8/12/2019 Bluetooth Security Ppt3
1/27
SECURED DATA
TRANSMISSION THROUGH
NETWORKS
BY
8/12/2019 Bluetooth Security Ppt3
2/27
INTRODUCTION
Secured Data Transmission through Network handleshiding a secret message with in an image in such a way
that others cannot discern the presence or contents of
the hidden message.
A message might be hidden with in an image bychanging Least Significant Bit to be the message bits.
Then the image can be transmitted through Network.
LSB based Stenography is perhaps the most simple and
straight forward approach. In this project we embed the message in to the least
significant bit planes of the image.
8/12/2019 Bluetooth Security Ppt3
3/27
Since this will only affect each pixel by +/- 1, if at all, it is
generally assumed with good reason that degradation
caused by this embedding process would perceptually
transparent.
Hence there are a number of LSB based steganography
techniques in the passive warden model as it difficult to
differentiate cover-images from steno images, given the
small changes that have been made.
8/12/2019 Bluetooth Security Ppt3
4/27
ADVANTAGES
Secure data transmission or information hiding systemhas been developed to provide confidentiality securityservice.
Second and main advantage is if the hacker wants toextract the embedded message in image file he must
and should the following algorithms:a) Algorithm to extract the message from the image (Stego
algorithm),
b) Encryption algorithm,
c) Correct password for algorithm, and
d) Message process algorithm for check integrity ofmessage.
This increases levels of protection using encryptionalgorithm, the proposed system for steganography isstronger from the attacks than any other existing system.
8/12/2019 Bluetooth Security Ppt3
5/27
MODULE DESCRIPTION
There is 1 module in this Secured Data Transmission
over the Network. They are:User
User Module
The functionalities of the User module are:
A user runs application.
User selects data to process.
Application processes the data Encrypt or Decrypt data.
User sends or receives data securely.
8/12/2019 Bluetooth Security Ppt3
6/27
USE CASE DIAGRAM
A use case diagram is a diagram that shows a set of use cases and actorsand relationships.
8/12/2019 Bluetooth Security Ppt3
7/27
ACTIVITY DIAGRAM
An activity diagram shows the flow from activity to activity
Run Application Process:
8/12/2019 Bluetooth Security Ppt3
8/27
Encryption Process:
8/12/2019 Bluetooth Security Ppt3
9/27
Decryption Process:
8/12/2019 Bluetooth Security Ppt3
10/27
8/12/2019 Bluetooth Security Ppt3
11/27
8/12/2019 Bluetooth Security Ppt3
12/27
Types Of Testing
Smoke Testing.
Sanitary Testing. Regression Testing.
Re-Testing.
Static Testing.
Dynamic Testing.
Alpha-Testing.
Beta-Testing.
Monkey Testing.
Compatibility Testing.
Installation Testing.
Adhoc Testing.
Ext.
8/12/2019 Bluetooth Security Ppt3
13/27
TCD (Test Case Documentation)
STLC
Test Planning. Test Development.
Test Execution.
Result Analysis.
Bug-Tracing.
Reporting.
Microsoft Windows Standards
Manual Testing
Automation Testing (Tools) Win Runner.
Test Director
8/12/2019 Bluetooth Security Ppt3
14/27
HOME PAGE
8/12/2019 Bluetooth Security Ppt3
15/27
WRITE THE TEXT
8/12/2019 Bluetooth Security Ppt3
16/27
APPEND THE TEST WITH IMAGE
8/12/2019 Bluetooth Security Ppt3
17/27
ENTER OUTER FILE NAME
8/12/2019 Bluetooth Security Ppt3
18/27
IMAGE ENCODED
SUCCESSFULLY
8/12/2019 Bluetooth Security Ppt3
19/27
8/12/2019 Bluetooth Security Ppt3
20/27
NOW DECODE
8/12/2019 Bluetooth Security Ppt3
21/27
OPEN THE IMAGE WHICH YOU
WANT TO DECODE
8/12/2019 Bluetooth Security Ppt3
22/27
THE IMAGE WAS DECODED
SUCCESSFULLY
8/12/2019 Bluetooth Security Ppt3
23/27
DECODED DATA
8/12/2019 Bluetooth Security Ppt3
24/27
CONCLUSION
Until recently information hiding techniques received verymuch less attention from the research community and
from industry than cryptography.
Steganography has its place in security.
It is not intended to replace cryptography but supplementit.
In this system it has given an idea to enhance the
security of system with a by combining techniques.
It can enhance confidentiality of information and ofinformation and provides a means of communicating
privately.
8/12/2019 Bluetooth Security Ppt3
25/27
Here message is encrypted and then embed in imagefile with help of Steganographic system.
The system security further enhance by using password
to embed the message. This system explains a tiny fraction of the art of
steganography; it goes well beyond simply embedding
text in an image.
8/12/2019 Bluetooth Security Ppt3
26/27
SOFTWARE REQUIRMENTS
Click to add The minimum software requirement
specifications for developing this project are as follows:
Operating System : Window 2000, XP
Presentation layer : Java awt, Swingsjava.net;
Presentation : Power Point 2003
Documentation Tool : Ms Office / GoBe Productive
8/12/2019 Bluetooth Security Ppt3
27/27
HARDWARE REQUIRMENTS
The minimum hardware requirement specification fordeveloping this project is as follows:
Processor : Pentium IV/AMD Athelon (1.6 GHz)
RAM : 512MB RAM
Hard Disk : 10GB
Monitor : Standard Color Monitor
Keyboard : Standard Keyboard
Mouse : Standard Mouse
Top Related