YOU ARE DOWNLOADING DOCUMENT

SRS

Category:

Documents

SRS

Please tick the box to continue:

Transcript
Page 1: SRS

Shri Vaishnav Institute Of Technology And ScienceIndore

“ SECURE FILE TRANSACTION ”

Minor Project SRS Submitted towards partial fulfillment of the degree of Bachelor of Engineering

Year 2009-2010

Department of Information Technology

Guided By: Submitted By:MR. ANAND RAJAWAT Anil Kumar (1010)MR. ANKIT DONGRE Ankur singh (1016 )MRS. RUPALI BHARTIYA Rohit Nayak (1048)

Vikash Kumar(1059) Aditi Vyas (1003)

Shri Vaishnav Institute of Technology & Science Gram Baroli (Indore – Sanwer Road), Distt. Indore (M.P.) 453331

Page 2: SRS

Index and Tables:

1) Introduction

1.1) Purpose:.............................................................................................................4

1.2) Scope: ..............................................................................................................4

1.3) Abbreviations: ..................................................................................................5

1.4) References:........................................................................................................5

1.5) Technologies: ...................................................................................................5 2) Overall Description

2.01) Product Perspective: ...................................................................................... 6

2.02) Software Interface:......................................................................................... 6

2.03) Hardware Interface: ....................................................................................... 7

2.04) Communication Interface: ............................................................................. 7

2.05) Product Function:........................................................................................... 7

2.06) User Characteristics:..................................................................................... 10

2.07) Constraints: ..................................................................................................11

2.08) Use-Case Model Survey:.............................................................................. 12

2.09) Architecture diagram: ...................................................................................13

2.10) Database design: ...........................................................................................13

2.11) Assumptions and Dependencies: ..................................................................14 3) Specific Requirements

3.1) Use-Case Reports:............................................................................................14

3.2) Supplementary Requirements: ........................................................................36

Page 3: SRS

IntroductionIntroduction

Page 4: SRS

1. INTRODUCTION:

In SecureMessage Transaction we use the concept of Steganography.Steganoraphy is the science of hiding information in the form of image. Steganography is "the art of writing in cipher, or in characters, which are not intelligible except to persons who have the key; cryptography". In computer terms, steganography has evolved into the practice of hiding a message within a larger one in such a way that others cannot discern the presence or contents of the hidden message. In contemporary terms , steganography has evolved into a digital strategy of hiding a file or message in some form of multimedia, such as an image, an audio file (like a .wav or mp3) or even a video file.

Steganography is an evolving branch of cryptography. People not only want their messages to be encrypted but they want to hide the existence of such information. A variety of systems are providing this facility of hiding information. But, nobody can deny the fact that with a lot of hard work and sincere effort any good cryptologist could find whether information is hidden in a file or not. Since we don’t want such persons to learn our information, we need some system such that even when the information is revealed, it should be of no use.

1.1 Purpose:

communication is the backbone of any enterprise. Communication, without exchange of data, is unimaginable. In the context of communication between Enterprise level applications, the amount of data would be huge.

So using traditional approaches in Electronic Data Interchange wouldn't suffice. For our project we have introduced and incorporated the theoretical ideas of Steganography directly into the sending and receiving of e-mails through our e-mail application. It makes use of Steganography System along with the required text for the mail from user. This is a default security system for message sending .To enable Steganographic features into the message text for email application, generation of keys plays a significant role. The public and private keys should be generated depending upon the user input on the key selected and based on the bit value for which the operations

should be perform.The amount of sophistication involved in sending a secured message is the main feature of this application. This level of security would definitely give the hackers a hard chase even coming close to knowing the message,

Page 5: SRS

1.2 Scope:

Scope of this project is very broad in terms of exchanging information.

SMT is a software which is used in exchanging the information in LAN .Important files carrying confidential information can be stored in the server in an encrypted form . It provides a better-secured data storage and transmission both at the system level and network level.

Few scope of the project are:1.Messages do not attract attention to themselves.2. The tool should be easy to use, and should use a graphical user interface.3. The tool works cross-platform.4. Small file distortions after hiding information.5. It is possible to extract info after it has been compressed.6. Information is protected with password7. Unique.

1.3 Abbreviation:

HTTP: Hypertext Transfer Protocol. HTML: Hypertext Markup Language. JSP: Java Server Pages. JDK: Java Development Kit.

JDBC: Java Database Connectivity.

1.4 References:

IEEE SRS format TGMC SRS format

Software engineering by roger s. pressman www.google.com www.wikipedia.com

1.5. Technologies:

Page 6: SRS

Operating System required is Win NT/2000/XP Java Development kit 1.6 or above HTML Java server pages(JSP) Jdbc Apache Tomcat 6.0 or above. Rational Rose Enterprise Edition

Front End: Sun Java( jdk 1.6)

Html Jsp Apache Tomcat 6.0 or above

Design Tool:

Rational Rose Enterprise Edition

Back End:

Microsoft SQL Server 2005

Page 7: SRS

Overall Description

Page 8: SRS

2.OVERALLDESCRIPTION:

2.1 Product Prespective:

The whole process of hiding the information with the concept of steganography.

Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message; this is in contrast to cryptography, where the existence of the message itself is not disguised, but the content is obscured The following formula provides a very generic description of the pieces of the steganographic process:

covermedium + hiddendata + stegokey = stegomedium

In this context, the covermedium is the file in which we will hide the hiddendata, which may also be encrypted using the stegokey. The resultant file is the stegomedium (which will, of course. be the same type of file as the covermedium). The covermedium (and, thus, the stegomedium) are typically images or audio file

Steganography hides the message in the image by doing the following:

1. Reducing the message to the 64-character set beginning with the space character in the ASCII table. Each character can then be represented by six bits,

2. Decomposing each six-bit character into three groups of two bits each.

3. Replacing the two least-significant bits (LSB) in the red, green, and blue values for a given pixel by the three groups of two bits. Thus, each pixel can carry one six-bit character.

Page 9: SRS

2.2 Software Interface :

FRONT-END: JAVA

Java is object-oriented language and supports encapsulation, inheritance,

polymorphism and dynamic binding, but does not support multiple

inheritances. Everything in java is an object except some primitive data

types.

 Java is portable architecture neutral that is java programs once compiled

can be executed on any machine that is enabled.

Java has been used just because of the platform independence The basic reasons to use Java are:

Platform Independence: This feature helps to run our software on various operating system.

Safe and Secure: This security feature helps in confining our software to the Java Environment and not allowing it to access the other parts of computer.

Object Oriented: This feature allows us to design our software from any blank state. This feature of JAVA

JDK 1.5: Java Development Kit 1.5 or above will be required for compiling the code.

JRE 1.5: Java Runtime Environment 1.5 is at least needed to run this software efficiently.

Windows 98 or above operating system only supports it.

BACK-END:

Microsoft SQL Server 2005

Microsoft SQL Server is a relational model database server. In this system all the questions and their answers are stored in the database and all the information of examinee is also stored in it.

Page 10: SRS

2.3 Hardware interface:

Microprocessor 166 MHz or HigherHard Disk Min 60 MBMemory 16 MB (At least)Display CGA/VGA or higherKey Board 84/109 Keys

2.4 Communication interface :

HTTP: Hypertext Transfer Protocol is a transaction oriented client/server protocol between web browser & a Web Server.

FTP: File Transfer Protocol (FTP) is a standard network protocol used to exchange and manipulate files over a TCP/IP-based network, such as the Internet. FTP is built on a client-server architecture and utilizes separate control and data connections between the client and server applications. FTP is used with user-based password authentication or with anonymous user access.

2.5 Product Function:

The product function in our proposed system is that, we have tried to reduce the problems that have previously occurred in hiding the information, so thereby keeping that problems in mind we are providing the better facilities to user. So the user can hide the information and do their work properly.

Utilities:- Hides the information from the unwanted user. Information is protected with password. It is best to use for sending top secret data related to defense and scientific

research. Small file distortions after hiding information.

Define the functions:-

Login to the first page.

Page 11: SRS

Page showing various options.

Perform Required action

Milestone: Definition Complete

2.6 User Characteristics:

Every user should be comfortable of working with computer and should have a basic idea about the functions of image editing softwares.

No special knowledge or skills shall be assumed on the part of the users. Users shall not be expected to learn a set of commands in order to start using the application. Users shall not be expected to remember a list of commands while using the software – these shall be provided via file menus, or help screens.

2.7 Constraints :

GUI is only in English i.e no other language option is available. User can login only with his assigned username and password i.e no guest facilty

is available. Limited to HTTP/HTTPS. This system is working for single server. There is no maintainability of back up so availability will get effected.

2.11 Assumptions and Dependencies :

All the functions are predefined. so user can not change them. User will open all picture formats such as .jpg, .bmp, .gif and also audio & vedio file, but It is assumed that user must be used Encrypt password for hide the data file otherwise Encrypt data file can’t be retrieve, No other special assumptions or dependencies have been identified.

Page 12: SRS

Specific Requirements

Page 13: SRS

3.1 Use-Case Reports: Use case description

Architect Diagram:

Navigation Summary

Login

Embed file

Retrive Messge

Page 14: SRS

Main Use Case Diagram model survey

User

Save & quit

Edit & change

Embed message

Retrive File

Page 15: SRS
Page 16: SRS

Use case for login user

Post Condition: None.

Use case for registor new userPost Condition Post Condition: A new user has been added to the database.

Page 17: SRS

Use case for verify login user

Page 18: SRS

Login Activity Diagram

Page 19: SRS

Use case for encryption

Successfully encrypt

Page 20: SRS

Use case for decryption

3.2) Supplementary Requirements:

Page 21: SRS

Functionality: The administrator add the new user or any other new information to the database. It also takes the data on the basis of requirement from the database. He is the main authority to manage the data in the system.

Usability: The Software is usable when a new user comes, want to add or delete some records from the database.

Reliability: This Software is reliable as the data is efficiently added in the database.

Performance: The Performance can be measured in terms of the efficient entry of the data into the database with a great ease.

Supportability: This Software is supportable on windows platform. It can also be

used on Linux platform.

Security: This Software provides a considerable amount of security as the data cannot be deleted or added by any user. It is done by a authenticated user.

1. This software can be used by any registored user .

2. This software is fast and easy to execute so it takes very less time and requires less memory and CPU usage.

3. No extra memory is required to execute it.


Related Documents