Top Banner

Click here to load reader

Project Synopsis

Nov 19, 2014

ReportDownload

Documents

DIGITAL WATER MARKINGObjective: A digital watermark is a digital signal or pattern inserted into a digital image. Since this signal or pattern is present in each unaltered copy of the original image, the digital watermark may also serve as a digital signature for the copies. A given watermark may be unique to each copy (e.g., to identify the intended recipient), or be common to multiple copies (e.g., to identify the document source). In either case, the watermarking of the document involves the transformation of the original into another form. This distinguishes digital watermarking from digital fingerprinting where the original file remains intact, but another file is created that "describes" the original file's content. As a simple example, the checksum field for a disk sector would be a fingerprint of the preceding block of data. Similarly, hash algorithms produce fingerprint files. Description: Digital watermarking is also to be contrasted with public-key encryption, which also transform original files into another form. It is a common practice nowadays to encrypt digital documents so that they become un-viewable without the decryption key. Unlike encryption, however, digital watermarking leaves the original digital data (image or file) basically intact and recognizable. In addition, digital watermarks, as signatures, may not be validated without special software. Digital watermarks are designed to be persistent in viewing, printing, or subsequent re-transmission or dissemination. Thus, watermarking does not prevent copying, but it deters illegal copying by providing a means for establishing the original ownership of a redistributed copy. Digital Watermarking Watermarking is not a new technique. It is descendent of a technique known as Steganography which had been in existence for at least a few hundred years. Steganography is a technique for concealed communication. In contrast to cryptography where the content of a communicated message is secret, in Steganography the very existence of the message that is communicated is a secret and its presence is known only by parties involved in the communication. Steganography is technique where a secret message is hidden within another unrelated message and then communicated to the other party. Some of the techniques of Steganography like use of invisible ink, word spacing patterns in printed documents, coding messages in music compositions, etc., have been used by military intelligence since the times of ancient Greek civilization

Watermarking can be considered as a special technique of Steganography where one message is embedded in another and the two messages are related to each other in some way. The most common examples of watermarking are the presence of specific patterns in currency notes which are visible only when the note is held to light and logos in the background of printed text documents. The watermarking techniques prevent forgery and unauthorized replication of physical objects.

Digital watermarking is similar to watermarking physical objects except that the watermarking technique is used for digital content instead of physical objects. In digital watermarking a low-energy signal is imperceptibly embedded in another signal. The low-energy signal is called watermark and it depicts some metadata, like security or rights information about the main signal. The main signal in which the watermark is embedded is referred to as cover signal since it covers the watermark. The cover signal is generally a still image, audio clip, video sequence or a text document in digital format.

HARDWARE REQUIREMENTS Processors Hard Disk Key Board Mouse : Pentium, Celeron, Athol on etc. : Minimum 10 GB & maximum 40GB : Logitech (Multimedia compatible) : Logitech (Scroll or Optical)

SOFTWARE REQUIREMENTS Operating System Language Memory Data Base : Windows 95 / 98 / 2000 XP : Java 2 Standard edition 1.5 : Virtual Memory : ORACLE 8i or later versions

Secure Data TransmissionObjective: Objective: The system deals with security during transmission of data. Commonly used technology is cryptography. This system deals with implementing security-using Steganography. Description: Description: In this technology, the end user identifies an image which is going to act as the carrier of data. The data file is also selected and then to achieve greater speed of transmission the data file and image file are compressed and sent. Prior to this the data is embedded into the image and then sent. The image if hacked or interpreted by a third party user will open up in any image previewer but not displaying the data. This protects the data from being invisible and hence be secure during transmission. The user in the receiving end uses another piece of code to retrieve the data from the image.

Steganography is the art and science of hiding that communication is happening. Classical Steganography systems depend on keeping the encoding system secret, but modern steganography is detectable only if secret information is known, e.g. a secret key. Because of their invasive nature, steganography systems leave detectable traces within a medium's characteristics. This allows an eavesdropper to detect media that has been modified, revealing that secret communication is taking place. Although the secrecy of the information is not degraded, its hidden nature is revealed, defeating the main purpose of Steganography.

For JPEG images, Outguess preserves statistics based on frequency counts. As a result, statistical tests based on frequency counts are unable to detect the presence of steganographic content. Before embedding data into an image, Outguess can determine the maximum message size that can be hidden while still being able to maintain statistics based on frequency counts.

Outguess uses generic iterators object to select which bits in the data should be modified. A seed can be used to modify the behavior of the iterator. It is embedded in the data along with the rest of the message. By altering the seed, Outguess tries to find a sequence of bits that minimizes the number of changes in the data that have to be made.

Compression reduces the average code length used to represent the symbols of an alphabet. Symbols of the source alphabet which occur frequently are assigned with short length codes. The general strategy is to allow the code length to vary from character to character and to ensure that the frequently occurring

character have shorter codes. In Radix64 compression technique, maps arbitrary input into printable character output. The form of encoding has the following relevant characteristics. The range of the function is a character set that is universally re-presentable at all sites, not a specific binary encoding of that character set. Thus, the characters themselves can be encoded into whatever form is needed by a specific system. For instance, the character 'E' is represented in ASCII system as a hexadecimal 45 and in EDCDIC- based system as hexadecimal- c5.

The character set consists of 65 printable characters, one of which is used for padding. With 2^6 = 64 available characters, each character can be used to represent 6 bits of input. No control characters are included in the set. Thus, the message encoded in Radix-64 can traverse mail-handling system. That scans the data stream for control characters. The hyphen character "- is not included.

CRCSET is an anti-virus utility.

Its purpose is to protect programs from third parties

manipulation .CRC set is the most effective weapons against computer viruses. This the Cyclic Redundancy Check, or CRC, is an error-checking algorithm used in many types of computer operations, especially in data transfer.

Before transmitting the data, the utility want to calculate the CRC value and attach with data. In receiving end, the CRC recalculated and based on that calculated value, it will specify the acceptation or rejection. Description: Module Description: This project contains five modules. They are Graphical User Interface Data Embed and Retrieve Compression and Decompression CRC generation. CRC Verification Software Software Requirements: Operating System Software : window 2000 or XP : jdk 1.4 or above

Intrusion Detection SystemObjective: The project titled Intrusion Detection System in Networking Using Genetic Algorithm (IDS) is for Global Techno Solutions. The main objective of this system shows how real time network connection behavior can be modeled as chromosomes and how the parameters in genetic algorithm can be defined in this respect. Description: The project titled Intrusion Detection System in Networking Using Genetic Algorithm (IDS) is to identify the intruder and block the data from the intruder to avoid the system attack by the virus. This new system is a replacement of the existing system. In existing system, at run time it will not create a set of rules. The major components of the system are creating new set of rules during run time. Interest and knowledge about computer and network security is growing along with the need for it. This interest is, no doubt, due to the continued expansion of the Internet and the increase in the number of businesses that are migrating their sales and information channels to the Internet. The growth in the use of networked computers in business, especially for e-mail, has also fueled this interest. Many people are also presented with the post-mortems of security breaches in high-profile companies in the nightly news and are given the impression that some bastion of defense had failed to prevent some intrusion. One result of these influences is that that many people feel that Internet security and Internet firewalls are synonymous. Although we should know that no single mechanism or method will provide for the entire computer and network security needs of an enterprise, man