Sei sulla pagina 1di 48

MCA 2014-2017 E-MAIL SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY

STUDY PHASE

COLLEGE OF APPLIED SCIENCE VADAKKENCHERRY 1


MCA 2014-2017 E-MAIL SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY

1.1 BRIEF HISTORY OF SOFTWARE DEVELOPMENT


Since the beginning of software development which was somewhere in the late
1940s, various software types have gone through many stages of evolution. It has evolved
steadily throughout the ages and applications of various software types have reached heights
that were not thought to be possible.
One important factor that boosted the development of software throughout the ages
was that new and improved computers were coming out into the market at an unprecedented
rate. The development of computer hardware technology demanded that the software be as
good, fast and reliable as the hardware itself. During the early ages, a computer was not
built to sit on top of a desk; rather they were huge machines and did not have the speed or
the reliability of modern computers. The need for faster, more reliable and smaller
computers was felt throughout the computing world. As time went on computers began to
shrink in size but expanded in speed, reliability and performance. With the introduction of
better hardware technology, software developed into new heights. These new software were
not only reliable and fast, they were user-friendly too.

1.2 OVERVIEW OF OUR PROJECT


Steganography is the art and science of writing hidden messages in such a way that no-one
apart from the sender and intended recipient even realizes there is a hidden message. Today,
the term steganography includes the concealment of digital information within computer
files.
In this project the user can select a master file for data hiding. And save it as the
output file. After this there is another facility to change the master and output file. We can
also permit the user to view the message from the embedded picture by setting a password
and write the message to hide along with the output picture. To retrieve the message from
the picture select the particular image. Then we get the information about the picture. Enter
the password to read the message, there it display the hidden message.

COLLEGE OF APPLIED SCIENCE VADAKKENCHERRY 2


MCA 2014-2017 E-MAIL SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY

1.3 EXISTING SYSTEM


In the existing system the Steganography uses end of file method.This end of file method is
inefficient in the transferring of data via network.End of file method is hiding the data after
the end of file character.This end of file character is in ASCII value.In this end of file the
data is Steganographed after the ASCII value is encountered. Size of the encrypted file will
be larger than the original file.
1.3.1 Disadvantage
One of the main disadvantages of thesesoftware is that the message to be hidden will be
written after the end of the original source file so we easily find whether the image contains
hidden data by just checking the size of the original file and the file to which the message
was encrypted.

1.4 PROPOSED SYSTEM


The proposed system provides facility to hide data within the file,before the end of
the file. This is efficient while transferring the image through the network.In this system the
data will be Steganographed using LSB method. The simplest approach to hiding data
within an image file is called least significant bit (LSB) insertion. In this method, we can
take the binary representation of the hidden data and overwrite the LSB of each byte within
the cover image. If we are using 24-bit color, the amount of change will be minimal and
indiscernible to the human eye.
Any color pixel is made of a combination of RED-GREEN-BLUE (RGB) wherein
each RGB components consists of 8 bits. If the letters in ASCII are to be represented within
the color pixels, the rightmost digit, called the Least Significant Bit (LSB), can be altered.
Any variation in the value of this bit leads to minimal variation in color. GIF and 8-bit BMP
files employ what is known as lossless compression, a scheme that allows the software to
exactly reconstruct the original image. JPEG, on the other hand, uses lossy compression,
which means that the expanded image is very nearly the same as the original but not an
exact duplicate.
If we have to hide word 'AIG' in the image, we take the LSB of every color
and hide each bit of the word in its RGB Combination. To insert letter "A", we modify three
color pixels with 3 bits in each color pixel For e.g.,The letter A can be hidden in three
pixels. The binary value of A is 10000011. The original raster data of 3 pixels may be.
(00100111 11101001 11001000) (00100111 11001000 11101001) (11001000 00100111

COLLEGE OF APPLIED SCIENCE VADAKKENCHERRY 3


MCA 2014-2017 E-MAIL SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY

11101001) .After inserting the binary value for A. (00100111 11101000 11001000)
(00100110 11001000 11101000) (11001000 00100111 11101001)

1.4.1 Advantage
 By using this method, you can hide any information within an image and extract
them without much pain
 No way to decrypt the embedded message without knowing the encryption key
 This method provides an option to compress the output file. Thus the size of the
output file can be set to that of the original file. So an outsider cannot find whether
the image contains any data by checking the original file and encrypted file.

1.5FEASIBILITY STUDY
1.5.1 Technical feasibility
The system analyst evaluates the technical merits of the system giving emphasis on the
performance reliability, maintainability and productivity. Before developing the proposed
system, the recourse availability of the organization was studied. The organization has
immense computer facilities equipped with sophisticated machines and software. Technical
feasibility centers around the existing computer computers system and to what extend it can
support the proposed addition. The hardware resources required are Pentium 4 or above and
256 or above operating system required are Windows xp/vista or Linux. Since these
requirements are available with proposed system .it is technically feasible

1.5.2 Economical feasibility


In cost-benefit analysis various benefits and costs involved are considered, calculated and
compared, if the benefits are more than the cost, the project is considered economically
feasible. Economic feasibility is the most important and frequently used method for
evaluating the effectiveness of the proposed system. It is very essential because the main
goal of the proposed system is to have economically better result along with increased
efficiency of the cost versus the benefit and savings are expected from the proposed system
The implementation of JMAIL is economically feasible .The development of this
system work well within the budget for the system. The database technology used is
MySQL, the server technology used is Apache Tomcat 4.1 , interface is designed in JSP and

COLLEGE OF APPLIED SCIENCE VADAKKENCHERRY 4


MCA 2014-2017 E-MAIL SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY

the framework is given by java. As all these resources are easily available and some are free
software, the JMAIL system is economically feasible.

1.5.3 Operational feasibility


People are inherently resistant to change and computers have been known to
facilitate change. An estimate should be made of how strong a reaction, the user staff is
likely to have towards the development of the new system. It is common knowledge that
computer installations have something to do with turnover, transfers and change in
employee job status.
The JMAIL system is very user friendly. The system provides a well-designed web GUI for
the user. Thus it is easily operable and makes no ambiguity.

1.6 TOOLS USED


LANGUAGE: JAVA
TECHNOLOGY USED: JSP And Servlet
BACK END: MYSQL

COLLEGE OF APPLIED SCIENCE VADAKKENCHERRY 5


MCA 2014-2017 E-MAIL SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY

DESIGN PHASE

COLLEGE OF APPLIED SCIENCE VADAKKENCHERRY 6


MCA 2014-2017 E-MAIL SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY

2.1SYSTEM DESIGN
After studying all features of existing manual procedures the new system was designed in
such a way that it can overcome all the difficulties of the existing system.
Designing is the process of translation of requirements defined during analysis into
several design activities for users considerations. Designers select equipment needed to
implement the system. in this phase, the designs of the database also take place. After
identifying the problem, limitations and opportunities to improve the efficiency and
effectiveness of the existing system, a detailed design of the proposed system is done. The
design phase is a transition from the user oriented document to a programmer oriented
document.

2.1.1 INPUT DESIGN


Generally input design is the process of converting the user originated inputs to a
computer based format. The collection of input data is considered to be most important
,since the input have to be planned in such a way to get relevant information, extreme case
to taken to obtain the pertinent information .The goal of input data is to make data entry as
easy, logical and free from errors as possible.
The design of the input for a project focus on
 Controlling the amount of input required.

 Controlling the errors

 Avoiding extra steps

 Keeping the process simple

2.1.2 OUTPUT DESIGN


Computer output is the most important and direct source of information to user.
Efficient, intelligent output design should improve system relationships with the user and
help in decision making. Without quality output the entire system may appeal to be useless.
Designing computer output should be done in organized manner. The output design of a
proposed system focus on
1. Assure proposed output
2. Make meaningful output

COLLEGE OF APPLIED SCIENCE VADAKKENCHERRY 7


MCA 2014-2017 E-MAIL SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY

3. Assure timeliness
4. Choose effective output method

2.2 MODULARISATIONDETAILS
JMAIL provides facility to hide data within the file, before the end of the file. This is
efficient while transferring the image through the network
There are two users in this system
1. Admin
2. Normal user

1. Admin
 Admin is the super user because they have all the controls of this system.
They can block, delete a user based on complaints.
2. Normal user
 User can sends, receives mails. The special purpose of this system the user
can sends their mail with encryption .In this case receiver must be decrypt the
data with the encryption key.

There are 2 main modules in this system. Those are


1. ENCRYPTION
2. DECRYPTION

1. MODULE 1: ENCRYPTION

In this module the message is encrypted and embedded in an image. For that a
master file is selected, which is an image. Then the output file is selected. The facility to
compress the output file is provided. After compressing the file the encryption key is
entered. Then the message isembedded in the master file.

2. MODULE 2: DECRYPTION

COLLEGE OF APPLIED SCIENCE VADAKKENCHERRY 8


MCA 2014-2017 E-MAIL SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY

In this module the embedded message is extracted from the encrypted file. In order

to extract the message we have to enter the encryption key. If the entered key matches

the encryption key the message is extracted from the file and is displayed

OTHER MODULES ARE

In admin
1. Login
Admin must be login with their username and password for further actions.
We cannot login with invalid username and password and also cannot use any blank
username and password.
2. View all users
Admin can view all the users with their status. Your default status is active
when will u register with this system

3. View all complaints


Admin can view all the complaints. If the abused person object the complaint
then the admin can see the response abused person
4. Block a person
Admin can block a person based on the complaint. Also they can unblock a
person based on the response of blocked person and fake complaints
In normal user,
1. Login

user must be login with their username and password for further actions. We cannot
login with invalid username and password and also cannot use any blank username and
password. If a user in blocked state then they can’t login.
2. Registration

If you are a new user then you must register with this site. In register section you
must be select a question and give an answer for security purpose. If you forget your
password then this question will help you.
3. Compose a mail
You can compose your mail in two ways.
 Compose a mail with encryption

COLLEGE OF APPLIED SCIENCE VADAKKENCHERRY 9


MCA 2014-2017 E-MAIL SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY

Main with encryption means you can encrypt your message with an
encryption key and after you can hide it in an image. In this case your
message is more secure than normal message. The encryption key and msg
will embed in that image as your requirements.
 Normal composing
You can send a mail in normal way. It means in this mailing the mail is less
secure. We can send amsg using this way when the message is less
important.
4. Inbox
You can view all the messages you received in your inbox. You can get both
secure and normal messages here. If you want to see your secure messages
the click the content image and you are redirected to a new page. In that page
there is textbox for enter your encryption key. After entering the correct
encryption key the code will decrypt the message and you can view the
message that hide in the image
5. Sent mail

User can view all sent mails here. Also they can delete their mails. If you want to delete
multiple mails then you can select using checkbox and delete it.
6. Draft
If u compose a mail and cancel it then that mail will save in your draft section. You
can see it there and resend it.
7. Trash
Your all deleted mail will be here. If you want to delete it permanently then you
should delete the mail from trash.
8. All mail
You can view your all mails here. In this section you can see the messages from sent,
inbox, draft etc.
9. Register complaint
If you want to register a complaint about a person or anything you can do it here.
This will send it to admin and admin will take an action based on your complaint.
And otherwise, you will blocked by admin based on complaint then you can respond
about that complaint
10. Settings

COLLEGE OF APPLIED SCIENCE VADAKKENCHERRY 10


MCA 2014-2017 E-MAIL SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY

The user can set their own account. In this section they can change their password.
In password change they must give their old password for user verification. They can
deactivate their account using username and password. Also they can update their all
details except username and password in the section of update profile
11. Profile change
User can upload their new profile pic using file upload.
12. Search a mail

User can search the mail based on sender or receiver and content of the mail.

2.3 OBJECT ORIENTED CONCEPTS

2.3.1 OBJECTS
Objects are the basic runtime entities in the object oriented system. They may
represent a person, a place, a bank account, a table of data etc. They may represent user
defined data such as vectors, time, and lists. Programming problem is analyzed in terms of
objects and the nature of the communication between them.
Object=Data + Process
Program objects should be chosen such that they may represent real time world
objects. Objects take up space in the memory and have associated address. When a
program is executed, the objects interact by sending messages to one another. Each object
contains data and code to manipulate the data. Objects interact depending on the type of
message accepted and the type of the response returned by the objects.

2.3.2CLASS
Class is defined as an abstract data type characterized by a set of properties
(attributes and functions) common to its objects. The class expresses the common features
and constitutes a means of classification. The entire set of data encode of an object can be
made a user defined data type with the help of a class. The objects are the variables of type
class. Once the class has been defined, we can create any number of objects belonging to

COLLEGE OF APPLIED SCIENCE VADAKKENCHERRY 11


MCA 2014-2017 E-MAIL SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY

that class. Each object is associated with the data of type class with which they are created.
A class is thus a collection of objects of similar type.

2.4 NETBEANS IDE FOR JAVA

NetBeans IDE provides first-class comprehensive support for the newest Java
technologies and latest Java enhancements before other IDEs. With its constantly improving
Java Editor, many rich features and an extensive range of tools, templates and samples,
NetBeans IDE sets the standard for developing with cutting edge technologies out of the
box.

2.5 THE JAVA PROGRAMMING LANGUAGE

Java is a programming language originally developed by Sun Microsystems and


released in 1995 as a component of Sun Microsystems platform. The language derives much
of its syntax from C and C++, but has a simpler object model and fewer low level facilities.
Java applications are typically compiled to byte code that can run on any Java Virtual
Machine (JVM) regardless of computer architecture.

The most important characteristics of Java are that was design from the outset to be
machine independent. Java programs can run unchanged on any operating system that
supports Java. An application written in Java will only require a single set of source code
regardless of the number of different computer platforms on which it is run. In any
programming languages the application will frequently require the source code to be tailored
to accommodate different environments particularly if there is an extensive GUI involved.
Java offers substantial saving in time and resources in developing supporting and
maintaining major applications on several different hardware platforms and operating
system. The next most important characteristics of Java is that it is object oriented. Object
oriented programs are easier to understand and less time consuming to maintain and extend
then program that have been returned without the benefit of using object. Java is currently
one of most programming languages in use, and is widely used from applications software
to applications.

COLLEGE OF APPLIED SCIENCE VADAKKENCHERRY 12


MCA 2014-2017 E-MAIL SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY

The Java programming language is a high level languages that can be characterized
by all the following:

 Simple
 Object-Oriented
 Distributed
 Multi-threaded
 Dynamic
 Portable
 Architecture Neutral

In Java programming language all source code is written in plain text files ending
with Java extension. Those source files then compiled into class files by the Javac
compiler. A. class file does not contain code that is native to your processer: it instead
contain byte codes- the machine language of Java Virtual Machine (JVM). The Java
launched tool then runs on your application with an instance of JVM. Because the JVM is
available on many different operating system, the same class files are capable of running on
Microsoft Windows, solaris OS.

Characteristics of Java
The target of Java is to write a program once and then run this program on multiple
operating systems.

COLLEGE OF APPLIED SCIENCE VADAKKENCHERRY 13


MCA 2014-2017 E-MAIL SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY

Java has the following properties:

 Platform independent: Java programs use the Java virtual machine as abstraction and
do not access the operating system directly. This makes Java programs highly
portable. A Java program (which is standard complaint and follows certain rules)
can run unmodified on all supported platforms, e.g. Windows or Linux.
 Object-orientated programming language: Except the primitive data types, all
elements in Java are objects.
 Strongly-typed programming language: Java is strongly-typed, e.g. the types of the
used variables must be pre-defined and conversion to other objects is relatively
strict, e.g. must be done in most cases by the programmer.
 Interpreted and compiled language: Java source code is transferred into the bytecode
format which does not depend on the target platform. These bytecode instructions
will be interpreted by the Java Virtual machine (JVM). The JVM contains a so
called Hotspot-Compiler which translates performance critical bytecode
instructions into native code instructions.
 Automatic memory management: Java manages the memory allocation and de-
allocation for creating new objects. The program does not have direct access to the
memory. The so-called garbage collector deletes automatically objects to which no
active pointer exists.

2.6 THE JAVA PLATFORM


A platform is a hardware or software environment in which a program runs. The most
popular platforms are Microsoft, Linux etc…. Most platforms can be described as a
combination of operating system and underlying hardware. The Java platform differs from
most other platform in that it is a software only platform that runs on the top of the other
hardware based platform.
The Java platform has two components:
 The Java Virtual machine
 The Java Application Programming Interface(API)

Java Virtual Machine is the base of the Java platform and it is ported on to various
hardware based platform.

COLLEGE OF APPLIED SCIENCE VADAKKENCHERRY 14


MCA 2014-2017 E-MAIL SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY

The API is a large collection of readymade software components that provide many
useful capabilities. It is grouped into libraries of related classes and interface ; these
libraries are known as packages. The API and JVM insulate the program from the
underlying hardware. As a platform independent environment a Java platform can be a bit
slower then native code.
2.7 JAVA VIRTUAL MACHINE

The Java Virtual Machine is responsible for the hardware and operating system-
independence of the J2ZE platform, the small size of compiled code (byte code) and
platform security. The Java virtual machine (JVM) is a software implementation of a
computer that executes programs like a real machine. The Java virtual machine is written
specifically for a specific operating system, e.g. for Linux a special implementation is
required as well as for Windows. Java programs are compiled by the Java compiler
into bytecode. The Java virtual machine interprets this bytecode and executes the Java
program.

2.8 MYSQL

MySQL is a database system used on the web. Basically, a MySQL database allows
you to create a relational database structure on a web-server somewhere in order to store
data or automate procedures. If you think of it in comparison to Microsoft Access, MySQL
is what holds all of your tables, PHP acts as your queries (among other things), and your
forms are basically web pages with fields in them. With all of this combined, you can
create truly spectacular projects on the web. A database most often contains one or more
tables. Each table is identified by a name (E.g. “Customer” or “Orders”). A table contains
record (rows) with data. With SQL we can query a database and have a result set returned.
SQL is the syntax for executing queries. But the SQL language also includes the syntax to
insert and delete records. These query and update commands together form the Data
Manipulation Language (DML) part of SQL. The Data Definition Language (DDL) part of
SQL permits database tables to be created or detected. We can also define indexes (keys),
specify links between tables and imposes constraints between databases.

COLLEGE OF APPLIED SCIENCE VADAKKENCHERRY 15


MCA 2014-2017 E-MAIL SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY

2.9 DATA FLOW DIAGRAMS


A data flow diagram (DFD) is a graphical representation of the “flow” of data through an
information system, modeling its process aspects. Often they are a preliminary step used to
create an overview of the system which can later be elaborated. DFDs also be used for the
visualization of data processing (Structured design).
Data flows are pipelines through which packets of information flow. Label the arrows with
the name of the data that moves through it.
A DFD shows what kinds of information will be input to and output from the system,
where the data will come from and go to, and where the data will be stored. It does not show
information about the timing of the processes, or information about whether processes will
operate in sequence or in parallel.
The first level DFD shows the main processes within the system. each of these
processes can be broken into further processes until you reach pseudo code.

2.10 LEGENDS USED FOR DFD

Destination

Source /
Dataflow

Data store

Process

COLLEGE OF APPLIED SCIENCE VADAKKENCHERRY 16


MCA 2014-2017 E-MAIL SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY

LEVEL 0

LEVEL 1

LEVEL 2

COLLEGE OF APPLIED SCIENCE VADAKKENCHERRY 17


MCA 2014-2017 E-MAIL SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY

LEVEL 3

LEVEL 2.1

COLLEGE OF APPLIED SCIENCE VADAKKENCHERRY 18


MCA 2014-2017 E-MAIL SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY

LEVEL 3.1

COLLEGE OF APPLIED SCIENCE VADAKKENCHERRY 19


MCA 2014-2017 E-MAIL SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY

LEVEL 3.1.1

COLLEGE OF APPLIED SCIENCE VADAKKENCHERRY 20


MCA 2014-2017 E-MAIL SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY

2.11 ER DIAGRAM

2.12 DATABASE DESIGN


The general theme behind a database is to handle information as an
integrated whole. A database is a collection of interrelated data stored
with minimum redundancy to serve many users quickly and efficiently.
The general objective is to make information access easy, quick,
inexpensive and flexible for the user. The concept behind a database is an
integrated collection of data and provides a centralized access to the data
from the program. While designing database, several objectives must be
considered:
 Data Independence

 Controlled Redundancy

 More information at low cost

 Accuracy and Integrity

 Privacy and Security.

COLLEGE OF APPLIED SCIENCE VADAKKENCHERRY 21


MCA 2014-2017 E-MAIL SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY

TABLES:

Registration

Field name Data type Description Constrains


Id Int Id of registration Primary key
Auto increment
Fname Varchar Firstname of user
mname Varchar middlename of user
Lname Varchar Lastname of user
address Varchar Address of user
Gender Varchar Gender of user
Dob Date Date of birth
State Varchar State of user
District Varchar District of user
Mobile Varchar Mobile number
question Varchar Question for
security purpose
answer Varchar Answer of security
question
Photo Varchar Profile path of user
username varchar Username of user
password varchar Password of user
active_status varchar Status of user

COLLEGE OF APPLIED SCIENCE VADAKKENCHERRY 22


MCA 2014-2017 E-MAIL SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY

Secure_mail
Field name Data type description Constrains
Id int Id of encrypted mail Primary key
Auto increment
sender_id varchar Id of sender
receiver_id varchar Id of receiver
subject varchar Subject of mail
content varchar Content of mail
Status varchar Status of mail
Time date Sending time of
mail

Normal mail
Field name Data type description Constrains
Id int Id of normal mail Primary key
Auto increment
Sender varchar name of sender
receiver varchar Name of receiver
subject varchar Subject of mail
attachement varchar Attachement files
message varchar Content of mail
Status varchar Status of mail
Time date Sending time of
mail

COLLEGE OF APPLIED SCIENCE VADAKKENCHERRY 23


MCA 2014-2017 E-MAIL SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY

complaints
Field name Data type description Constrains
Id Int Id of complaints Primary key
Auto increment
complainted_person Varchar Name of person
who complaint
abused_person Varchar Name of abused
person
subject Varchar Subject of
complaint
Details Varchar Content of
complaint
response Varchar Response of
abused_person

Draft
Field name Data type description Constrains
Id int Id of draft Primary key
Auto increment
Sender varchar name of sender
Receiver varchar Name of receiver
Subject varchar Subject of draft
message
Attachement varchar Attachement files
Message varchar Content of mail
Status varchar Status of mail
Time date Sending time of
mail

COLLEGE OF APPLIED SCIENCE VADAKKENCHERRY 24


MCA 2014-2017 E-MAIL SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY

Admin login

Field name Data type Description Constrains


Id int Id of admin_tb Primary key
Auto increment
User_name Varchar Username of admin
Password varchar Password of admin

COLLEGE OF APPLIED SCIENCE VADAKKENCHERRY 25


MCA 2014-2017 E-MAIL SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY

2.13 DESIGN SPECIFICATIONS


SOFTWARE REQUIREMENTS

Operating system : Windows 7

Database : MySQL

Platform : Java

HARDWARE REQUIREMENTS

Processor : Pentium III

Speed : 133 MHz

Memory : 128 MB RAM

Hard disk :4.1 GB

COLLEGE OF APPLIED SCIENCE VADAKKENCHERRY 26


MCA 2014-2017 E-MAIL SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY

TESTING
AND
IMPLEMENTATION

COLLEGE OF APPLIED SCIENCE VADAKKENCHERRY 27


MCA 2014-2017 E-MAIL SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY

System testing is the stage of implementation highly aimed at ensuring that the system
works accurately and efficiency before the live operation commences.
1 Testing is the process of executing a program with the intent of finding an
error.

2 A good test case is one that has high probability of finding a yet
undiscovered error.

3 A successful test is one that answers a yet undiscovered error.

3.1 METHODS ADOPTED FOR TESTING

Different types of testing are

1 Unit testing

2 Integrated testing

3 Validation testing

4 Output testing

3.1.1 Unit Testing


In this testing the testing of each module and the integration of the overall system is
done. Unit testing becomes verification efforts on the smallest unit of software in the
module. This is also known as ‘module testing’.

The modules of the system WebTop are tested separately. Smallest components of
the software i.e. module are tested here and was successful.

3.1.2 Integration Testing


Integrate testing is a systematic testing that can be done with sample data. The need
for the integrate test is to find the overall system performance. The process of combining
multiple modules systematically for conducting tests in order to find error in the interface
between modules is called integration testing. Integrating testing is done after successful
completion of unit testing in our project and was successful.

COLLEGE OF APPLIED SCIENCE VADAKKENCHERRY 28


MCA 2014-2017 E-MAIL SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY

3.1.3 Validation Testing


Validation testing can be defined as many, but a single definition is that validation
succeeds when the software functions in a manner that can be reasonable expected by the
customer. All fields in our project were validated.

3.1.4 Output Testing


After performing the validation testing the next step is output as the user about the
format required testing of the proposed system since no system could be useful if does not
produce the required out put in the specific format.

The output displayed or generated by the system under consideration. Here the output
format is considered in two ways. One is screen and the other is printed format. Our system
was tested and was successful.

3.2 TEST RESULT

The evaluation of quality of test cases is done through “test case review”. And for
any review, a formal document or work product is needed. This is the primary reason for
having the test case specification in the form of document.

The different test cases are:


 Guarantee that all independent parts within a module have been exercised at least
once.
 Exercise all logical decisions on their true /false side.
 Exercise all loops at their boundaries and within their operational bounds.
 Exercise internal data structure to ensure their validity.
 Each module was tested and the tested modules were linked and integration test was
carried out.

3.3 IMPLEMENTATION
The implementation phase of the software design consists of different tasks to be done
sequentially for obtaining the desired results. Here we do not implement parallel; instead
we first implement admin and then the user module. The different phases are:

COLLEGE OF APPLIED SCIENCE VADAKKENCHERRY 29


MCA 2014-2017 E-MAIL SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY

1. Creating the Database


A Database is created, in which all the tables are defined which are required to do the
different operations such as storage and retrieval of information. Databases are designed in
such a way it can handle the different database queries. User and admin can retrieve
required details from the system on clicking on the links and buttons.
2. Creating Graphical User Interface
Graphical User Interface is created in Visual Studio 2005 Express Edition under
.NET framework 2.0 for a user friendly interface. It is intended for two purposes. First is to
create a user friendly interface for the software. Having a good user interface makes it
easier for the user to use and understand the different functionalities of the software.
Secondly, the user interface hides the end users from the complexities in the working of the
software. So the user is made unaware of how a task is performed when he chooses to
perform it.
3. Creating System Environment:
For the intended project to work on, we need to implement its required hardware and
software requirements. This system is build using Visual Studio 2005 under .NET
framework and based on Windows Operating System. Memory and Hard disk should
confirm according to hardware requirements mentioned above.
4. Performing Functions
Initially we implement the admin module because the operation made in admin reflects in
the user module. After implementing this, we check whether all the operations and reports
are up to the specification. Only after ensuring this we go for user module. With the help of
a user-friendly visual interface, the end users can perform the desired operations. Upon
selecting any operation, the corresponding link commands will be passed to database and
the response is also received. The responses are then retrieved and displayed in screen.

COLLEGE OF APPLIED SCIENCE VADAKKENCHERRY 30


MCA 2014-2017 E-MAIL SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY

3.4 CONCLUSION
This project was successfully tested and implemented under various platforms of
windows XP and the above systemis found to be really beneficial for the concerned aspects.
Application developed is heuristic and secure.

3.5 BIBLIOGRAPHY
Xu Bo, Wang Jia-zhen, Peng De-yun, “Practical Protocol Steganography : Hiding
Data in IP Header” ,2007.
Miss D. D. DhobaJe Dr. V. R. Ghorpade Mr. B. S. Patjj Mrs. S. B. Patil
“Steganography By Hiding Data In Tcp/Ip Headers”,2010.
D. K. Kamran Ahsan. “Practical Data Hiding in TCP/IP”, Workshop on Multimedia
Security at ACM Multimedia, 2002.
Jain Ankit, “Steganography : A solution for data hiding”
Arvind Kumar Km. Pooja “Steganography- A Data Hiding Technique”,2010.
Steven J. Murdoch and Stephen Lewis , “Embedding Covert Channels into
TCP/IP”,2005.
RaduCiobanu, OvidiuTirsa, RalucaLupu, Sonia Stan, “Steganography and
Cryptography Over Network Protocols”,2011.
Vishal Bharti, ItuSnigdh “Practical Development and Deployment Of Covert
Communication In IPv4”.
Enrique Cauich, Roberto Gómez, Ryouske Watanabe “Data Hiding in Identification
and Offset IP fields”
ZHANG lie etc. "Information hiding in TCP/IP based on chaos". Journal on
Communication.voJ.26 NO. I A January Information

COLLEGE OF APPLIED SCIENCE VADAKKENCHERRY 31


MCA 2014-2017 E-MAIL SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY

SCREENSHOTS

COLLEGE OF APPLIED SCIENCE VADAKKENCHERRY 32


MCA 2014-2017 E-MAIL SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY

Before login

After login(The home page][inbox]

COLLEGE OF APPLIED SCIENCE VADAKKENCHERRY 33


MCA 2014-2017 E-MAIL SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY

Compose an encrypt message

2nd step of encrypting a message. Here, you can enter the compression ratio and encryption
key

COLLEGE OF APPLIED SCIENCE VADAKKENCHERRY 34


MCA 2014-2017 E-MAIL SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY

When the message sent successfully

Sending a normal mail

COLLEGE OF APPLIED SCIENCE VADAKKENCHERRY 35


MCA 2014-2017 E-MAIL SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY

View the details of normal mail

View the details of secure mail

COLLEGE OF APPLIED SCIENCE VADAKKENCHERRY 36


MCA 2014-2017 E-MAIL SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY

Enter the correct encryption key of mail

After enter the encryption key your message will be decrypt

COLLEGE OF APPLIED SCIENCE VADAKKENCHERRY 37


MCA 2014-2017 E-MAIL SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY

Sent mail

View of sent mail

COLLEGE OF APPLIED SCIENCE VADAKKENCHERRY 38


MCA 2014-2017 E-MAIL SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY

Draft message

View the details of message

COLLEGE OF APPLIED SCIENCE VADAKKENCHERRY 39


MCA 2014-2017 E-MAIL SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY

Trash message

All mails

COLLEGE OF APPLIED SCIENCE VADAKKENCHERRY 40


MCA 2014-2017 E-MAIL SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY

Settings of user

Profile change

COLLEGE OF APPLIED SCIENCE VADAKKENCHERRY 41


MCA 2014-2017 E-MAIL SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY

Selecting a image for profile pic

Change password

COLLEGE OF APPLIED SCIENCE VADAKKENCHERRY 42


MCA 2014-2017 E-MAIL SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY

After the updation of password

COLLEGE OF APPLIED SCIENCE VADAKKENCHERRY 43


MCA 2014-2017 E-MAIL SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY

Deactivation of account

Profile update

Register a complaint

COLLEGE OF APPLIED SCIENCE VADAKKENCHERRY 44


MCA 2014-2017 E-MAIL SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY

Searching a mail

COLLEGE OF APPLIED SCIENCE VADAKKENCHERRY 45


MCA 2014-2017 E-MAIL SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY

Login of admin

Home page of admin

COLLEGE OF APPLIED SCIENCE VADAKKENCHERRY 46


MCA 2014-2017 E-MAIL SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY

View all users

Block a user

COLLEGE OF APPLIED SCIENCE VADAKKENCHERRY 47


MCA 2014-2017 E-MAIL SECURITY USING CRYPTOGRAPHY AND STEGANOGRAPHY

View complaints

Deleting a complaint

COLLEGE OF APPLIED SCIENCE VADAKKENCHERRY 48

Potrebbero piacerti anche