1.INTRODUCTION 1.1 PROJECT OVERVIEW: We are of the belief that the easiest way to keep something from prying eyes is to place it right in front of the person looking for it and make it look as innocuous as possible. Everyone has a taste for a certain kind of music. Hence, it is more than likely that the person will have that kind of music on the storage device of his computer. Also, it is quite common case where people share and transfer different music files to one another. If one were able to hide the message can be. Also, transfer of this message can be done quite conveniently without raising any eyebrows. Our aim is to come up with a technique of hiding the message in the Picture file in such a way, that there would be no perceivable changes in the in the Picture file after the message insertion. At the same time, if the message that is to be hidden were encrypted, the level of security would be raised to quite a satisfactory level. Now, even if the hidden message were to be discovered the person trying to get the message would only be able to lay his hands on the encrypted message with no way of being able to decrypt it. 1
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
1.INTRODUCTION
1.1 PROJECT OVERVIEW:
We are of the belief that the easiest way to keep something from prying eyes is to
place it right in front of the person looking for it and make it look as innocuous as
possible.
Everyone has a taste for a certain kind of music. Hence, it is more than likely
that the person will have that kind of music on the storage device of his computer.
Also, it is quite common case where people share and transfer different music files to
one another. If one were able to hide the message can be. Also, transfer of this
message can be done quite conveniently without raising any eyebrows.
Our aim is to come up with a technique of hiding the message in the Picture file
in such a way, that there would be no perceivable changes in the in the Picture file
after the message insertion. At the same time, if the message that is to be hidden were
encrypted, the level of security would be raised to quite a satisfactory level. Now,
even if the hidden message were to be discovered the person trying to get the message
would only be able to lay his hands on the encrypted message with no way of being
able to decrypt it.
There are several data hiding techniques available today. In each technique,
the host data type is fixed, but the embedded data type can be varied as per
requirement. Data hiding technique should be capable of embedding data in a host
signal with the following restrictions and features:
The host signal should be nonobjectionally degraded and the embedded data
should be minimally perceptible. What that means is that the observer should
not be able to notice the presence of the data even if it were perceptible.
The embedded data should be directly encoded into the media rather than into
a header or a wrapper so that the data remain intact across varying data file
formats.
1
The embedded data should be immune to modifications ranging from
intentional and intelligent attempts at removal to anticipated manipulations e.g.
channel noise, re-sampling, cropping, etc.
Asymmetrical coding of the embedded data is desirable since the purpose of
data hiding is to keep the data in the host signal but not necessarily to make the
data difficult to access.
The embedded data should be self clocking or arbitrarily re-entrant. This
ensures that the embedded data can be recovered even when only fragments of
information are available.
Goals of the System The goal of this project is to embed textual information into a popular media
using stegonography. It can be assume that the text is relatively short when compared
to the media file. A good example of this is the relationship between a recoded song,
and its lyrics. The Picture file containing the recording is much larger than the song
lyrics stored as a plain ASCII files. Therefore it is probably safe to assume that the
smaller file could be stegonographically embedded into the larger one without
impacting the quality. Similar argument could be made about video data and close
captioning information.
This project concentrates on the song/lyrics dynamics in order to create a
stegonographically driven karaoke machine. The song lyrics will be seamlessly
embedded into an Picture file, and then displayed on the screen when the file is
played. This research will include implementation of stegonographic algorithm for
encoding data inside Picture files, as well as technique to dynamically extract that data
and play it back.
2
2.SYSTEM ANALYSIS
2.1 EXISTING SYSTEM:
Nowadays, several methods are used for communicating secret messages for
defense purposes or in order to ensure the privacy of communication between two
parties. So we go for hiding information in ways that prevent its detection.
Some of the methods used for privacy communication are the use of invisible
links; covert channels are some of existing systems that are used to convey the
messages.
Since at present everything is done manually, it is having a lot of drawbacks.
The major Drawback of the present system is the bulk amount of physical volume of
the data making information search and retrieval is tedious Process. There are chances
for damage of papers containing information. So this process is time consuming
process.
Drawbacks
Increased time
Low accuracy
High labor charges
Increased uncertainty
Data security is less
2.2 PROPOSED SYSTEM:
In the proposed system we can overcome the difficulties of the existing system. In our
system we are introducing all the three concept to secure the information which is
send by the user. The data/information which the sender wants to send will be
encrypted and then if the information is too bigger in size there is an option to
3
compress the data using compression technique and later that data/information is
embedded in the audio/video or image files. For encrypting and decrypting the
data/information we have used DES algorithm. Hiding the text or file inside least
significant of an image. By using this intruder could not be able to see the content
since there is no change will be seen compare to original images. The proposed
system uses Picture file as a carrier medium which add another step in security. The
objective of the newly proposed system is to create a system that makes it very
difficult for an opponent to detect the existence of a secret message by encoding it in
the carrier medium as a function of some secret key and that remains as the advantage
of this system.
DES algorithm is used to encrypt the message which is hided in the image. DES is
used to give the extra protection for a data which has to be hide. Compression
technology has been used to compress the size of the message in order to save
memory.
In this system have several advantages over existing system. They are
1. Data security is high.
2. It avoids data redundancy and ensures data integrity.
3. It doesn’t take more labor time.
Introduction to the Software Development Life Cycle (SDLC)
This section of the document will describe the Software Development Life Cycle (SDLC) for
small to medium database application development efforts. This chapter presents an overview
of the SDLC, alternate lifecycle models, and associated references. This chapter also
describes the internal processes that are common across all stages of the SDLC and describes
the inputs, outputs, and processes of each stage.
The SDLC Waterfall
Small to medium database software projects are generally broken down into six stages:
4
The relationship of each stage to the others can be roughly described as a waterfall, where the
outputs from a specific stage serve as the initial inputs for the following stage.
To follow the waterfall model, one proceeds from one phase to the next in a purely sequential
manner. For example,
After completing the “Project Planning” phase, one will be completing the
"requirements definitions" phase.
When and only when the requirements are fully completed, one proceeds to design.
This design should be a plan for implementing the requirements given.
When and only when the design is fully completed, an implementation of that design
is made by coders. Towards the later stages of this implementation phase, disparate
software components produced by different teams are integrated.
After the implementation and integration phases are complete, the software product is
tested and debugged; any faults introduced in earlier phases are removed here.
Then the software product is installed, and later maintained to introduce new
functionality and remove bugs.
Thus the waterfall model maintains that one should move to a phase only when it’s
proceeding phase is completed and perfected. Phases of development in the waterfall model
are thus discrete, and there is no jumping back and forth or overlap between them.
5
The central idea behind the waterfall model - time spent early on making sure that
requirements and design are absolutely correct is very useful in economic terms (it will save
you much time and effort later). One should also make sure that each phase is 100% complete
and absolutely correct before proceeding to the next phase of program creation.
It is argued that the waterfall model in general can be suited to software projects which are
stable (especially with unchanging requirements) and where it is possible and likely that
designers will be able to fully predict problem areas of the system and produce a correct
design before implementation is started.
The waterfall model also requires that implementers follow the well made, complete design
accurately, ensuring that the integration of the system proceeds smoothly.
The waterfall model however is argued by many to be a bad idea in practice, mainly because
of their belief that it is impossible to get one phase of a software product's lifecycle
"perfected" before moving on to the next phases and learning from them (or at least, the
belief that this is impossible for any non-trivial program). For example clients may not be
aware of exactly what requirements they want before they see a working prototype and can
comment upon it - they may change their requirements constantly, and program designers and
implementers may have little control over this.
If clients change their requirements after a design is finished, that design must be modified to
accommodate the new requirements, invalidating quite a good deal of effort if overly large
amounts of time have been invested into the model.
In response to the perceived problems with the "pure" waterfall model, many modified
waterfall models have been introduced namely Royce's final model, sashimi model, and other
alternative models. These models may address some or all of the criticism of the "pure"
waterfall model. There are other alternate SDLC models such as “Spiral” and “V” which
have been explained in the later part of this chapter.
After the project is completed, the Primary Developer Representative (PDR) and Primary
End-User Representative (PER), in concert with other customer and development team
personnel develop a list of recommendations for enhancement of the current software.
6
Prototypes
The software development team, to clarify requirements and/or design elements, may
generate mockups and prototypes of screens, reports, and processes. Although some of the
prototypes may appear to be very substantial, they're generally similar to a movie set:
everything looks good from the front but there's nothing in the back.
When a prototype is generated, the developer produces the minimum amount of code
necessary to clarify the requirements or design elements under consideration. No effort is
made to comply with coding standards, provide robust error management or integrate with
other database tables or modules. As a result, it is generally more expensive to retrofit a
prototype with the necessary elements to produce a production module than it is to develop
the module from scratch using the final system design document. For these reasons,
prototypes are never intended for business use, and are generally crippled in one way or
another to prevent them from being mistakenly used as production modules by end-users.
Allowed Variations
In some cases, additional information is made available to the development team that requires
changes in the outputs of previous stages. In this case, the development effort is usually
suspended until the changes can be reconciled with the current design, and the new results are
passed down the waterfall until the project reaches the point where it was suspended.
The PER and PDR may, at their discretion, allow the development effort to continue while
previous stage deliverables are updated in cases where the impacts are minimal and strictly
limited in scope. In this case, the changes must be carefully tracked to make sure all their
impacts are appropriately handled.
7
Other SDLC Models
Apart from the waterfall model other popular SDLC modules are the “Spiral” model and “V”
model which have been explained in this section.
Spiral Lifecycle
The spiral model starts with an initial pass through a standard waterfall lifecycle, using a
subset of the total requirements to develop a robust prototype. After an evaluation period, the
cycle is initiated again, adding new functionality and releasing the next prototype. This
process continues with the prototype becoming larger and larger with each iteration, hence
the “spiral.”
The Spiral model is used most often in large projects and needs constant review to stay on
target. For smaller projects, the concept of agile software development is becoming a viable
alternative. Agile software development tends to be rather more extreme in their approach
If (messageStream != null){ messageStream.Close(); }
If (PictureStream != null){ PictureStream.Close(); }
If (sourceStream != null){ sourceStream.Close(); }
this.Cursor = Cursors.Default; }
44
8.3 Screen Shots
.
45
.
46
47
.
.
.
48
49
50
51
52
53
54
Sample Coding:
Public Class Form1 Dim PicBuffer As System.IO.FileInfo Private Sub Button1_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button1.Click openPic.Title = "Open Picture Files" openPic.ShowDialog() End Sub
Private Sub openPic_FileOk(ByVal sender As System.Object, ByVal e As System.ComponentModel.CancelEventArgs) Handles openPic.FileOk PictureBox1.Image = Image.FromFile(openPic.FileName) PicBuffer = New System.IO.FileInfo(openPic.FileName) ResizeFileName(openPic.FileName, PicBuffer.Name) End Sub
Private Sub Button3_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button3.Click Dim Ready As Boolean = True Dim PicFileStream As System.IO.FileStream Try PicFileStream = PicBuffer.OpenRead Catch ex As Exception Ready = False MsgBox("Please load a picture before clicking this button", MsgBoxStyle.Critical, "Error") End Try If Ready = True Then Dim PicBytes As Long = PicFileStream.Length Dim PicExt As String = PicBuffer.Extension Dim PicByteArray(PicBytes) As Byte PicFileStream.Read(PicByteArray, 0, PicBytes) Dim SentinelString() As Byte = {73, 116, 83, 116, 97, 114, 116, 115, 72, 101, 114, 101} If RadioButton1.Checked = True Then Dim PlainText As String = TextBox1.Text Dim PlainTextByteArray(PlainText.Length) As Byte For i As Integer = 0 To (PlainText.Length - 1) PlainTextByteArray(i) = CByte(AscW(PlainText.Chars(i))) Application.DoEvents() Next Dim PicAndText(PicBytes + PlainText.Length + SentinelString.Length) As Byte For t As Long = 0 To (PicBytes - 1) PicAndText(t) = PicByteArray(t) Next Dim count As Integer = 0 For r As Long = PicBytes To (PicBytes + (SentinelString.Length) - 1) PicAndText(r) = SentinelString(count) count += 1 Next count = 0 For q As Long = (PicBytes + SentinelString.Length) To (PicBytes + SentinelString.Length + PlainText.Length - 1)
55
PicAndText(q) = PlainTextByteArray(count) count += 1 Next buildPic.ShowDialog() Dim NewFileName As String = buildPic.FileName My.Computer.FileSystem.WriteAllBytes(NewFileName, PicAndText, False)
ElseIf RadioButton2.Checked Then TextBox3.Clear() Dim OutterSearch, InnerSearch, StopSearch As Boolean OutterSearch = True InnerSearch = True StopSearch = False Dim count As Long = 0 Dim leftCounter As Long Dim rightCounter As Integer leftCounter = 0 rightCounter = 0 Do While (count < (PicBytes - SentinelString.Length) And StopSearch = False) If (PicByteArray(count) = SentinelString(0)) Then leftCounter = count + 1 rightCounter = 1 InnerSearch = True Do While (InnerSearch = True) And (rightCounter < SentinelString.Length) _ And (leftCounter < PicByteArray.Length) If (PicByteArray(leftCounter) = SentinelString(rightCounter)) Then rightCounter += 1 leftCounter += 1 If (rightCounter = (SentinelString.Length - 1)) Then StopSearch = True End If Else InnerSearch = False count += 1 End If Loop Else count += 1 End If Loop If StopSearch = True Then 'leftCounter contains the starting string that is being retrieved Do While (leftCounter < PicBytes) 'Bytes need to be converted to an integer 'then to an unicode character which will be the plaintext TextBox3.AppendText(ChrW(CInt(PicByteArray(leftCounter)))) leftCounter += 1 Loop Else TextBox3.Text = "The Picture does not contain any text" End If
End If
56
End If
End Sub
Sub ResizeFileName(ByVal LongFileName As String, ByVal ShortFileName As String) If LongFileName.Length > 71 Then Dim LongFileNameSize As Integer = LongFileName.Length Dim ShortFileNameSize As Integer = ShortFileName.Length Dim Cut As Integer = 71 - (5 + ShortFileNameSize) Dim i As Integer TextBox2.Clear() For i = 0 To (Cut) - 1 TextBox2.AppendText(LongFileName.Chars(i)) Next For i = 0 To 4 TextBox2.AppendText(".") Next For i = 0 To (ShortFileNameSize - 1) TextBox2.AppendText(ShortFileName(i)) Next Else TextBox2.Text = LongFileName End If
End Sub
Private Sub RadioButton2_CheckedChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles RadioButton2.CheckedChanged TextBox1.Enabled = False End Sub
Private Sub RadioButton1_CheckedChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles RadioButton1.CheckedChanged TextBox1.Enabled = True End Sub
Private Sub PictureBox1_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles PictureBox1.Click
End Sub
Private Sub GroupBox1_Enter(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles GroupBox1.Enter
End SubEnd Class
Imports System.Data.OleDbPublic Class Form10 Public Fnam, temp As String Public ch As Char Public Sql As SQLDB Private Sub Button2_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button2.Click If OpenFileDialog1.ShowDialog <> Windows.Forms.DialogResult.Cancel Then TextBox2.Text = OpenFileDialog1.FileName
End If For i = 0 To Fnam.Length - 1 ch = Fnam(i) temp = temp & ch If ch = "\" Then temp = "" End If
Next
End Sub
Private Sub Form10_Load(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles MyBase.Load Sql = New SQLDB Sql.LoadSql()
End Sub
Private Sub Button1_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button1.Click Sql.SqlCommand = New OleDbCommand("select * from VideoData", Sql.SqlConnection) Sql.SqlDataReader = Sql.SqlCommand.ExecuteReader While Sql.SqlDataReader.Read
MsgBox(Sql.SqlDataReader.GetValue(1))
If temp = Sql.SqlDataReader.GetValue(1) And TextBox1.Text = Sql.SqlDataReader.GetValue(4) Then
Private Sub Button2_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button2.Click If OpenFileDialog1.ShowDialog <> Windows.Forms.DialogResult.Cancel Then TextBox1.Text = OpenFileDialog1.FileName RichTextBox1.LoadFile(OpenFileDialog1.FileName, RichTextBoxStreamType.PlainText)
End If End Sub
Private Sub Button1_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button1.Click Dim Val As String = Nothing
58
Dim Result As New System.Text.StringBuilder For Each Character As Byte In System.Text.ASCIIEncoding.ASCII.GetBytes(RichTextBox1.Text) Result.Append(Convert.ToString(Character, 2).PadLeft(8, "0")) Result.Append(" ") Next Val = Result.ToString.Substring(0, Result.ToString.Length - 1) RichTextBox2.Text = Val
Private Sub Button2_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button2.Click If OpenFileDialog1.ShowDialog <> Windows.Forms.DialogResult.Cancel Then TextBox1.Text = OpenFileDialog1.FileName RichTextBox1.LoadFile(OpenFileDialog1.FileName, RichTextBoxStreamType.PlainText)
End If End Sub
Private Sub Button1_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button1.Click Dim BinaryText As String = RichTextBox1.Text Dim Characters As String = Regex.Replace(BinaryText, "[^01]", "") Dim ByteArray((Characters.Length / 8) - 1) As Byte For Index As Integer = 0 To ByteArray.Length - 1 ByteArray(Index) = Convert.ToByte(Characters.Substring(Index * 8, 8), 2) Next RichTextBox2.Text = (ASCIIEncoding.ASCII.GetString(ByteArray)) RichTextBox2.SaveFile(OpenFileDialog1.FileName, RichTextBoxStreamType.PlainText) End SubEnd Class
Public Class Form2 Public Sql As SQLDB
Private Sub Button1_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button1.Click
End Sub
Private Sub Form2_Load(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles MyBase.Load
59
Sql = New SQLDB
End SubEnd Class
Public Class Form4
Private Sub Button2_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button2.Click Form1.Show() Form1.RadioButton2.Visible = False Form1.RadioButton1.Visible = True
End Sub
Private Sub Button1_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button1.Click Form1.Show() Form1.RadioButton2.Visible = True Form1.RadioButton1.Visible = False End Sub
Private Sub Button5_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button5.Click End
End Sub
Private Sub Button4_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button4.Click Form7.Show()
End Sub
Private Sub Button3_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button3.Click Form10.Show()
End Sub
Private Sub Button6_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button6.Click Form11.Show() Me.Hide()
End Sub
Private Sub Button7_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button7.Click Form12.Show() Me.Hide()
End SubEnd Class
Imports System.Data.OleDbPublic Class Form5 Public Sql As SQLDB
60
Private Sub Button1_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button1.Click Me.Hide() Form4.Show()
End Sub
Private Sub Button2_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button2.Click Sql.SqlCommand = New OleDbCommand("select * from UserDB", Sql.SqlConnection) Sql.SqlDataReader = Sql.SqlCommand.ExecuteReader While Sql.SqlDataReader.Read If Sql.SqlDataReader.GetValue(0) = TextBox1.Text Then TextBox2.Text = Sql.SqlDataReader.GetValue(1) TextBox3.Text = Sql.SqlDataReader.GetValue(2) TextBox4.Text = Sql.SqlDataReader.GetValue(3) TextBox5.Text = Sql.SqlDataReader.GetValue(4) End If End While End Sub
Private Sub Form5_Load(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles MyBase.Load End Sub
Private Sub Button4_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button4.Click Sql.SqlCommand = New OleDbCommand("delete * from UserDB", Sql.SqlConnection) Sql.SqlCommand.ExecuteNonQuery()
End SubEnd Class
Imports System.Data.OleDbPublic Class Form6 Public SQl As SQLDB
Private Sub Label5_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Label5.Click Form3.Show() Me.Hide()
End Sub Dim i As Integer Private Sub Button1_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button1.Click SQl.SqlCommand = New OleDbCommand("select * from UserDB", SQl.SqlConnection) SQl.SqlDataReader = SQl.SqlCommand.ExecuteReader While SQl.SqlDataReader.Read If TextBox1.Text = SQl.SqlDataReader.GetValue(0) And TextBox2.Text = SQl.SqlDataReader.GetValue(1) Then Me.Hide() Form4.Show() i = 2 Exit While Else
61
i = 1 End If
End While If i = 1 Then MsgBox("Invalid User") End End If
End Sub
Private Sub Form6_Load(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles MyBase.Load SQl = New SQLDB SQl.LoadSql()
End Sub
Private Sub Button2_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button2.Click End
End SubEnd Class
Public Class Form7 Public Fnam, temp As String Public ch As Char Dim i As Integer Private Sub Button2_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button2.Click If OpenFileDialog1.ShowDialog <> Windows.Forms.DialogResult.Cancel Then TextBox1.Text = OpenFileDialog1.FileName AxWindowsMediaPlayer1.URL = OpenFileDialog1.FileName Fnam = OpenFileDialog1.FileName
End If For i = 0 To Fnam.Length - 1 ch = Fnam(i) temp = temp & ch If ch = "\" Then temp = "" End If Next
End Sub
Private Sub Button5_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button5.Click Form8.vtext = temp Form8.vsource = OpenFileDialog1.FileName
Form8.Show()
End Sub
Private Sub Form7_Load(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles MyBase.Load
62
End SubEnd Class
Public Class Form8 Public vsource, tsource, ttext, vtext As String Public Fnam, temp As String Public ch As Char Dim i As Integer Private Sub Button5_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button5.Click Form9.vsource = vsource Form9.vtext = vtext Form9.ttext = ttext Form9.tsource = tsource
Form9.Show()
End Sub
Private Sub Button2_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button2.Click If OpenFileDialog1.ShowDialog <> Windows.Forms.DialogResult.Cancel Then TextBox1.Text = OpenFileDialog1.FileName RichTextBox1.LoadFile(OpenFileDialog1.FileName, RichTextBoxStreamType.PlainText)
Fnam = OpenFileDialog1.FileName
End If For i = 0 To Fnam.Length - 1 ch = Fnam(i) temp = temp & ch If ch = "\" Then temp = "" End If Next ttext = temp tsource = Fnam End Sub
Private Sub Form8_Load(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles MyBase.Load
End SubEnd Class
Imports System.Data.OleDbPublic Class Form9 Public vsource, tsource, ttext, vtext As String Public Sql As SQLDB
Private Sub Form9_Load(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles MyBase.Load RichTextBox1.LoadFile(tsource, RichTextBoxStreamType.PlainText) AxWindowsMediaPlayer1.URL = vsource Sql = New SQLDB Sql.LoadSql()
63
End Sub
Private Sub Button1_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button1.Click Sql.SqlCommand = New OleDbCommand("insert into VideoData values('" & vsource & "','" & vtext & "','" & tsource & "','" & ttext & "','" & TextBox1.Text & "')", Sql.SqlConnection) Sql.SqlCommand.ExecuteNonQuery() MsgBox("Encrypted") Me.Hide() Form4.Show()
End SubEnd Class
64
IMPLEMENTATION
IMPLEMENTATION PHASE
Implementation refers to post-sales process of guiding a client from purchase
to use of the software or hardware that was purchased. This includes Requirements
Analysis, Scope Analysis, Customizations, Systems Integrations, User Policies, User
Training and Delivery. These steps are often overseen by a Project Manager using
Project Management Methodologies set forth in the Project Management Body of
Knowledge. Software Implementations involve several professionals that are
relatively new to the knowledge based economy such as Business Analysts, Technical
Analysts, Solutions Architect, and Project Managers.
The implementation is the final and important phase. It involves User training,
system testing and successful running of the developed system. The users test the
developed system when changes are made according to the needs. The testing phase
involves the testing of the developed system using various kinds of data. An elaborate
testing of data is prepared and system is tested using the tests data.
Implementation is the stage where theoretical design turned into a working
system. Implementation is planed carefully to propose system to avoid unanticipated
problems. Many preparations involved before and during the implementation of
proposed system. The system needed to be plugged in to the organization’s network
then it could be accessed from anywhere, after a user logins into the portal. The tasks
that had to be done to implement the system were to create the database tables in the
organization database domain. Then the administrator was granted his role so that the
system could be accessed.
The next phase in the implementation was to educate the system. A
demonstration of all the functions that can be carried out by the system was given to
examination department person, who will make extensive use of the system.
In finance, technical analysis is security analysis discipline for forecasting the
direction of prices through the study of past market data, primarily price and volume.[1] Behavioral economics and quantitative analysis build on and incorporate many of
the same tools of technical analysis [2] [3][4] [5], which, being an aspect of active
management, stands in contradiction to much of modern portfolio theory. The efficacy
of both technical and fundamental analysis is disputed by efficient-market hypothesis
which states that stock market prices are essentially unpredictable.
Social Analysis
The role title has a wider meaning in relation to solving problems, but is more often
used in the narrower domain of Technical architecture - the context for the remainder
of this definition. In this context, the Solutions Architect is a very experienced
architect with cross-domain, cross-functional and cross-industry expertise. He/she
outlines solution architecture descriptions, then monitors and governs their