ABSTRACT Data Security Authentication(DSA) is way to transfer the confindential file to required person in a safe and secure maner without getting into hands of hackers who are major threat in Computer technology.The aim is to provide maximum security to the confidential data. The phenomenal growth in e-commerce applications through the Internet in the past few years has led to a genuine need, as well as a sense of urgency, for both small office and home office and corporate users to protect their data transactions through the Internet. These data transactions may include sensitive document transfer, digital signature authentication, digital watermarking for copyright protection, and digital data storage and linkage. In this project we create a CRC file by adding the checksum value to the confidential data,then it is compressed so that it gets encrypted,the compressed file is embedded to container file along with secret key so that original features of the container file doesn’t changes.the receiver cans de-embbed the data from container file only when he matches the key.then in file is
Data Security Authentication(DSA) is way to transfer the confindential file to required person in a safe and secure maner without getting into hands of hackers who are major threat in Computer technology.The aim is to provide maximum security to the confidential data. The phenomenal growth in e-commerce applications through the Internet in the past few years has led to a genuine need, as well as a sense of urgency, for both small office and home office and corporate users to protect their data transactions through the Internet. These data transactions may include sensitive document transfer, digital signature authentication, digital watermarking for copyright protection, and digital data storage and linkage.
In this project we create a CRC file by adding the checksum value to the confidential data,then it is compressed so that it gets encrypted,the compressed file is embedded to container file along with secret key so that original features of the container file doesn’t changes.the receiver cans de-embbed the data from container file only when he matches the key.then in file is decompressed to get the original data.The usage of less number of resource boost up performance and reliability of this system. This system can be implemented in many various fields like banks,security related organizations whose data is to be very confidential.
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
ABSTRACT
Data Security Authentication(DSA) is way to transfer the confindential file to required
person in a safe and secure maner without getting into hands of hackers who are major threat in
Computer technology.The aim is to provide maximum security to the confidential data.
The phenomenal growth in e-commerce applications through the Internet in the past few
years has led to a genuine need, as well as a sense of urgency, for both small office and home
office and corporate users to protect their data transactions through the Internet. These data
transactions may include sensitive document transfer, digital signature authentication, digital
watermarking for copyright protection, and digital data storage and linkage.
In this project we create a CRC file by adding the checksum value to the confidential
data,then it is compressed so that it gets encrypted,the compressed file is embedded to container
file along with secret key so that original features of the container file doesn’t changes.the
receiver cans de-embbed the data from container file only when he matches the key.then in file is
decompressed to get the original data.The usage of less number of resource boost up
performance and reliability of this system.
This system can be implemented in many various fields like banks,security related
organizations whose data is to be very confidential.
ABBREVIATIONS
CRC:Cyclic redundance check
DSA:Data Security Authentication
GUI:Graphical User Interface
C O N T E N T S
S.No Topic Page no
1. Organization Profile
2. Introduction
2.1 About the Project
2.2 Project Description
3. System Analysis
3.1 Existing System
3.2 Proposed System
3.3 Requirement Analysis
3.4 Requirement Specification
3.5 Feasibility Study
4. System Design
4.1 Project Modules
4.2 Data Flow Diagrams
4.3 E-R diagrams
4.4 UML Diagrams
4.5 Hardware and Software Requirements
5. Output Screens
6. Source Code
7. Software Testing
8. Technical notes
9. Conclusion
References
LIST OF FIGURES
FIGURES PAGE NO
1.1 DFD Diagram Level-11.2 DFD Diagram Level-21.3 E-R Diagram for System
LIST OF UML DIAGRAMS
FIGURES PAGE NO
1.1 Use Case Diagram1.2 Sequence Diagram1.3 Activity Diagram1.4 Class Diagram
1. ORGANIZATION PROFILE
‘Adroit Infocom’ is a professional Web design and software development company. We
supply services of web design & development, web application, Flash animation, multimedia,
identity and graphic design, Website translation, internet marketing and software services.
We help clients enhance their competitiveness and produce measurable results based on
features delivered, value delivered and time saved. The combination of thorough process,
comprehensive experience and expansive creative vision enables us to create solutions that are
innovative, usable and reliable for website designing.we have proven our skill, professionalism,
and creativity in all of our work.
Adroit Infocom has proven expertise in encompassing low cost, but high quality and
reliable web development services in areas like e-commerce, e-learning, finance, manufacturing,
content management and many others.
The strength of Adroit Infocom lies in its management and outstanding model of project
execution that makes it possible for the timely delivery of the most complicated and advanced
software and IT solutions to the clients. Supported by a talented pool of experienced software
engineers from the top reputed Technical and Research Institutes in the country, Adroit Infocom
offers you dedicated service at all stages of the project-right from the initial specification to the
final delivery and maintenance, with a round the clock support.
Adroit Infocom firmly believes in directing the clients to increase their business output
through the application of the latest web tools and a careful handling of the changing dynamics
of website development. Adroit Infocom delivers quality service that serves as an eye opener for
the customers to conduct business more creatively and effectively. We balance project duration
and product development efforts to suit your business needs.
2. INTRODUCTION
2.1 ABOUT THE PROJECT:
DSA is a graphical interface in which the user handles the transaction of compression by
selecting a source file that is to be embedded. The compressed file that is obtained is of reduced
size and is embedded into a container (image source etc.,) without losing the features of that
container. The container can be transferred to the respective destination where the reverse of the
process is performed like de-embedding the content from the container and decompressing it to
generate the actual code (decompressed data).
As the application is container independent various type of files are used for embedding the data
into them.
2.2 PROJECT DESCRIPTION:
The application that is proposed contains the following features :
Generates a CRC file by placing checksum value from a user specified file.
Compresses the specified file into a binary mode object.
Embeds the compressed content into the specified container without disturbing its
features.
De-Embeds the container to separate the element from the container making the
compressed text independent.
Decompress the obtained content to retrieve its normal format.
Checks the retrived file whether it is corrupted or not.
3. SYSTEM ANALYSIS
System analysis first stage according to System Development life cycle model. This
system analysis is a process that starts with the analyst.
Analysis is a detailed study of the various operations by a system and their relationships
within and outside the system. One aspect of analysis is defining the boundaries of the system
and determining whether or not a candidate should consider other related systems. During
analysis, data is collected from the available files, decision points, and transactions handled by
the present system.
Logical system models and tools are used in analysis.Training, experience, and common
sense is required for the collection of the information needed to do analysis.
3.1 EXISTING SYSTEM
In the current existing model there are many algorithms that help in monitoring the data
transfer in an encrypted model but are container dependent. Laptop computers have become
mobile stores of massive amounts of information. Add to that the proliferation of removable hard
drives, and it becomes crystal clear how much sensitive data is on the move in the world, most of
it woefully underprotected. There are several levels of encryption available, and the major
difference them is the complexity of the encryption. Simply put, the more complicated the
encryption scheme, the more secure your data will be. However, before selecting the most
complex, most secure encryption scheme available, you should take into account another factor
the processing power needed to encrypt or decrypt the data. More complexity means more
security, but it also equals more demands on hardware.
Until recently, an inexpensive, easy-to-use, reliable drive-encryption utility was hard to come
by. Either the tools available were too complex or expensive to be used by a nontechnical
individual, or they impacted performance so severely that the PC slowed to a crawl.
This includes many drawbacks such as:
Limited access of security to the user data.
Container dependency locks the user from taking various containers.
It can easily capture the compressed data because of limited container.
3.2 PROPOSED SYSTEM
Proposed system is the upgraded form of existing system with the advanced technologies
making a container independent which allows the user to generate the CRC file from the
specified file by placing checksum value,it then compress the file size which convert the file to
binary mode object.we choose the required container for embedding the compressed data along
with user defined key.we can retrieve the original file from the container file and check whether
the file is corrupted or not.
Can work with any container not only images.
Size of data not a constraint to the size of the container.
Works even with animated, audio, video or any type of container.
The data hidden can also be compressed to ensure that even when present inside the
container it is still unreadable.
Authentication of data to verify data integrity
3.3 REQUIREMENTS ANALYSIS
The requirement phase basically consists of three activities:
1. Requirement Analysis
2. Requirement Specification
3. Requirement Validation
3.3.1 REQUIREMENT ANALYSIS:
Requirement analysis is a software engineering task that bridges the gap between system
level software allocation and software design. It provides the system engineer to specify software
function and performance indicate software’s interface with the other system elements and
establish constraints that software must meet.
The basic aim of this stage is to obtain a clear picture of the needs and requirements of
the end-user and also the organization. Analysis involves interaction between the clients and the
analsysis.usually analysts research a problem from any questions asked and reading existing
documents. The analysts research a problem from any questions asked and reading existing
documents. The analysts have to uncover the real needs of the user even if they don’t know them
clearly. During analysis it is essential that a complete and consistent set of specifications emerge
for the system. Here it is essential to resolve the contradictions that could emerge from
information got from various parties.
This is essential to ensure that the final specifications are consistent.
It may be divided into 5 areas of effort.
1. Problem recognition
2. Evaluation and synthesis
3. Modeling
4. Specification review
Each requirement analysis method has a unique point of view. However all analysis methods are
related by a set of operational principles.
The operational principles are,
The information domain of the problem must be understood.
The functions that the software is to perform must be defined.
The behavior of the software as a consequence of external events must be defined.
The models that depict information function and behavior must be portioned in a
hierarchical or layered fashion.
The analysis process must move from essential information to implementation detail.
3.4 REQIREMENT SPECIFICATION:
3.4.1 SPECIFICATION PRINCIPLES:
Software requirements specification plays an important role in creating quality software
solutions. Specification is basically a representation process.requirments are represented in a
manner that ultimately leads to a successful software implementation.
Requirements may be specified in a variety of ways. However there are some guidelines worth
following:-
representation format and content should be relevant to the problem
Information contained within specification should be nested
Diagrams and other notational forms should be restricted in number and consistent in
use.
Representations should be revisable.
3.4.2 SOFTWARE REQUIREMENTS SPECIFICATIONS:
The software requirements specification is produced at the culmination of the analysis
task. The function and performance allocated to the software as a part of system engineering are
refined by establishing a complete information description, a detailed functional and behavioral
description, and indication of performance requirements and design constraints, appropriate
validation criteria and other data pertinent to requirements.
An outline of the software requirements specification:
A simplified outline can be given for the framework of the specifications. This is
according to IEEE standards.
3.5 FEASIBILITY STUDY:
All projects are feasible, given unlimited resources and infinite time. But the
development of software is plagued by the scarcity of resources and difficult delivery rates. It is
both necessary and prudent to evaluate the feasibility of a project at the earliest possible time.
Three key considerations are involved in the feasibility analysis.
3.5.1 ECONOMIC FEASIBILITY:
This procedure is it determines the benefits and savings that are expected from a
candidate system and compare them with costs. If benefits outweigh costs, then the decision is
made to design and implement the system. Otherwise, further justification or alterations in
proposed system will have to be made if it is to have a chance of being approved. This is an
ongoing effort that improves in accuracy at each phase of the system life cycle
.
3.5.2 TECHNICAL FEASIBILITY:
Technical feasibility centers in the existing computer system (hardware, software, etc.,)
and to what extent it can support the proposed addition. If the budget is serious constraint then
the project is judged not feasible.
3.5.3 OPERATIONAL FEASIBILITY:
People are inherently resistant to change, and computers have been known to facilitate
change. It is understanndle that the introduction of a candidate system requires special effort to
educate, sell, a and train the staff on new ways of conducting business.
4.SYSTEM DESIGN
The most creative and challenging phase of the life cycle is system design. The term
design describes a final system and the process by which it is developed. It refers to the technical
specifications that will be applied in implementations of the candidate system. The design may
be defined as “The process of applying various techniques and principles for the purpose of
defining a device, a process or a system with sufficient details to permit its physical realization”.
The designers goal is how the output is to be produced and in what format. Samples of
the output and input are also presented. Second input data and database files have to be designed
to meet the requirements of the proposed output. The processing phases are handled through the
program construction and testing.Finally, details are related to justification of the system and an
estimate of the impact of the candidate system on the user and the organization are documented
and evaluated by management as a step toward implementation.
The importance so software design can be stated in a single word”quality”.design
provides us with representations of software that can be assessed for quality. Design is the only
way where we can accurately translate a customer’s requirements into a complete software
product or system
4.1 PROJECT MODULES
4.1.1 Login & Security
The system restricts usage of the package only to authorized user. The module provides a
login security restriction and check across the database for user validation. The user can change
the password whenever required.
4.1.2 CRC Generation & Verification
This module deals with providing data authentication. At the senders end CRC32 is used
to create checksum. The created checksum is then appended to the source text file and sent as
input to compression. At the receivers end after decompression the crc is compute once again
and compared with the checksum sent. If there is a match the file has not been damaged or
corrupted in the process of transmission.
4.1.3 Compression & decompression
The module provides additional security by converting the input text file into unreadable
binary output. The junk data looks more like encrypted data. This is performed by using the
java’s util package. The class GZip is used to compress and decompress the data. The junk or
compressed data is passed as input to steganography.
4.1.4 Data Embed & Retrieve
This module deals with identifying the data and a container to embed. The embedded
container can then be transmitted. The located data is the compressed data from the compression
module. The junk data is appended to the end of the container neither in such a way that the data
does not corrupt the container nor vice versa. The size of the data to that of the container is also
not a constraint. While retrieving the data, the junk data is converted back to ascii text using
decompression after de-embedding the data from the container.
4.2 DATA FLOW DIAGRAMS
A data flow diagram is graphical tool used to describe and analyze movement of data
through a system. These are the central tool and the basis from which the other components are
developed. The transformation of data from input to output, through processed, may be
described logically and independently of physical components associated with the system. These
are known as the logical data flow diagrams. Each component in a DFD is labeled with a
descriptive name. Process is further identified with a number that will be used for identification
purpose single process bit, which plays vital role in studying the current system.
A DFD is also known as a “bubble Chart” has the purpose of clarifying system
requirements and identifying major transformations that will become programs in system design.
So it is the starting point of the design to the lowest level of detail. A DFD consists of a series of
bubbles joined by data flows in the system.
4.2.1 DFD SYMBOLS
In the DFD, there are four symbols
1. A square defines a source(originator) or destination of system data
2. An arrow identifies data flow. It is the pipeline through which the information flows
3. A circle or a bubble represents a process that transforms incoming data flow into
outgoing data flows.
4. An open rectangle is a data store, data at rest or a temporary repository of data
Process that transforms data flow.
Source or Destination of data
Data flow
Data Store
DFD LEVEL-1
Request for Login
Authenticated
DFD LEVEL-II
Open channel
Communication
ADMINSTRATOR
Data Key
Container file
Embedding
De-Compression
Compression
De-Embedding
CRC-Generation
DSA
Confidential file
Data Key
CRC-Verification
Confidential file
ER Diagram
Login
CRC-Verification
Username
Embedding
De-Embedding
Compression
CRC-Generation
Password
De-Compression
ADMINSTRATOR DSA
4.4 Uml diagram
4.4.1 Usecase Diagram
USER
Login
CRC-Generation
Compression
Embedding
De-Embedding
De-Compressing
CRC-Verification
System
4.4.2 Sequence Diagram
USERUSER DSADSA SYSTEMSYSTEM
1: User Login Request
2: Prompt for Username & Password
3: Enter Username & Password
4: Verify
5: Return Status(Success/Failure)
6: Load Modules(Success)
7: Report Error Message(Failure)
4.4.3 Class Diagram
CRC-Verification
crcfile
crc32()
Login
Unamepwd
verify()
CRC-Generation
inputfile
crc32()
Compression
crc file
gzip()
Embedding
compressed filecontainer filedatakey
embed()
De-Embedding
embedded filedatakey
deembed()
De-Compression
compressed file
gunzip()
4.5 HARDWARE AND SOFTWARE REQUIRMENTS
4.5.1 HARDWARE REQUIREMENTS
Processor : Intel P-IV based system
Processor speed : 250MHz to 833MHz
RAM : 512 Mb
Hard Disk : 2GB to 30GB
4.5.2 SOFTWARE REQUIREMENTS
Language : Java (Swings)
Operating System :Windows2000
5.OUTPUT SCREENS
6.SOURCE CODE
6.1 Source code for Login:
import javax.swing.*;
import java.awt.*;
import java.awt.event.*;
import java.io.*;
import java.util.*;
class Login extends JFrame implements ActionListener
{
JLabel l1,l2;
JTextField t1;
JPasswordField t2;
JButton jb1,jb2;
public Login(String str)
{
super(str);
Container con=getContentPane();
con.setLayout(null);
Font f=new Font("Times New Roman",Font.BOLD,16);
l1=new JLabel("UserName : ");
l2=new JLabel("PassWord : ");
l1.setFont(f);
l2.setFont(f);
t1=new JTextField();
t2=new JPasswordField();
jb1=new JButton("LOGIN");
jb2=new JButton("EXIT");
l1.setBounds(50,30,120,20);
l2.setBounds(50,70,120,20);
t1.setBounds(135,32,140,20);
t2.setBounds(135,72,140,20);
jb1.setBounds(70,110,80,20);
jb2.setBounds(160,110,80,20);
con.add(l1);
con.add(l2);
con.add(t1);
con.add(t2);
con.add(jb1);
con.add(jb2);
jb1.addActionListener(this);
jb2.addActionListener(this);
}
public void actionPerformed(ActionEvent ae)
{
String str=ae.getActionCommand();
if(str.equals("EXIT"))
{
JOptionPane.showMessageDialog(this,"Thank U for Using the Application...");