Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
STUDY PHASE
11101001) .After inserting the binary value for A. (00100111 11101000 11001000)
(00100110 11001000 11101000) (11001000 00100111 11101001)
1.4.1 Advantage
By using this method, you can hide any information within an image and extract
them without much pain
No way to decrypt the embedded message without knowing the encryption key
This method provides an option to compress the output file. Thus the size of the
output file can be set to that of the original file. So an outsider cannot find whether
the image contains any data by checking the original file and encrypted file.
1.5FEASIBILITY STUDY
1.5.1 Technical feasibility
The system analyst evaluates the technical merits of the system giving emphasis on the
performance reliability, maintainability and productivity. Before developing the proposed
system, the recourse availability of the organization was studied. The organization has
immense computer facilities equipped with sophisticated machines and software. Technical
feasibility centers around the existing computer computers system and to what extend it can
support the proposed addition. The hardware resources required are Pentium 4 or above and
256 or above operating system required are Windows xp/vista or Linux. Since these
requirements are available with proposed system .it is technically feasible
the framework is given by java. As all these resources are easily available and some are free
software, the JMAIL system is economically feasible.
DESIGN PHASE
2.1SYSTEM DESIGN
After studying all features of existing manual procedures the new system was designed in
such a way that it can overcome all the difficulties of the existing system.
Designing is the process of translation of requirements defined during analysis into
several design activities for users considerations. Designers select equipment needed to
implement the system. in this phase, the designs of the database also take place. After
identifying the problem, limitations and opportunities to improve the efficiency and
effectiveness of the existing system, a detailed design of the proposed system is done. The
design phase is a transition from the user oriented document to a programmer oriented
document.
3. Assure timeliness
4. Choose effective output method
2.2 MODULARISATIONDETAILS
JMAIL provides facility to hide data within the file, before the end of the file. This is
efficient while transferring the image through the network
There are two users in this system
1. Admin
2. Normal user
1. Admin
Admin is the super user because they have all the controls of this system.
They can block, delete a user based on complaints.
2. Normal user
User can sends, receives mails. The special purpose of this system the user
can sends their mail with encryption .In this case receiver must be decrypt the
data with the encryption key.
1. MODULE 1: ENCRYPTION
In this module the message is encrypted and embedded in an image. For that a
master file is selected, which is an image. Then the output file is selected. The facility to
compress the output file is provided. After compressing the file the encryption key is
entered. Then the message isembedded in the master file.
2. MODULE 2: DECRYPTION
In this module the embedded message is extracted from the encrypted file. In order
to extract the message we have to enter the encryption key. If the entered key matches
the encryption key the message is extracted from the file and is displayed
In admin
1. Login
Admin must be login with their username and password for further actions.
We cannot login with invalid username and password and also cannot use any blank
username and password.
2. View all users
Admin can view all the users with their status. Your default status is active
when will u register with this system
user must be login with their username and password for further actions. We cannot
login with invalid username and password and also cannot use any blank username and
password. If a user in blocked state then they can’t login.
2. Registration
If you are a new user then you must register with this site. In register section you
must be select a question and give an answer for security purpose. If you forget your
password then this question will help you.
3. Compose a mail
You can compose your mail in two ways.
Compose a mail with encryption
Main with encryption means you can encrypt your message with an
encryption key and after you can hide it in an image. In this case your
message is more secure than normal message. The encryption key and msg
will embed in that image as your requirements.
Normal composing
You can send a mail in normal way. It means in this mailing the mail is less
secure. We can send amsg using this way when the message is less
important.
4. Inbox
You can view all the messages you received in your inbox. You can get both
secure and normal messages here. If you want to see your secure messages
the click the content image and you are redirected to a new page. In that page
there is textbox for enter your encryption key. After entering the correct
encryption key the code will decrypt the message and you can view the
message that hide in the image
5. Sent mail
User can view all sent mails here. Also they can delete their mails. If you want to delete
multiple mails then you can select using checkbox and delete it.
6. Draft
If u compose a mail and cancel it then that mail will save in your draft section. You
can see it there and resend it.
7. Trash
Your all deleted mail will be here. If you want to delete it permanently then you
should delete the mail from trash.
8. All mail
You can view your all mails here. In this section you can see the messages from sent,
inbox, draft etc.
9. Register complaint
If you want to register a complaint about a person or anything you can do it here.
This will send it to admin and admin will take an action based on your complaint.
And otherwise, you will blocked by admin based on complaint then you can respond
about that complaint
10. Settings
The user can set their own account. In this section they can change their password.
In password change they must give their old password for user verification. They can
deactivate their account using username and password. Also they can update their all
details except username and password in the section of update profile
11. Profile change
User can upload their new profile pic using file upload.
12. Search a mail
User can search the mail based on sender or receiver and content of the mail.
2.3.1 OBJECTS
Objects are the basic runtime entities in the object oriented system. They may
represent a person, a place, a bank account, a table of data etc. They may represent user
defined data such as vectors, time, and lists. Programming problem is analyzed in terms of
objects and the nature of the communication between them.
Object=Data + Process
Program objects should be chosen such that they may represent real time world
objects. Objects take up space in the memory and have associated address. When a
program is executed, the objects interact by sending messages to one another. Each object
contains data and code to manipulate the data. Objects interact depending on the type of
message accepted and the type of the response returned by the objects.
2.3.2CLASS
Class is defined as an abstract data type characterized by a set of properties
(attributes and functions) common to its objects. The class expresses the common features
and constitutes a means of classification. The entire set of data encode of an object can be
made a user defined data type with the help of a class. The objects are the variables of type
class. Once the class has been defined, we can create any number of objects belonging to
that class. Each object is associated with the data of type class with which they are created.
A class is thus a collection of objects of similar type.
NetBeans IDE provides first-class comprehensive support for the newest Java
technologies and latest Java enhancements before other IDEs. With its constantly improving
Java Editor, many rich features and an extensive range of tools, templates and samples,
NetBeans IDE sets the standard for developing with cutting edge technologies out of the
box.
The most important characteristics of Java are that was design from the outset to be
machine independent. Java programs can run unchanged on any operating system that
supports Java. An application written in Java will only require a single set of source code
regardless of the number of different computer platforms on which it is run. In any
programming languages the application will frequently require the source code to be tailored
to accommodate different environments particularly if there is an extensive GUI involved.
Java offers substantial saving in time and resources in developing supporting and
maintaining major applications on several different hardware platforms and operating
system. The next most important characteristics of Java is that it is object oriented. Object
oriented programs are easier to understand and less time consuming to maintain and extend
then program that have been returned without the benefit of using object. Java is currently
one of most programming languages in use, and is widely used from applications software
to applications.
The Java programming language is a high level languages that can be characterized
by all the following:
Simple
Object-Oriented
Distributed
Multi-threaded
Dynamic
Portable
Architecture Neutral
In Java programming language all source code is written in plain text files ending
with Java extension. Those source files then compiled into class files by the Javac
compiler. A. class file does not contain code that is native to your processer: it instead
contain byte codes- the machine language of Java Virtual Machine (JVM). The Java
launched tool then runs on your application with an instance of JVM. Because the JVM is
available on many different operating system, the same class files are capable of running on
Microsoft Windows, solaris OS.
Characteristics of Java
The target of Java is to write a program once and then run this program on multiple
operating systems.
Platform independent: Java programs use the Java virtual machine as abstraction and
do not access the operating system directly. This makes Java programs highly
portable. A Java program (which is standard complaint and follows certain rules)
can run unmodified on all supported platforms, e.g. Windows or Linux.
Object-orientated programming language: Except the primitive data types, all
elements in Java are objects.
Strongly-typed programming language: Java is strongly-typed, e.g. the types of the
used variables must be pre-defined and conversion to other objects is relatively
strict, e.g. must be done in most cases by the programmer.
Interpreted and compiled language: Java source code is transferred into the bytecode
format which does not depend on the target platform. These bytecode instructions
will be interpreted by the Java Virtual machine (JVM). The JVM contains a so
called Hotspot-Compiler which translates performance critical bytecode
instructions into native code instructions.
Automatic memory management: Java manages the memory allocation and de-
allocation for creating new objects. The program does not have direct access to the
memory. The so-called garbage collector deletes automatically objects to which no
active pointer exists.
Java Virtual Machine is the base of the Java platform and it is ported on to various
hardware based platform.
The API is a large collection of readymade software components that provide many
useful capabilities. It is grouped into libraries of related classes and interface ; these
libraries are known as packages. The API and JVM insulate the program from the
underlying hardware. As a platform independent environment a Java platform can be a bit
slower then native code.
2.7 JAVA VIRTUAL MACHINE
The Java Virtual Machine is responsible for the hardware and operating system-
independence of the J2ZE platform, the small size of compiled code (byte code) and
platform security. The Java virtual machine (JVM) is a software implementation of a
computer that executes programs like a real machine. The Java virtual machine is written
specifically for a specific operating system, e.g. for Linux a special implementation is
required as well as for Windows. Java programs are compiled by the Java compiler
into bytecode. The Java virtual machine interprets this bytecode and executes the Java
program.
2.8 MYSQL
MySQL is a database system used on the web. Basically, a MySQL database allows
you to create a relational database structure on a web-server somewhere in order to store
data or automate procedures. If you think of it in comparison to Microsoft Access, MySQL
is what holds all of your tables, PHP acts as your queries (among other things), and your
forms are basically web pages with fields in them. With all of this combined, you can
create truly spectacular projects on the web. A database most often contains one or more
tables. Each table is identified by a name (E.g. “Customer” or “Orders”). A table contains
record (rows) with data. With SQL we can query a database and have a result set returned.
SQL is the syntax for executing queries. But the SQL language also includes the syntax to
insert and delete records. These query and update commands together form the Data
Manipulation Language (DML) part of SQL. The Data Definition Language (DDL) part of
SQL permits database tables to be created or detected. We can also define indexes (keys),
specify links between tables and imposes constraints between databases.
Destination
Source /
Dataflow
Data store
Process
LEVEL 0
LEVEL 1
LEVEL 2
LEVEL 3
LEVEL 2.1
LEVEL 3.1
LEVEL 3.1.1
2.11 ER DIAGRAM
Controlled Redundancy
TABLES:
Registration
Secure_mail
Field name Data type description Constrains
Id int Id of encrypted mail Primary key
Auto increment
sender_id varchar Id of sender
receiver_id varchar Id of receiver
subject varchar Subject of mail
content varchar Content of mail
Status varchar Status of mail
Time date Sending time of
mail
Normal mail
Field name Data type description Constrains
Id int Id of normal mail Primary key
Auto increment
Sender varchar name of sender
receiver varchar Name of receiver
subject varchar Subject of mail
attachement varchar Attachement files
message varchar Content of mail
Status varchar Status of mail
Time date Sending time of
mail
complaints
Field name Data type description Constrains
Id Int Id of complaints Primary key
Auto increment
complainted_person Varchar Name of person
who complaint
abused_person Varchar Name of abused
person
subject Varchar Subject of
complaint
Details Varchar Content of
complaint
response Varchar Response of
abused_person
Draft
Field name Data type description Constrains
Id int Id of draft Primary key
Auto increment
Sender varchar name of sender
Receiver varchar Name of receiver
Subject varchar Subject of draft
message
Attachement varchar Attachement files
Message varchar Content of mail
Status varchar Status of mail
Time date Sending time of
mail
Admin login
Database : MySQL
Platform : Java
HARDWARE REQUIREMENTS
TESTING
AND
IMPLEMENTATION
System testing is the stage of implementation highly aimed at ensuring that the system
works accurately and efficiency before the live operation commences.
1 Testing is the process of executing a program with the intent of finding an
error.
2 A good test case is one that has high probability of finding a yet
undiscovered error.
1 Unit testing
2 Integrated testing
3 Validation testing
4 Output testing
The modules of the system WebTop are tested separately. Smallest components of
the software i.e. module are tested here and was successful.
The output displayed or generated by the system under consideration. Here the output
format is considered in two ways. One is screen and the other is printed format. Our system
was tested and was successful.
The evaluation of quality of test cases is done through “test case review”. And for
any review, a formal document or work product is needed. This is the primary reason for
having the test case specification in the form of document.
3.3 IMPLEMENTATION
The implementation phase of the software design consists of different tasks to be done
sequentially for obtaining the desired results. Here we do not implement parallel; instead
we first implement admin and then the user module. The different phases are:
3.4 CONCLUSION
This project was successfully tested and implemented under various platforms of
windows XP and the above systemis found to be really beneficial for the concerned aspects.
Application developed is heuristic and secure.
3.5 BIBLIOGRAPHY
Xu Bo, Wang Jia-zhen, Peng De-yun, “Practical Protocol Steganography : Hiding
Data in IP Header” ,2007.
Miss D. D. DhobaJe Dr. V. R. Ghorpade Mr. B. S. Patjj Mrs. S. B. Patil
“Steganography By Hiding Data In Tcp/Ip Headers”,2010.
D. K. Kamran Ahsan. “Practical Data Hiding in TCP/IP”, Workshop on Multimedia
Security at ACM Multimedia, 2002.
Jain Ankit, “Steganography : A solution for data hiding”
Arvind Kumar Km. Pooja “Steganography- A Data Hiding Technique”,2010.
Steven J. Murdoch and Stephen Lewis , “Embedding Covert Channels into
TCP/IP”,2005.
RaduCiobanu, OvidiuTirsa, RalucaLupu, Sonia Stan, “Steganography and
Cryptography Over Network Protocols”,2011.
Vishal Bharti, ItuSnigdh “Practical Development and Deployment Of Covert
Communication In IPv4”.
Enrique Cauich, Roberto Gómez, Ryouske Watanabe “Data Hiding in Identification
and Offset IP fields”
ZHANG lie etc. "Information hiding in TCP/IP based on chaos". Journal on
Communication.voJ.26 NO. I A January Information
SCREENSHOTS
Before login
2nd step of encrypting a message. Here, you can enter the compression ratio and encryption
key
Sent mail
Draft message
Trash message
All mails
Settings of user
Profile change
Change password
Deactivation of account
Profile update
Register a complaint
Searching a mail
Login of admin
Block a user
View complaints
Deleting a complaint