Professional Documents
Culture Documents
Encryption software protects internet connected computers from crackers and other online
intruders. The technology is widely used to encrypt credit card information, bank account numbers
and other type of financial records so they can send safely and securely across the internet. Protect
much of the intellectual content thats marketed on the web, such as music, Videos, articles, and
software, restricting its availability to paying customers. This system helps to hide the information
while sending the important and confidential documents in image and video files; it will be
invisible for the third person. This system is helpful for the defense and security departments
sending and receiving the confidential matters in emergency situations.
Backup Utility allows you to provide backup to the data bases with a click of a button. You just
need to turn on the application and enjoy storing all your content on this tool. It configures itself
and stores the date in the server system. It shows we no need to carry any external driver to take
backup.
1
Technology used for the project are as follows:
Servlets
A Java servlet is a Java program that extends the capabilities of a server. Although servlets can
respond to any types of requests, they most commonly implement applications hosted on Web
servers. Such Web servlets are the Java counterpart to other dynamic Web content technologies
such as PHP and ASP.NET.
Servlets are most often used to Process or store a Java class in Java EE that conforms to the Java
Servlet API, a standard for implementing Java classes which respond to requests. Servlets could in
principle communicate over any clientserver protocol, but they are most often used with
the HTTP protocol. Thus "servlet" is often used as shorthand for "HTTP servlet". Thus, asoftware
developer may use a servlet to add dynamic content to a web server using the Java platform. The
generated content is commonly HTML, but may be other data such as XML. Servlets can
maintain state in session variables across many server transactions by using HTTP cookies,
or URL rewriting.
JavaServer Pages (JSP) is a technology that helps software developers create dynamically
generated web pages based on HTML, XML, or other document types. Released in 1999 by Sun
Microsystems, JSP is similar to PHP and ASP, but it uses the Java programming language.
To deploy and run JavaServer Pages, a compatible web server with a servlet container, such
as Apache Tomcat or Jetty, is required.
Architecturally, JSP may be viewed as a high-level abstraction of Java servlets. JSPs are translated
into servlets at runtime; each JSP servlet is cached and re-used until the original JSP is modified.[2]
2
JSP allows Java code and certain pre-defined actions to be interleaved with static web markup
content, such as HTML, with the resulting page being compiled and executed on the server to
deliver a document. The compiled pages, as well as any dependent Java libraries, contain Java byte
code rather than machine code. Like any other Java program, they must be executed within a Java
virtual machine (JVM) that interacts with the server's host operating system to provide an abstract,
platform-neutral environment.
JSPs are usually used to deliver HTML and XML documents, but through the use of Output
Stream, they can deliver other types of data as well.
The Web container creates JSP implicit objects like page Context, servlet Context, session, request
& response.
3
Feasibility Study
A feasibility study is a high-level capsule version of the entire System analysis and Design Process.
The study begins by classifying the problem definition. Feasibility is to determine if its worth
doing. Once an acceptance problem definition has been generated, the analyst develops a logical
model of the system. It is a preliminary survey for the systems investigation. It aims to provide
information to facilitate a later in-depth investigation.
The report produced at the end of the feasibility study contains suggestions and reasoned
arguments to help management decide whether to commit further resources to the proposed
project. Within the scheduled duration we were assigned to study both the positive and negative
aspects of the current manual system, in which we have come up with a number of drawbacks that
prevent the progress of the clinic if it is continued to function manually.
It is meant for use by the developers and will be the basic during testing phase. Any changes made
to the requirements in the future will have to go through formal change approval process. Hidden
Ink has been developed to provide confidentiality security service.
4
Methodology
The Systems Development Life Cycle (SDLC) is a conceptual model used in project management
that describes the stages involved in an information system development project from an initial
feasibility study through maintenance of the completed application. In our project work we have
gone through the following phases of Systems Development Life Cycle (SDLC) to develop the
various modules of the site, including requirements, validation and training.
Assess need, opportunities and issues. The existing system was evaluated. Deficiencies
were identified. This was done by personally going through systems available and learning
the experiences of users.
Define functional and performance specifications for the new system. The new system
requirements were defined. Deficiencies in the existing system should be addressed along
with proposals for improvement.
Support Operations: System performance was monitored; tuning and synchronization are
performed.
Evaluate/assess program performance: Once the new system is up and running for a
while, it should be exhaustively evaluated. Maintenance would be kept up rigorously at all
times. Users of the system would be kept up-to-date concerning the latest modifications and
procedures.
5
Facilities Required
A. Software Requirements
A set of programs associated with the operation of a computer is called software. Software
is the part of the computer system which enables the user to interact with several physical
hardware devices.
The minimum software requirement specifications for developing this project are as
follows:
The Collection of internal electronic circuits and external physical devices used in building
a computer is called Hardware.
The minimum hardware requirement specification for developing this project is as follows:
6
Bibliography
Java AWT
By John Zukowski
System Analysis and Design
By Leonard Fertuck
F.A.P.Petitcolas, R.J.Anderson, M.G.Kuhn, Information Hiding-A Survey,
Proceeding of the IEEE, vol. 87, no. 7,June 1999, pp.1062-1078.
J. J. Chae, B. S. Manjunath , Data Hiding in Video,Proceedings of the 6th IEEE
International Conference on Image Processing, 1999, pp.311-315.
Westfeld A, F5-A Steganographic Algorithm, Proceeding of 4th International
Conference on Information Hiding, LNCS 2137, Springer-Verlag, 2001, pp.289-302.