0% found this document useful (0 votes)
63 views

ARS Chaotic Image Encription and Decription Using Java

IMAGE ENCRYPTION AND DECRYPTION USING AES ALGORITHM.........................................

Uploaded by

Rohit Pingale
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views

ARS Chaotic Image Encription and Decription Using Java

IMAGE ENCRYPTION AND DECRYPTION USING AES ALGORITHM.........................................

Uploaded by

Rohit Pingale
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 57

A

Major Project Report


on

IMAGE ENCRYPTION AND


DECRYPTION USING AES ALGORITHM
Submitted in Partial Fulfillment of
the Requirements for the Degree
of

Bachelor of Engineering
in

Computer Engineering
to

Kavayitri Bahinabai Chaudhari


North Maharashtra University, Jalgaon
Submitted by
Surwade Aniket Ramchandra
Chikhlodkar Ajinkya Shrikant
Toradmal Vaibhav Chhagan
Pingale Rohit Rajendra
Under the Guidance of

Mr.Sandip S. Patil

DEPARTMENT OF COMPUTER ENGINEERING


SSBT’s COLLEGE OF ENGINEERING AND TECHNOLOGY,
BAMBHORI, JALGAON - 425 001 (MS)
2022 - 2023
SSBT’s COLLEGE OF ENGINEERING AND TECHNOLOGY,
BAMBHORI, JALGAON - 425 001 (MS)
DEPARTMENT OF COMPUTER ENGINEERING

CERTIFICATE

This is to certify that the major project stage-1 entitled IMAGE ENCRYPTION
AND DECRYPTION USING AES ALGORITHM, submitted by

Surwade Aniket Ramchandra


Chikhlodkar Ajinkya Shrikant
Toradmal Vaibhav Chhagan
Pingale Rohit Rajendra

in partial fulfillment of the Degree of Bachelor of Engineering in Computer Engineer-


ing has been satisfactorily carried out under my guidance as per the requirement of
Kavayitri Bahinabai Chaudhari North Maharashtra University, Jalgaon.

Date: April 13, 2023


Place: Jalgaon

Mr.Sandip S. Patil
Guide

Dr.Manoj E. Patil Prof. Dr. G.K.Patnaik


Head Principal

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) i


Acknowledgements

We would like to express our deep gratitude and sincere thanks to all who helped us in
completing this project report successfully. Many thanks to the almighty God who gave
us the strength to do this. Our sincere thanks to Principal Prof. Dr. Girish. K. Patnaik
for providing the facilities to complete this Project report. We would like to express our
gratitude and appreciation to all those who gave us the possibility to complete this report.
A special thanks to Prof. Dr. Manoj Patil Sir, Head of the Department, whose help and
stimulating suggestions, and encouragement, helped us in writing this report. We would also
like to thank Mr. Sandip P. Patil, Project Guide, who has given his/her full effort in guiding
us and achieving the goal as well as his encouragement to maintain the progress on track.
I am also sincerely thankful to Mr. Akash D. Waghmare, In-charge the of Project, for his
valuable suggestions and guidance. We would also like to appreciate the guidance given by
other supervisors that have improved our presentation skills through their comments and
tips. Last but not the least, we are extremely thankful to our parents and friends without
whom it could not reach its successful completion.

Surwade Aniket Ramchandra


Chikhlodkar Ajinkya Shrikant
Toradmal Vaibhav Chhagan
Pingale Rohit Rajendra

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) ii


Contents

Acknowledgements ii

Abstract 1

1 INTRODUCTION 2
1.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.1.1 History of Cryptography . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.2 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.3 Problem Defination . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.4 Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.5 Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.6 Selection of life cycle model . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.7 Organization of Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.8 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

2 PROJECT PLANNING AND MANAGEMENT 10


2.1 Feasibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
2.1.1 Technical Feasibility . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.1.2 Operational Feasibilty . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.1.3 Economic Feasibilty . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.2 Risk Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.3 Project Scheduling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.4 Effort Allocation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.5 Cost Estimation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
2.6 Cocomo Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
2.7 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

3 ANALYSIS 16
3.1 Requirement Collection And Identification . . . . . . . . . . . . . . . . . . . 16
3.2 Software Requirement Specification (SRS) . . . . . . . . . . . . . . . . . . . 16
3.3 Functional and Non Functional Requirements . . . . . . . . . . . . . . . . . 19

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) iii


3.3.1 Functional Requirements . . . . . . . . . . . . . . . . . . . . . . . . . 19
3.3.2 Non-functional Requirements . . . . . . . . . . . . . . . . . . . . . . 19
3.4 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20

4 Design 21
4.1 System Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
4.2 Data Flow Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
4.2.1 Context Level DFD- 0 level . . . . . . . . . . . . . . . . . . . . . . . 23
4.2.2 Level of 1 DFD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
4.2.3 Level of 2 DFD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
4.2.4 Level of 3 DFD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
4.2.5 Level of 4 DFD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
4.3 UML Diagrams . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
4.3.1 Use Case Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
4.3.2 Sequence Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
4.3.3 Collaboration Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . 29
4.3.4 Class Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
4.3.5 State Transition Diagram . . . . . . . . . . . . . . . . . . . . . . . . 31
4.3.6 Component Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
4.3.7 Deployment Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . 33

5 Implementation 35
5.1 Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
5.2 Flow Of System Development . . . . . . . . . . . . . . . . . . . . . . . . . . 35
5.2.1 Home Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
5.2.2 Encryption Decryption Page . . . . . . . . . . . . . . . . . . . . . . 36
5.2.3 Original image Page . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
5.2.4 Encrypted Decrypted Image Page . . . . . . . . . . . . . . . . . . . 37
5.3 Software and Hardware for development in detail . . . . . . . . . . . . . . . 37
5.3.1 Implementation Environment . . . . . . . . . . . . . . . . . . . . . . 38
5.4 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39

6 System Testing 40
6.1 Test cases and Test Results . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
6.2 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41

7 Result Analysis 42
7.1 Actual Output Of The Project . . . . . . . . . . . . . . . . . . . . . . . . . . 42
7.2 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) iv


8 Conclusion 46

Bibliography 47

Index 48

Appendix A 49

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) v


List of Tables

2.3 Project Scheduling...................................................................................11


2.4 Effort Allocation................................. ...................................................12
2.6 cocomo model.........................................................................................13

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) vi


List of Figures

1.1 selection of life cycle model. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7


4.1 Architecture Diagram . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
4.2.1 1Level 0 DFD. . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . .. . . . .23
4.2.2 Level of 1 DFD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
4.2.3 Level of 2 DFD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
4.3.1 Use Case Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
4.3.2 Sequence Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
4.3.3 Collaboration Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30
4.3.4 Class Diagram.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31
4.3.5 State Transition Diagram.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
4.3.6 Component Diagram. .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
4.3.7 Deployment Diagram. .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) vii


Abstract

An Image Encryption and Decryption Using AES (Advance Encryption Standard) Algorithm
is proposed in the project. Due to increasing use of image in various field, it is very important
to protect the confidential image data from unauthorized access. The design uses the iterative
approach with block size of 128 bit and key size of 128, 192 or 256 bit. The numbers of round
for key size of 256 bits is 14, for 128 bits is 10 and for 192 bits is 12. As secret key increases the
security as well as complexity of the cryptography algorithms. In this report , an algorithm
in which the image is an input to AES Encryption to get the encrypted image and then
input it to AES Decryption to get the original image is proposed and explained which will
further be implemented by me. The report shows the study in which a system could be used
for effective image data encryption and key generation in diversified application areas, where
sensitive and confidential data needs to be transmitted along with the image.

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 1


Chapter 1

INTRODUCTION

The Internet is the fastest growing communication medium and essential part of the infras-
tructure, nowadays. To cope with the growth of internet it has become a constant struggle
to keep the secrecy of information and when profits are involved, protect the copyright of
data. To provide secrecy and copyright of data, many of the steganographic techniques have
been developed. But each of the technique has their respective pros and cons. Where one
technique lacks in payload capacity, the other lacks in robustness. So, the main emphasis of
cryptography is to overcome these shortcomings.

1.1 Background
Computer has become an essential device now a days. The main use of computer is to
store data and send it from one location to other. The information that is shared must
be transferred in a secured manner. To ensure secured transmission of information, data is
encrypted to unreadable formats by an unauthorized person. Cryptography is the science of
information security which has become a very critical aspect of modern computing systems
towards secured data transmission and storage. The exchange of digital data in cryptography
results in different algorithms that can be classified into two cryptographic mechanisms:
symmetric key in which same key is used for encryption and decryption and asymmetric key
in which different keys are used for encryption and decryption. Images are broadly used in
numerous processes. As a result, the safety of image data from unauthorized access is crucial
at the hands of user. Image encryption plays a significant role in the field of information
hiding. Image hiding or encryption methods and algorithms ranges from simple spatial
domain methods to more complicated and reliable frequency domain. Image Encryption
Using Rubik’s Cube Based Algorithm is the process to transform the image securely so that
no unauthorized user can be able to decrypt the image. Image encryption have applications
in many fields including the internet communication, transmission, medical imaging etc.
First, in order to scramble the pixels of gray-scale original image, the principle of Rubik’s

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 2


cube is deployed which only changes the position of the pixels. Using two random secret
keys, the bitwise XOR is applied into the rows and columns. These steps can be repeated
until the number of iterations is not reached. Numerical simulation has been performed to
test the validity and the security of the proposed encryption algorithm.

1.1.1 History of Cryptography


Human being from ages had two inherent needs (a) to communicate and share information
and (b) to communicate selectively. These two needs gave rise to the art of coding the
messages in such a way that only the intended people could have access to the information.
Unauthorized people could not extract any information, even if the scrambled messages fell
in their hand.
The art and science of concealing the messages to introduce secrecy in information secu-
rity is recognized as cryptography.
The word ‘cryptography’ was coined by combining two Greek words, ‘Krypto’ meaning
hidden and ‘graphene’ meaning writing.
The art of cryptography is considered to be born along with the art of writing. As
civilizations evolved, human beings got organized in tribes, groups, and kingdoms. This
led to the emergence of ideas such as power, battles, supremacy, and politics. These ideas
further fueled the natural need of people to communicate secretly with selective recipient
which in turn ensured the continuous evolution of cryptography as well.
The roots of cryptography are found in Roman and Egyptian civilizations.

1.2 Motivation
• Hieroglyph The Oldest Cryptographic Technique:- The first known evidence
of cryptography can be traced to the use of ‘hieroglyph’. Some 4000 years ago, the
Egyptians used to communicate by messages written in hieroglyph. This code was the
secret known only to the scribes who used to transmit messages on behalf of the kings.
One such hieroglyph is shown below.

fig 1.1Hieroglyph The Oldest Cryptographic Technique

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 3


Later, the scholars moved on to using simple mono-alphabetic substitution ciphers dur-
ing 500 to 600 BC. This involved replacing alphabets of message with other alphabets
with some secret rule. This rule became a key to retrieve the message back from the
garbled message. The earlier Roman method of cryptography, popularly known as the
Caesar Shift Cipher, relies on shifting the letters of a message by an agreed number
(three was a common choice), the recipient of this message would then shift the letters
back by the same number and obtain the original message.

fig 1.2 Roman method of cryptography

Steganography:- Steganography is similar but adds another dimension to Cryptog-


raphy. In this method, people not only want to protect the secrecy of an information
by concealing it, but they also want to make sure any unauthorized person gets no
evidence that the information even exists. For example, invisible watermarking.
In steganography, an unintended recipient or an intruder is unaware of the fact that
observed data contains hidden information. In cryptography, an intruder is normally
aware that data is being communicated, because they can see the coded/scrambled
message.

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 4


fig 1.3 Steganography Cryptography

Evolution of Cryptography:- It is during and after the European Renaissance,


various Italian and Papal states led the rapid proliferation of cryptographic techniques.
Various analysis and attack techniques were researched in this era to break the secret
codes.
Improved coding techniques such as Vigenere Coding came into existence in the 15th
century, which offered moving letters in the message with a number of variable places
instead of moving them the same number of places.
Only after the 19th century, cryptography evolved from the ad hoc approaches to
encryption to the more sophisticated art and science of information security.
In the early 20th century, the invention of mechanical and electromechanical machines,
such as the Enigma rotor machine, provided more advanced and efficient means of
coding the information.
During the period of World War II, both cryptography and cryptanalysis became ex-
cessively mathematical.
With the advances taking place in this field, government organizations, military units,
and some corporate houses started adopting the applications of cryptography. They
used cryptography to guard their secrets from others. Now, the arrival of computers
and the Internet has brought effective cryptography within the reach of common people.

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 5


1.3 Problem Defination
Information Security is the most common word uttered by any man, any device or any
peripheral since past two centuries. Protection from malicious sources has become a part of
the invention or the discovery cycle. Myriad methods of protection are used ranging from a
simple authentication password to most complex Cryptography. The advancements of digital
revolution were not achieved without drawbacks such as illegal copying and distribution of
digital multimedia documents. In order to provide data security and protection, different
encryption methods must be used.

1.4 Scope
1. No one would argue that cryptography and encryption are new technologies. It was
true decades ago and it is still true today – encryption is the most reliable way to
secure data. National security agencies and major financial institutions have long
protected their sensitive data using cryptography and encryption. Today the use of
encryption is growing rapidly, being deployed in a much wider set of industry sectors
and across an increasing range of applications and platforms. Put simply, cryptography
and encryption have become one of the hottest technologies in the IT security industry
– the challenge now is to ensure that IT organizations are equipped to handle this shift
and are laying the groundwork today to satisfy their future needs.

2. In today’s world the protection of sensitive data is one of the most critical concerns for
organizations and their customers. This, coupled with growing regulatory pressures, is
forcing businesses to protect the integrity, privacy and security of critical information.
As a result cryptography is emerging as the foundation for enterprise data security and
compliance, and quickly becoming the foundation of security best practice. Cryptog-
raphy, once seen as a specialized, esoteric discipline of information security, is finally
coming of age.

1.5 Objectives
There are four main goals in cryptography: confidentiality, integrity, authentication, and
non-repudiation Read the section on the goals of cryptography to understand each concept.
All the encryption algorithms make use of two general principles; substitution and transposi-
tion through which plaintext elements are rearranged. Important thing is that no information
should be lost. The objective of any image encryption method is to obtain a top quality
hidden image in order to keep information secret. In this paper, the procedures and schemes

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 6


of different image encryption techniques that provide privacy and security are reviewed. The
purpose of encryption is confidentiality—concealing the content of the message by translat-
ing it into a code. The purpose of digital signatures is integrity and authenticity—verifying
the sender of a message and indicating that the content has not been changed. What are the
objective of encryption and decryption? Encryption is the process of translating plain text
data (plaintext) into something that appears to be random and meaningless (ciphertext).
Decryption is the process of converting ciphertext back to plaintext. To encrypt more than
a small amount of data, symmetric encryption is used.

1.6 Selection of life cycle model


LINEAR SEQUENTIAL MODEL / WATERFALL MODEL: This model suggests a sys-
tematic, sequential approach to software development that begins at the system level and
progress through analysis, design, coding, testing and support.The figure below shows the
waterfall model for software engineering.

fig 1.4 LINEAR SEQUENTIAL MODEL

1. System/information engineering and modeling:


As software is always a part of a larger system, work establishing requirements
for all system elements and then allocating some subset of these requirements to
software. System engineering and analysis encompass requirements gathering at
the system level with a small amount of top-level design and analysis. Information
engineering encompasses requirements gathering at the strategic business level and
at the business area level.
2. Software requirements analysis:
The requirements gathering process is intensified and focused specifically on soft-
ware. To understand the nature of the program to be built, the software engineer

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 7


must understand the information domain for the software as well as required func-
tion behavior performance and interface. Requirements for both the software are
documented and reviewed with the customer.
3. Design:
Software design is actually a multi-step process that focuses on four distinct at-
tributes of a program: data structure, software architecture, interfaces represen-
tation a procedural detail. The design process translates requirements into a
representation of the software that can be accessed for quality before coding be-
gins. Like requirements, the design is documented and becomes a part of the
software configuration.
4. Code generation:
The design must be translated into a machine-readable form. The code generation
step performs this task. If the design is performed in a detailed manner, code
generation can be performed mechanically.
5. Testing:
Once he code has been generated, program testing begins. The process focuses on
the logical internals of software, ensuring that all statements have been tested and
on the functional externals, that is conducting tests to uncover errors and ensure
that defined input will produce actual results that agree with required results.
6. Support:
Software will undergo changes after it is delivered to the customer. Software
support/maintenance reapplies each of the preceding phases to an existing pro-
gram rather than a new one. As the linear sequential model is the oldest and
the most widely used paradigm for software engineering, and can be used effi-
ciently for small projects that require less customer communication, it has been
in development of data security project.

1.7 Organization of Report


The section provide overall layout of the manor project report on the topic CHAOTIC
IMAGE ENCRYPTION AND DECRYPTION USING JAVA for providing security to Image
on social media. Organization of the report contains the Introduction, System Analysis,
System Design, System Requirements and Analysis etc.of the project.

1. Introduction chapter no 1.

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 8


2. Introduce the concept, it focus exactly on what is the meaning of the project and
explain what is actually the working of the the project.All ideas about the project are
cleared. System Analysis chapter no 2.

3. Shows overall analysis of the system ,description of the system, meaning of the system.
In the Addition to that literature survey , Proposed system and feasibility study , are
also described in the chapter. Various system requirements are elaborated in system
requirement specification chapter no 3 .

4. Study of various system designs like ER diagrams, DFD’s and UML diagrams is also
done in the system design chapter no 4.

5. Chapter no 5 conclusion,In this chapter overall conclusion of the project discussed .

1.8 Summary
In this chapter , a brief insight about the CHAOTIC IMAGE ENCRYPTION AND DE-
CRYPTION USING JAVA for security for image on social network, motivation to develop,
the portal the defination of problem,scope of the solution. its objectives, the software pro-
cess model used. Organization and summary are presented. In the next chapter ,project
planning and management is presented.

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 9


Chapter 2

PROJECT PLANNING AND


MANAGEMENT

In every work, proper planning and management is required for carrying out the execution
of any project. Also, the requirement analysis is being done to plan the overall management
of project. Better planning and management helps to understand the project in better ways.
In this chapter, you will see the feasibility study of the project work in Section

1. In Section

2. Scheduling of the project is described, Effort and Cost Estimation is presented in


Section

3. Also, Summary is in the Section

2.1 Feasibility
A feasibility study aims to objectively and rationally uncover the strengths and weaknesses
of an existing business or proposed venture, opportunities and threats present in the natural
environment, A feasibility study is an assessment of the practicality of a proposed project
or system.the resources required to carry through, and ultimately the prospects for success.
In its simplest terms, the two criteria to judge feasibility are cost required and value to
be attained.A well-designed feasibility study should provide a historical background of the
business . Generally, feasibility studies precede technical development and project implemen-
tation. A feasibility study evaluates the project’s potential for success; therefore, perceived
objectivity is an important factor in the credibility of the study for potential investors and
lending institutions. It must therefore be conducted with an objective, unbiased approach
to provide information upon which decisions can be based. Taking into consideration the
technical, operational and economic feasiabilities as below, the project can be anticipated

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 10


as feasible overall. There are few types of feasibility that exists. So, developers should take
care of these feasibility and take them into consideration.

2.1.1 Technical Feasibility


This assessment is based on an outline design of system requirements, to determine whether
the company has the technical expertise to handle completion of the project. At this level, the
concern is whether the proposal is both technically and legally feasible (assuming moderate
cost). It is an evaluation f the hardware and software and how it meets the need of the
proposed system. This portal is developed using web development technologies such as
JAVA,JDBC,JSP,SERVLET,ORACLE. All the required hardware and software are easily
available in the market. Hence the portal is technically feasible.

2.1.2 Operational Feasibilty


Operational feasibility is the measure of how well a proposed system solves the problems, and
takes advantage of the opportunities identified during scope definition and how it satisfies
the requirements identified in the requirements analysis phase of system development. The
operational feasibility assessment focuses on the degree to which the proposed development
project fits in with the existing health environment and objectives with regard to develop-
ment schedule, and diagnosis of patients.corporate culture and existing business processes.
The portal is operationally feasible due to some reasons.The user is satisfied as all the infor-
mation regarding all the common disease and their Good doctor for diagnosis is available at
one portal itself.

2.1.3 Economic Feasibilty


Describes how much time is available to build the new system, when it can be built, whether
it interferes with normal business operations, type and amount of resources required, depen-
dencies, and developmental procedures with company revenue prospectus. As the necessary
hardware and the software are easily available in the market at low cost, the initial investment
is the only cost incurred and does not need further enhancement. Hence it is economically
feasible

2.2 Risk Analysis


Risk analysis and management are a series of steps that help a software team to under-
stand and manage uncertainty. Many problems can plague a software project. A risk is
a potential problem it might happen, it might not. But, regardless of the outcome, it ’sa

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 11


really good idea to identify it,assess its probability of occurrence, estimate its impact, and
establish a contingency plan should the problem actually occur. Everyone involved in the
software process managers, software engineers, and customers participate in risk analysis
and management. Before embarking on the project it is necessary to review all of the risks
that might be involved in it. These risks have been documented before the coding of the
project started. The majority of the risk components lie under the categories.

• Dependencies

• Requirement Issue

• Management Issues

• Lack of Knowledge

• Other Risk Categories

• Dependencies

1. Poor Server Efficiency.


2. Security for Product and data.
3. Availability of experience technicians.

• Reqirement Issue

1. Uncertain of appointments.
2. Undefined or unclear requirements.
3. Inaccurate Project estimation.

• Management Issues

1. Mismanagement to include all experiences.


2. Wrong approach towards further plans.
3. In adequate planning and task identification.
4. Poor Communication.
5. Resiliency of developers and technicians.

• Lack of knowledge

1. Complications In the development of product.

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 12


2. Incompetence of developers.
3. Poor understanding of tools and techniques.
4. New methods and technologies.

• Others Risk Categories

1. If large number of patient appointments occurs in a single day then there is lack
of medical students. That time there is chance of providing health facility takes
much time.

2.3 Project Scheduling


Generally, project scheduling can be stated as the estimated time required for any project
from its time of beginning to the end of the project. In detail, for every task, there is a
deadline because all the tasks for the completion of project are planned earlier. So that,
each task is scheduled to certain time limit. In short, in project management, listing of
projects milestones, activities and all from starting to end date, are considered in the project
scheduling. A schedule is generally used in the project planning and management of the
project with some kind of attributes as budget, task allocation and
Sr no Task Starting Date Days to complete
1 Feasibility task 28-08-22 22
2 Requirement analysis 20-09-22 18
3 Design 07-10-22 15
4 Coding 22/10/22 65
5 Integration 27/01/23 35
6 Testing 03/03/23 17
7 Maintenance 20/03/23 11

2.4 Effort Allocation


Identification of project, requirements gathering and study of existing system accounts is
10 percent of effort. 15 percent of effort is normally applied to data modeling and cod-
ing. Identification of functional and non-functional requirements, testing result by using
some test cases take 5percent of project effort. Designing requires 30 percent of effort.

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 13


Modules Rohit Ajinkya Vaibhav Aniket
Gathering of information * * *
Planning Requirement Analysis * * * *
Study of included stack and framework * *
Selection of life cycle Model * * * *
Planning and Management * * * *
Analysis Design UML * *

2.5 Cost Estimation


Effective software project estimation is one of the challenging and important activities in
software development. Proper project planning and control is not possible without sound
and reliable estimate. The four basic steps in software project estimation are: a. Estimate
the size of development product. The units of measure are lines of code (LOC) and function
point (FP). b. Estimate the effort in person-months or person-hours. c. Estimate the
schedule in calendar months. d. Estimate the project cost in rupees. Estimated Cost For
Development This system comes under Object Oriented approach, because .JS is used which
is an object oriented language and also it is used as the front end.

• Total number of persons working on project 4 persons

• Time taken in months 8 months

• Total time allotted per day in terms of hour 3hrs

• Actual working hours (150*3hours)=450hrs

2.6 Cocomo Model


Cocomo (Constructive Cost Model) is a regression model based on LOC, i.e number of Lines
of Code. It is a procedural cost estimate model for software projects and often used as a
process of reliably predicting the various parameters associatedwith making a project such
as size, effort, cost, time and quality. It was proposed byBarry Boehm in 1970 and is based
on the study of 63 projects, which make it one ofthe best-documented models. This Model
include three modes of software development project that dependson complexity

• Basic Cocomo Model : The effort equation is as follows :


E=a*(KLOC)b
D = C ∗ (E)d

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 14


Where:
E=Effort applied by per person per month
D=development time in consecutive months
KLOC=estimated thousands of lines of code delivered for the project

Organic Model It belongs to small and simple software projects which are handled by
a small team with good domain knowledge and few rigid requirements.
E=a(KLOC)b

Software Project ab bb cb db
Organic 2.4 1.05 2.5 0.38
Semidetached 3.0 1.12 2.5 0.35
Embedded 3.6 1.20 2.5 0.32

• E=2.4(5000)1.05=6.62(Efforts)

• D=c(E)d

• D=2.5(6.62)0.38= 5 Months

2.7 Summary
In this chapter, project planning and management is described in Details. Analysis of the
project is represented in the next chapter

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 15


Chapter 3

ANALYSIS

Proposed system provides a solution to existing system by extending its facilities. The
proposed study aims to explore the possibility of using chaotic or chaos-based encryption
techniques to protect remote sensing satellite images and provides high level of security
in efficient and reliable way. Chaos based crypto- graphic scheme provides high security
level, less computational time and power in reliable and efficient way to deal with balky,
difficult and intractable data that why many researchers recommends that it is more suitable
for multimedia data, especially for images. Chaos-based system have many properties to
achieve high security level, such as sensitivity to change initial conditions and parameters,
periodicity (a system that tends in probability to a limiting form that is independent of the
initial conditions), random behavior and unstable periodic orbits with long periods. It has
very high diffusion and confusion properties that are desirable for crypto-system.

3.1 Requirement Collection And Identification


• It has very high diffusion and confusion properties that are desirable for cryp-
tosystem.
• Encrypting and Decrypting of the image is very easy.
• Sending or transferring the image via the network is easier, just to start server
class at receiver side.
• By entering the key with which the key was encrypted we can get the original
image in the other system.
• Viewing the status of encryption and decryption processes will also be there.

3.2 Software Requirement Specification (SRS)


• Product Features

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 16


1. Maintenance is easy.
2. Provides high security level.
3. This project takes less computational time and power in reliable and efficient way
to deal with balky, difficult and intractable data.
4. It is more suitable for multimedia data, especially for images.
5. This project has many properties to achieve high security level, such as sensitivity
to change initial conditions and parameters, periodicity, random behavior and
unstable periodic orbits with long periods.

Operating Environment
The user can have membership by concerning the administrator. The system dynami-
cally generates member id on presenting the user details. The user can have transac-
tions by having their member id. The user adds the image for encryption and encrypts
it for confidential images. Overall, system together consists of two server (Key-Server
and Decryption-Server) and three Client modules (WebClient, Desktop-Client and iOS
Client). Both mechanisms - Public Cryptography and Digital Signature requires public-
private key pair. One is used for data encryption – managed by Decryption-Server,
the other one for signing the data – managed by Key-Server. The keys can either be
transferred as file or as QR code. Student private-key can also be transferred through
webrequest authenticated via Shibboleth. The encryption key is to be used by the
admin whereas students use the signing key. The Key-Server’s key pair is used for
signing and verifying the data. One of the Java Server is used to encrypt the exam
data. Idea behind develop 3 different clients is to demonstrate the concept on different
platform / environment.

Assumptions
Security of data, while transferring over a network and stored on a shared location,
is arguably the vital aspect to be think about. In the software, BME for example,
student exam data need to be transfer over a network and will be stored at ASW S3 or
FTP. It is by law in many organizations or countries that data must be stored securely
on shared location. Encryption is the typical way of security to prevent falling data
into wrong hand. The POC presented below uses intuitively a simple but a strong
idea of encryption mechanism to secure the data. Basically, there are two types of
encryption are being used: Symmetric Encryption and Asymmetric Encryption (also
called public-key encryption). Symmetric key uses same key to encrypt-decrypt the
data whereas asymmetric key requires key pair (public-key and private-key). Though

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 17


asymmetric encryption is bit complex and slower than symmetric encryption, it is
more secure. That is the key factor to use asymmetric encryption in the POC. Data
encryption alone is not enough. Data in BME software also traverse from one place to
another which brings another aspect to think about – authentication. Digital Signature
is a method that demonstrate the authenticity of data/message. Primary objective of
this software is to implement proof of concept, using the core security aspect - Public
Cryptography and Digital Signature - to store data securely and verify the authenticity
of sender.

Hardware Requirement
The minimum hardware requirement specifications for developing this project are as
follows:

1. Processor : Standard processor with a speed of 1.6GHz

2. RAM : 256MB RAM or higher

3. Hard Disk : 20GB or more

4. Monitor : Standard color monitor

5. Keyboard : Standard keyboard

6. Mouse : Standard mouse

Software Requirements
The minimum software requirement specifications for developing this project are as fol-
lows:

1. Operating System : Windows XP

2. Presentation Layer : Java, Servlets, JSP

3. Web Server : Apache Tomcat 6.0

4. Database : Oracle 10g XE

5. IDE : Eclipse 3.3

6. Database Layer : JDBC

7. Documentation Tool : MS Office

8. UML Tools : Rational Rose

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 18


3.3 Functional and Non Functional Requirements
3.3.1 Functional Requirements
The user can have membership by concerning the administrator. The system dynamically
generates member id on presenting the user details. The user can have transactions by having
their member id. The user adds the image for encryption and encrypts it for confidential
images. Users of the System

1. Administrator.

2. User.

3. Other (Guests).

1. Administrator:
Administrator is having all the rights to access this portal. Admin can view all the
images, and the status of the encrypting and decrypting process. He will have control
over the network whether to accept the servers request for receiving image. He will
provide all the benefits for image encryption and decryption.

2. User:
The people who use this system for providing security for confidential images are users.
There may be different set of users for this system. The users just load an image to
encrypt and encrypt it and enter the destination systems IP address to transfer the
image and he can view the status of the network for the sent image.

3. Guests:
Guest or the new user can only view the functionalities in the portal and they have no
access permissions unless they are registered.

3.3.2 Non-functional Requirements


Non Functional requirements enable you to understand the performance and health of your
ongoing development so that you can make critical adjustments in your execution to achieve
your goals. By defining non-functional requirements as above, you bring your team on
board with the right development practices and the right way to do things. Non-functional
requirements are as follows:

• Focus on user’s Expectations.

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 19


• Giving instantly output.Taking less time.

• usability,reliability,performance,scalability.

3.4 Summary
In this chapter we have seen the all types of requirement gathering phases and Hardware
software requirement for system similarly, Functional and non-functional requirements of the
system. In next chapter Design part of the system is covered.

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 20


Chapter 4

Design

The software design used to develop this project is object-oriented design is based on func-
tion and procedures. It can be said as the development of software by building self-contained
modules as objects that can be easily replaced, modified and reused. In this environment
software is a collection of discrete objects that encapsulate their data as well as the func-
tionality to model real world “objects”. Each object has attribute and methods. Objects
are grouped into classes. Here each object is responsible for itself.
This Chapter is About of six sections.These are as follow :

1. Describes system architecture of the Section 4.1

2. E-R Diagram is describe in section 4.2

3. Database design is described in section 4.3

4. describes the data flow of the project 4.4

5. various UML diagrams are describe in section 4.5

6. gives summary 4.6

4.1 System Architecture


Figure 4.1 shows architecture which include following components:-

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 21


fig 4.1 Architecture Diagram

1. Administrator:
Administrator is having all the rights to access this portal. Admin can view all the
images, and the status of the encrypting and decrypting process. He will have control
over the network whether to accept the servers request for receiving image. He will
provide all the benefits for image encryption and decryption.

2. User:
The people who use this system for providing security for confidential images are users.
There may be different set of users for this system. The users just load an image to
encrypt and encrypt it and enter the destination systems IP address to transfer the
image and he can view the status of the network for the sent image.

3. Guests:
Guest or the new user can only view the functionalities in the portal and they have no
access permissions unless they are registered.

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 22


4.2 Data Flow Diagram
A Data Flow Diagram (DFD) is a graphical representation of the “flow” of data through an
information system. It can also be used for the visualization of data processing (structured
design).
There are two types of DFDs. They are:

1. Context Level DFD

2. Top Level DFD

4.2.1 Context Level DFD- 0 level


In the Context Level the whole system is shown as a single process.

• No data stores are shown.

• Inputs to the overall system are shown together with data sources (as External entities).

• Outputs from the overall system are shown together with their destinations (as External
entities).

fig 4.2.1 Context Level DFD- 0 level

4.2.2 Level of 1 DFD


The Top Level DFD gives the overview of the whole system identifying the major system
processes and data flow. This level focuses on the single process that is drawn in the context
diagram by Zooming in on its contents and illustrates what it does in more detail.

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 23


fig 4.2.2 Level of 1 DFD

4.2.3 Level of 2 DFD


The Top Level DFD gives the overview of the whole system identifying the major system
processes and data flow. This level focuses on the single process that is drawn in the context
diagram by Zooming in on its contents and illustrates what it does in more detail.

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 24


fig 4.2.3 Level of 2 DFD

4.2.4 Level of 3 DFD


The Top Level DFD gives the overview of the whole system identifying the major system
processes and data flow. This level focuses on the single process that is drawn in the context
diagram by Zooming in on its contents and illustrates what it does in more detail.

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 25


fig 4.2.4 Level of 3 DFD

4.2.5 Level of 4 DFD


The Top Level DFD gives the overview of the whole system identifying the major system
processes and data flow. This level focuses on the single process that is drawn in the context
diagram by Zooming in on its contents and illustrates what it does in more detail.

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 26


fig 4.2.5 Level of 4 DFD

4.3 UML Diagrams


The Unified Modeling Language is a language that defines the industry’s best engineering
practices for the modeling systems. The goal of UML is to be a ready-to- use expressive
visual modeling language that is simple and extensible. Use case diagram shows a set of use
cases, actors and their relationships. Use case diagrams address the static use case view of a
system. These diagrams are especially important in organizing and modeling the behavior of
he system. A sequence diagram is an interaction diagram that emphasizes the time ordering
of messages. Sequence diagram is isomorphic means that user can take one and transform
it into the other.
Class diagram shows a set of classes, interfaces, collaborations and their relationships.
Class diagram address the static design view of a system. Class diagrams are important not
only for visualizing, specifying and documenting structural models but also or constructing
executable systems. State chart diagram shows a state machine, consisting of states, tran-
sitions, events and activities. State chart diagram address the dynamic view of a system.
It is especially important in modeling and behavior of an interface, class or collaboration

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 27


and emphasize the event-ordered behavior of an object which especially useful in modeling
reactive systems. A component diagram shows the organizations and dependencies among a
set of components. Component diagram address the static implementation view of a system.

4.3.1 Use Case Diagram


Use-case diagrams describe the high-level functions and scope of a system. These
diagrams also identify the interactions between the system and its actors. The
use cases and actors in use-case diagrams describe what the system does and
how the actors use it, but not how the system operates internally.

fig4.3.1 Use Case Diagram

4.3.2 Sequence Diagram


A sequence diagram is a type of interaction diagram because it describes how—and
in what order—a group of objects works together. These diagrams are used by
software developers and business professionals to understand requirements for a
new system or to document an existing process.

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 28


fig 4.3.2 Sequence Diagram 1

sequence Diagram
A sequence diagram is a type of interaction diagram because it describes how—and
in what order—a group of objects works together. These diagrams are used by
software developers and business professionals to understand requirements for a
new system or to document an existing process.

4.3.3 Collaboration Diagram


A collaboration diagram, also known as a communication diagram, is an illustra-
tion of the relationships and interactions among software objects in the Unified
Modeling Language (UML). These diagrams can be used to portray the dynamic
behavior of a particular use case and define the role of each object.

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 29


fig 4.3.3 Collaboration Diagram

4.3.4 Class Diagram


The class diagram is the main building block of object-oriented modeling. It is
used for general conceptual modeling of the structure of the application, and
for detailed modeling, translating the models into programming code. Class
diagrams can also be used for data modeling.

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 30


fig 4.3.4 Class Diagram

4.3.5 State Transition Diagram


State-transition diagrams describe all of the states that an object can have, the
events under which an object changes state (transitions), the conditions that
must be fulfilled before the transition will occur (guards), and the activities
undertaken during the life of an object (actions).

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 31


fig 4.3.5 State Transition Diagram

4.3.6 Component Diagram


A component diagram, also known as a UML component diagram, describes the
organization and wiring of the physical components in a system. Component
diagrams are often drawn to help model implementation details and double-
check that every aspect of the system’s required functions is covered by planned
development.

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 32


fig 4.3.6 Component Diagram

4.3.7 Deployment Diagram


A deployment diagram is a UML diagram type that shows the execution ar-
chitecture of a system, including nodes such as hardware or software execution
environments, and the middleware connecting them. Deployment diagrams are
typically used to visualize the physical hardware and software of a system.

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 33


fig 4.3.7 Deployment Diagram

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 34


Chapter 5

Implementation

Implementation of the proposed system involves the environment in which the system is
implemented and the overall system development. The overall development of the proposed
system requires suitable environment and proper resources for its successful completion.
Implementation of proposed system consists of various techniques and algorithms. Imple-
mentation of proposed system consists of various techniques and algorithms. Section5.1 talks
about the Algorithms used in model building. The implementation details is discussed in
Section5.2. Section5.3 discusses about the software and hardware development in details
and finally the overall summary is discussed in Section5.4.

5.1 Algorithm
NIST started working on developing AES in January 1997. AES is a symmetric key en-
cryption method that outperforms the DES algorithm. The number of algorithms has been
decreased from the original 15 types to just 4. Rijndael algorithm is another name for the
AES algorithm. when neither the encryption nor decryption of the text block is fixed. The
AES Encryption algorithm (also known as the Rijndael algorithm) is a symmetric block ci-
pher algorithm with a block/chunk size of 128 bits. It converts these individual blocks using
keys of 128, 192, and 256 bits. Once it encrypts these blocks, it joins them together to form
the ciphertext. The AES algorithm is widely used in a variety of applications, including
wireless security, processor security, file encryption, and SSL/TLS. AES encryption is used
regularly by federal government departments as well as non-government entities, commercial
firms, and organizations, to secure sensitive data.

5.2 Flow Of System Development


Implementation Steps

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 35


5.2.1 Home Page
Home page for the user is going to be different. Home page of user will contain
controlling part of the system like whether encrypt image or text options.

fig 5.2.1 Home Page

5.2.2 Encryption Decryption Page


Encryption Decryption page is get opened when user will choose whether encrypt
image or text options.Once the 16 bit cipher key /Secret key is to be entered
by the user they choose the image file from the device which is o be encrypted
click on encryption button to encrypt the image/text.

fig 5.2.2 Encryption Decryption Page

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 36


5.2.3 Original image Page
This page is shown the original image which is taken for the encryption from the
device.

fig 5.2.3 Original image Page

5.2.4 Encrypted Decrypted Image Page


The encrypted and decrypted image is shown on the device after encryption and
decryption.

fig 5.2.4 Encrypted Decrypted Image Page

5.3 Software and Hardware for development in detail


The proposed system is developed using the Java,Servlet and JSP. The frontend includes
Java Servlet and JSP is the back-end of the system.

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 37


5.3.1 Implementation Environment
• Java:-is a programming language and computing platform first released by Sun Mi-
crosystems in 1995. It has evolved from humble beginnings to power a large share
of today’s digital world, by providing the reliable platform upon which many services
and applications are built. New, innovative products and digital services designed for
the future continue to rely on Java, as well. Java is a programming language and a
platform. Java is a high level, robust, object-oriented and secure programming lan-
guage.James Gosling is known as the father of Java. Before Java, its name was Oak.
Since Oak was already a registered company, so James Gosling and his team changed
the name from Oak to Java.
While most modern Java applications combine the Java runtime and application to-
gether, there are still many applications and even some websites that will not func-
tion unless you have a desktop Java installed. Java.com, this website, is intended for
consumers who may still require Java for their desktop applications – specifically ap-
plications targeting Java 8. Developers as well as users that would like to learn Java
programming should visit the dev.java website instead and business users should visit
oracle.com/java for more information.

• Servlet:- Servlet technology is used to create a web application (resides at server side
and generates a dynamic web page).
Servlet technology is robust and scalable because of java language. Before Servlet,
CGI (Common Gateway Interface) scripting language was common as a server-side
programming language. However, there were many disadvantages to this technology.
We have discussed these disadvantages below.
There are many interfaces and classes in the Servlet API such as Servlet, Generic-
Servlet, HttpServlet, ServletRequest, ServletResponse, etc. Servlet is a technology
which is used to create a web application. Servlet is an API that provides many in-
terfaces and classes including documentation. Servlet is an interface that must be
implemented for creating any Servlet. Servlet is a class that extends the capabilities
of the servers and responds to the incoming requests. It can respond to any requests.
Servlet is a web component that is deployed on the server to create a dynamic web
page.

• JSP:-technology is used to create web application just like Servlet technology. It can
be thought of as an extension to Servlet because it provides more functionality than
servlet such as expression language, JSTL, etc.

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 38


A JSP page consists of HTML tags and JSP tags. The JSP pages are easier to maintain
than Servlet because we can separate designing and development. It provides some
additional features such as Expression Language, Custom Tags, etc. JSP technology is
the extension to Servlet technology. We can use all the features of the Servlet in JSP.
In addition to, we can use implicit objects, predefined tags, expression language and
Custom tags in JSP, that makes JSP development easy. JSP can be easily managed
because we can easily separate our business logic with presentation logic. In Servlet
technology, we mix our business logic with the presentation logic. If JSP page is
modified, we don’t need to recompile and redeploy the project. The Servlet code needs
to be updated and recompiled if we have to change the look and feel of the application.

5.4 Summary
In this chapter, the implementation details, implementation environment are described. In
the next chapter, System Testing is discussed.

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 39


Chapter 6

System Testing

Implementation of system testing is one of the important and difficult job and for testing
the system, there are various test cases which are applied and results are considered. System
testing is an empirical technical investigation conducted to provide stake holders with infor-
mation about the quality of the product or service under test, with respect to the context in
which it is intended to operate. This includes, but is not limited to, the process of executing
a program or application with the intent of finding errors. System Testing is a set of activi-
ties that can be planned in advance and conducted systematically. The proposed system is
tested in parallel with the software that consists of its own phases of analysis. Following are
the various types of testing:-

• Unit Testing:- Unit testing is a software development process in which the smallest
testable parts of an application, called units are individually and independently ex-
amined closely for proper operation. Unit testing can be done manually but is often
automated. During unit testing some errors were raised and all of them were rectified
and handled well. The result was quiet satisfactory and it worked well.

• Integration Testing:- Integration testing is the phase in software testing in which in-
dividual software modules are combined and tested as a group. It occurs after unit
testing and before validation testing. The system has been passed through the integra-
tion testing. The modules were combined and tested for their compatibility with other
modules. The test was almost successful. All the modules coexisted very well,with
almost no bugs.

• System Testing:- System testing of software or hardware is testing conducted on a com-


plete, integrated system to evaluate the system’s compliance with its specified require-
ments. System testing falls within the scope of black box testing, and as such,should
require no knowledge of the inner design of the code or logic.

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 40


• Black Box Testing:- Black box testing is a method of software testing that examines the
functionality of an application without peering into its internal structure or working.
In black box testing tester is aware of what the software is suppose to do but is not
aware of how it does it.

• White Box Testing:-It is software testing technique in which internal structure, design
and coding of software are tested to verify ow of input-output and to improve design,
usability and security. In white box testing, code is visible to testers so it is also called
Clear box testing, open box testing, transparent box testing, Code-based testing and
Glass box testing. White box testing is done to find out the following information as
shown in below:-

– Incorrect or missing functions


– To check ow of Input-output
– To improve design
– To check the usability
– Interface errors
– Errors or database access

6.1 Test cases and Test Results


Test case is the set of inputs along with the output and some additional information like:-
Test-case 1 – Define Secret key Test-case 2 –Choose Image for Encryption Test-case 3 –
Mention Secret Key Test-case 4 – Decrypt Encrypted Image

6.2 Summary
In this chapter, the system testing details, testing environment are described. In the next
chapter, result and analysis are discussed.

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 41


Chapter 7

Result Analysis

7.1 Actual Output Of The Project

fig 7.1 Home Page

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 42


fig 7.2 Encrypt Decrypt Page

fig 7.3 Enter 16bit Encryption key and Choose Image Page

fig 7.4 Original Image

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 43


fig 7.5 Image Encrypted Successfully Page

fig 7.6 Encrypted Image Page

fig 7.7 Enter 16bit Decryption key and Choose Encrypted Image Page

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 44


fig 7.8 Image Decrypted Successfully Page

fig 7.9 Decrypted Image Page

7.2 Summary
In this chapter, the result and analysis details, test cases and test results are described. In
the next chapter, Conclusion and Future Scope are discussed.

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 45


Chapter 8

Conclusion

At the end of the day we need to protect our data. Increasingly, encryption is being seen
as the best way to ensure that data is protected, but the ever growing use of encryption
creates a management challenge. The challenge, however, doesn’t need to be daunting.
Implementing a flexible and extensible solution that automates many of the time-consuming
and error-prone key management tasks in an automated enterprise-wide manner is rapidly
becoming a priority for many organizations. In order for enterprise-wide encryption to be
deployed correctly, organizations need to deploy the correct tool to manage the keys. In
the same way that data protection has moved from an IT challenge to a C-level issue, key
management has become a high-level business imperative.

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 46


Bibliography

[1] Mauro Barni, Franco Bartolini, Enrico Magli and Gab-riella Olmo, “Watermarking tech-
niques for electronic delivery of remote sensing images”, Optical Engineer-ing, 41,No. 9,
pp. 2111-2119, September 2002.

[2] Ray A. Williamson, “REMOTE SENSING AND TRANSPORTATION SECURITY”,


Pecora 15/Land Satellite Information IV/ISPRS Commission I/FIEOS Conference Pro-
ceedings, 2002

[3] Klaus Holtz, “Advanced Data Compression promises the next big Leap in Network Per-
formance”, IST / SPIE EUROPTO Conference, Zurich, Switzerland, May 1998.

[4] R. J. Anderson and F. A. P. Petitcolas, ”On the limits of steganography,” IEEE Journal
on Selected Areas in Communications, vol. 16, no. 4, pp. 474-481, 1998

[5] Mohammad Zakir Hossain Sarker and Md. Shafiul Parvez, “A Cost Effective Symmetric
Key Crypto-graphic Algorithm for Small Amount of Data”, Pro-ceedings of the 9th IEEE
International Multi topic Conference, pp. 1-6, December 2005

[6] Xun Yi Chik How Tan Chee Kheong Slew Rahman Syed, M., ”Fast encryption for mul-
timedia,” IEEE Transactions on Consumer Electronics, vol. 47, no. 1, pp. 101-107, 2001.

[7] Yen J. C. and Guo J. I., “A new chaotic image encryp-tion algorithm,” Proceeding of
National Symposium on Telecommunications, pp. 358-362, December 1998.

[8] Jui-Cheng Yen and J. I. Guo, “A New Chaotic Mirror-Like Image Encryption Algorithm
and its VLSI Archi-tecture”, Pattern Recognition and Image Analysis, vol.10, no.2, pp.236-
247, 2000.

[9] 9. Jui-Cheng Yen and J. I. Guo, “Efficient Hierarchical Chaotic Image Encryption Algo-
rithm and Its VLSI Re-alization”. IEEE Proceeding Vis. Image Signal Process, vol. 147,
no. 2, pp. 167-175,2000

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 47


Index

Abstract, 2
Scope, 4
Analyse, 9
SRS, 16
Non-Functional, 18
Component, 24
Summary, 27
Conclusion, 28

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 48


Appendix A

Appendix

The figure 1.1 Hieroglyph The Oldest Cryptographic Technique.


The figure 1.2 Roman method of cryptography.
The figure 1.3 Steganography Cryptography.
The figure 1.4 LINEAR SEQUENTIAL MODEL.
The figure 4.1 Architecture Diagram.
The figure 4.2.1 Context Level DFD- 0 level.
The figure 4.2.2 Level of 1 DFD.
The figure 4.2.3 Level of 2 DFD.
The figure 4.2.4 Level of 3 DFD.
The figure 4.2.5 Level of 4 DFD.
The figure 4.3.1 Use Case Diagram.
The figure 4.3.2 Sequence Diagram 1.
The figure 4.3.3 Collaboration Diagram.
The figure 4.3.4 Class Diagram.
The figure 4.3.5 State Transition Diagram.
The figure 4.3.6 Component Diagram.
The figure 4.3.7 Deployment Diagram.

SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 49

You might also like