Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: Secure Data Transmission through Network Using Cryptography and Steganography report
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Secure Data Transmission through Network Using Cryptography and Steganography

[attachment=45224]

ORGANISATION PROFILE

Geome Tech


GEOME TECH is one of the Software Companies that is housing projects for Indian and United States based organizations. It has been established in 1999 and since then it did so many projects for the Indian and United States organizations.
It has been working on different Software platforms like MAINFRAMES, J2EE, .NET and Testing Tools, technologies and currently handling so many projects deploying Software Engineers and Software Trainees.
The IT services provided by this Institution are enormous. The services provided by this institution include Applications Software Packages, System Software, Database Systems, Distributed databases, Networking, Electronic Mail, EDI, Access to International Databases, CAD, Geographic Information Systems, Modeling, Expert Systems, Telemetric Software, Office Automation, Text base Management Systems.
It has developed extensive expertise in integrating IT-based systems with the working of user organizations. Now it is going to establish it’s sub branches in many states all over India. It has merged as an agent of change in the user organizations by providing extensive training facilities to train and re-train large number of people from these organizations. The training methodology includes the use of state-of-art training tools such as Computer Based Tutors and Multimedia Systems.

INTRODUCTION

The project titled “Secure Data Transmission through Network Using Cryptography and Steganography” is mainly designed for providing security during transmission of data across the network. In this the sender encrypts the data in to some form by using “Tiny Encryption Algorithm”. This algorithm has been used because it requires less memory. It uses only simple operations, therefore it is easy to implement.
While encrypting the data in to some form, the key file is entered by the sender. The purpose of the key file is to provide security to the system as it is known only to the sender and the receiver. The encrypted data will embed with a video file by using the concept of steganography. By using the Input/Output packages the steganography will read the video file and encrypted data and takes whole it as a video file. So whenever the hacker tries to open the file, only video file is visible to them. Then this video file is sent to the network.
The receiver will receive the video file from the network. Then the receiver will de-embed the encrypted data from the video file. The application of decryption is only done when the receiver of the data enters the proper key. Thus the data is transferred from sender to receiver in a secured manner.

Problem Definition

Present day transactions are considered to be "un-trusted" in terms of security, i.e. they are relatively easy to be hacked. And also we have to consider the large amount of data through the network will give errors while transferring. Nevertheless, sensitive data transfer is to be carried out even if there is lack of an alternative. Network security in the existing system is the motivation factor for a new system with higher-level security standards for the information exchange.

ANALYSIS

Existing System


In the traditional architecture there existed only the server and the client. In most cases the server was only a data base server that can only offer data. Therefore majority of the business logic had to be placed on the clients system. This makes maintenance expensive. This also means that every client has to be trained as to how to use the application and even the security in the communication is also the factor to be considered.
Since the actual processing of the data takes place on the remote client the data has to be transported over the network, which requires a secured format of the transfer method. Present day transactions are considered to be "un-trusted" in terms of security, i.e. they are relatively easy to be hacked. And also we have to consider the transfer the large amount of data through the network will give errors while transferring. Nevertheless, sensitive data transfer is to be carried out even if there is lack of an alternative. Network security in the existing system is the motivation factor for a new system with higher-level security standards for the information exchange.

Proposed System

The proposed system should have the following features. The transactions should take place in a secured format between various clients in the network. It provides flexibility to the user to transfer the data through the network very easily. It should also identify the user and provide the communication according to the prescribed level of security with transfer of the file requested and run the required process at the server if necessary. In this system the data will be sending through the network as a video file. The user who received the file will do the operations like de embedding, and decryption in their level of hierarchy.

Technical Analysis

People for long time have tried to sort out the problems faced in the general digital communication system but as these problems exist even now, a secured and easy transfer system evolved and came to be known as the Encryption and Decryption of the data and converting the file to video format to be transferred using the cryptographic standards and Steganography. The advantages of Secure Data Transmission through Network are:
• High level Security
• Cost effective transfer
In this fast growing world where every individual free to access the information on the network and even the people are technically sound enough in hacking the information from the network for various reasons. The organizations have the process of information transfer in and out of their network at various levels, which need the process to be in a secured format for the organizational benefits.
If the organizations have these Systems, then each employee can send the information to any other registered employee and thus can establish communication and perform the prescribed tasks in secured fashion. The video file that the employee sends reaches the destinations within no time in a video file format where the end user need to de embed the file, decrypt it and use for the purpose. The various branches of the organization can be connected to a single host server and then an employee of one branch can send files to the employee of another branch through the server but in a secured format.

System Design

Introduction


The System Design includes the maintenance of the secure file transfer service with a prescribed encryption format and split at the interested level of encryption, and embed process and the receiving service at the other end with de-embed and decryption process. The design also includes the provision of facility to the user to manipulate the concerned information according to his personal use and communication process. The design of our system, basically involve the interface architecture, Security services, and communication system.
In the interface design we involve with the design of the user interface with GUI standards and a proper navigation system where the user need to enter into the flow of transactions authorization services are check and further access is provided into the system. Then the user needs to select into the operations provided through the GUI where encryption, embedding, de-embedding, Decryption, and sending of the file, General Information are provided.
Here the Encryption and decryption and services are provided connecting to the security services module where the encryption and decryption are carried out using the cryptographic standards implementing the Tiny algorithm. After decryption process is completed the user is selecting the file for encryption. After encryption, the file is completed the user is to select the file for embedding it to the video file and sending through the network to the desired user by specifying the targeted users system IP address in the panel designed. Then the system gets connected to the targeted user and delivers the file in video format after which the user working with the software should go for the option De-Embed Files and decrypt the file by selecting the file path by which the file gets decrypted the file and is viewed on the system.

Overview

The most important and criteria phase in the software life cycle is the design phase. The design process involves developing of the conceptual view of the system, establishing the system structures, identifying data stores, decomposition high level functions into sub functions, establishing connections between individual programs, interconnecting among components and developing concrete data representation.
This is the step while developing any product after analysis. The goal from this is to produce a model of the entities involved in the project which later need to be built. The representations of the entities that are to be used in the product being developed need to be designed.

Software Overview

About Java


Initially the language was called as “oak” but it was renamed as “Java” in 1995. The primary motivation of this language was the need for a platform-independent language that could be used to create software to be embedded in various consumer electronic devices.
Java is a programmer’s language.
Java is cohesive and consistent.
Except for those constraints imposed by the Internet environment, Java gives the programmer, full control.
Finally, Java is to Internet programming where C was to system programming.

Applications and Applets

An application is a program that runs on our Computer under the operating system of that computer. It is more or less like one creating using C or C++. Java’s ability to create Applets makes it important. An Applet is an application designed, to be transmitted over the Internet and executed by a Java –compatible web browser. An applet is actually a tiny Java program, dynamically downloaded across the network, just like an image. But the difference is, it is an intelligent program, not just a media file. It can react to the user input and dynamically change.