SECURE DATA TRANSMISSION USING STEGANOGRAPHY
#1

SECURE DATA TRANSMISSION USING STEGANOGRAPHY

[attachment=18384]

SYNOPSIS:

Steganography is the art and science of writing hidden
messages in such a way that no-one apart from the sender and
intended recipient even realizes there is a hidden message. Today, the
term steganography includes the concealment of digital information
within computer files.
In this project the user can select a master file for data hiding.
And save it as the output file. After this there is another facility to
change the master and output file. We can also permit the user to view
the message from the embedded picture by setting a password and
write the message to hide along with the output picture.
To retrieve the message from the picture select the particular
image. Then we get the information about the picture . Enter the
password to read the message, there it display the hidden message.
Front End : Core Java

The growing possibilities of modern communications need the
specil means of security especially on computer network. The network
security is becoming more important as the amount of data being exchanged
on the Internet is increasing. Security requirements are necessary both at the
final user level and at the enterprise level, especially since the massive
utilization of personal computers, networks, and the Internet with its global
availability.



2. SYSTEM ANALYSIS
System analysis or study is an important phase of any system
development process. The system is studied to the minute detail and analyzed.
The system analyst dwell ed deep into the working of the present system. The
system was viewed as a whole and the input of the system are identified. During
analysis phase for each problem identified many alternative solutions were
evaluated and selected the most feasible one. A feasibility analysis was
performed to evaluate possible solutions to recommend the most feasible one.

2.1 Purpose
The purpose of the project is to create a medium to transfer data
securely using stegnography and cryptography. In this project we embed the
message to be passed in to a image after encrypting it. Then the image is passed
to where we want the message to be sent. Then the receiver can retrieve the
embedded message from the image.

2.2 Problem Definition
To develop a software solution to a problem, the first step is to
understand the problem. The problem here is if you are new to Java programming, you are probably starting by using Notepad. When you want
to compile a program, you need to open a DOS window and type
‘javac programname.java’ and for running to type ‘java programname’. Also
what you type is what you get: notepad does not help you any way with Java
syntax or design. And you cannot correct the errors within the editor.
Otherwise we can use NETBEANS IDE for writing and compiling and
running the program.

2.3 FEASIBILITY STUDY
After the problem is clearly understood and solutions proposed,
the next step is to conduct the feasibility study. Feasibility study is defined
as evaluation or analysis of the potential impact of a proposed project or
program. The objective is to determine whether the proposed system is
feasible. There are three aspects of feasibility study to which the proposed
system is subjected as discussed below.

2.3.1. Technical Feasibility
Technical feasibility assesses whether the current technical
resources are sufficient for the new system. If they are not available, can
they be upgraded to provide the level of technology necessary for the new
system? It checks whether the proposed system can be implemented in the
present system without supporting the existing hardware.

2.3.2. Economic Feasibility
Economic feasibility determines whether the time and money
are available to develop the system. It also includes the purchase of new equipment, hardware, and software. A software product must be cost





Reply
#2

to get information about the topic "secure data transmis" full report ppt and related topic refer the page link bellow


http://studentbank.in/report-secure-data...ission-ppt

http://studentbank.in/report-secure-data...ganography
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: secure data transmission using steganography powerpoint,
Popular Searches: secure data transmission using steganography existing system, srs on secure data transmission using crytography and steganography doc, secure data transmission using steganography ppt, report on wireless secure data transmission using rf technology, provably secure steganography matlab coding, secure data transmission using steganography techniques java source code, secure data transmission using steganography powerpoint,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Adaptive Data Fusion for Energy Efficient Routing in Wireless Sensor Networksy seminar addict 1 1,496 25-08-2014, 05:40 PM
Last Post: Guest
  WIRELESS POWER TRANSMISSION project uploader 1 1,693 22-11-2012, 01:34 PM
Last Post: seminar details
  Data Communication and Networking seminar paper 1 3,323 16-11-2012, 12:36 PM
Last Post: seminar details
  SSL – Secure Socket Layer seminar details 1 1,128 12-11-2012, 01:16 PM
Last Post: seminar details
  Audio Steganography Using Bit Modification Abstract seminar details 1 1,868 10-11-2012, 11:58 AM
Last Post: seminar details
  Introduction to data structures seminar details 1 3,331 29-10-2012, 12:42 PM
Last Post: seminar details
  Stego Machine – Video Steganography using Modified LSB Algorithm seminar details 1 2,440 25-10-2012, 01:40 PM
Last Post: seminar details
  Image Steganography Schemes For Image Authentication And Verification seminar details 1 2,777 15-10-2012, 03:25 PM
Last Post: seminar details
  Power System Fault Analysis using Fault Reporting Data full report seminar details 1 846 05-10-2012, 04:02 PM
Last Post: seminar details
  Power System Fault Analysis using Fault Reporting Data seminar details 1 952 05-10-2012, 04:02 PM
Last Post: seminar details

Forum Jump: