we were assigned to study both the positive and negative
aspects of the current manual system, in which we have come up with a number of drawbacks that
prevent the progress of the clinic if it is continued to function manually.
It is meant for use by the developers and will be the basic during testing phase. Any changes made
to the requirements in the future will have to go through formal change approval process. Hidden
Ink has been developed to provide confidentiality security service.

Audio/Video Steganography tool allows user to hide information or message in any


audio/video files and provide the path where the user wants to save Image and extruded
file.
Steganocrypt tool allows sending the encrypted messages in an image file as a carrier
to hide a message using the steganography and cryptography technique, it does not
reveal any difference in attributes like size, content etc from that of the original file. It
is difficult for someone to find out that this image contains a message. The encrypted
message is further decrypted using cryptography.
Backup Utility is monitoring tool installed in each Pcs to copy all the data from the
database and store in the server directly without the user notification.
Screen Recorder is a fast, reliable and easy to use tool to record anything that happens
on your screen in a video file. Set up the area to record, start, make your demonstration
and stop. Your file is ready right away. Ideal for demonstrations. Screen Recorder will
make it easy for you to create realistic and understandable demonstrations.

4
Methodology
The Systems Development Life Cycle (SDLC) is a conceptual model used in project management
that describes the stages involved in an information system development project from an initial
feasibility study through maintenance of the completed application. In our project work we have
gone through the following phases of Systems Development Life Cycle (SDLC) to develop the
various modules of the site, including requirements, validation and training.

SDLC methodology has the following main stages:

Assess need, opportunities and issues. The existing system was evaluated. Deficiencies
were identified. This was done by personally going through systems available and learning
the experiences of users.

Define functional and performance specifications for the new system. The new system
requirements were defined. Deficiencies in the existing system should be addressed along
with proposals for improvement.

Design/Develop/Test Software for Systems Integration: The proposed system was


designed. Plans were prepared for the logical and physical construction, hardware,
operating systems, programming, communications, training, and security issues. The new
system was developed. The new components and programs were be obtained, installed and
integrated. All aspects of performance were tested.

Support Program Implementation: The system was put into use.

Support Operations: System performance was monitored; tuning and synchronization are
performed.

Evaluate/assess program performance: Once the new system is up and running for a
while, it should be exhaustively evaluated. Maintenance would be kept up rigorously at all
times. Users of the system would be kept up-to-date concerning the latest modifications and
procedures.

5
Facilities Required
A. Software Requirements

A set of programs associated with the operation of a computer is called software. Software
is the part of the computer system which enables the user to interact with several physical
hardware devices.

The minimum software requirement specifications for developing this project are as
follows:

Operating System : Window 2000, XP


Presentation layer : Java, Servlets, Swings, JavaServer Pages
Presentation : Power Point 2003
Documentation Tool : Ms Office
Designing Tool : Photoshop

B. Hardware Requirement Specification

The Collection of internal electronic circuits and external physical devices used in building
a computer is called Hardware.

The minimum hardware requirement specification for developing this project is as follows:

Processor : Pentium IV/AMD Athelon (1.6 GHz)


RAM : 512MB RAM
Hard Disk : 10GB
Monitor : Standard Color Monitor
Keyboard : Standard Keyboard
Mouse : Standard Mouse

6
Bibliography
Java AWT
By John Zukowski
System Analysis and Design
By Leonard Fertuck
F.A.P.Petitcolas, R.J.Anderson, M.G.Kuhn, Information Hiding-A Survey,
Proceeding of the IEEE, vol. 87, no. 7,June 1999, pp.1062-1078.
J. J. Chae, B. S. Manjunath , Data Hiding in Video,Proceedings of the 6th IEEE
International Conference on Image Processing, 1999, pp.311-315.
Westfeld A, F5-A Steganographic Algorithm, Proceeding of 4th International
Conference on Information Hiding, LNCS 2137, Springer-Verlag, 2001, pp.289-302.

You might also like