bluetooth security ppt3

Upload: sanjib-ranjan-das

Post on 03-Jun-2018

235 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/12/2019 Bluetooth Security Ppt3

    1/27

    SECURED DATA

    TRANSMISSION THROUGH

    NETWORKS

    BY

  • 8/12/2019 Bluetooth Security Ppt3

    2/27

    INTRODUCTION

    Secured Data Transmission through Network handleshiding a secret message with in an image in such a way

    that others cannot discern the presence or contents of

    the hidden message.

    A message might be hidden with in an image bychanging Least Significant Bit to be the message bits.

    Then the image can be transmitted through Network.

    LSB based Stenography is perhaps the most simple and

    straight forward approach. In this project we embed the message in to the least

    significant bit planes of the image.

  • 8/12/2019 Bluetooth Security Ppt3

    3/27

    Since this will only affect each pixel by +/- 1, if at all, it is

    generally assumed with good reason that degradation

    caused by this embedding process would perceptually

    transparent.

    Hence there are a number of LSB based steganography

    techniques in the passive warden model as it difficult to

    differentiate cover-images from steno images, given the

    small changes that have been made.

  • 8/12/2019 Bluetooth Security Ppt3

    4/27

    ADVANTAGES

    Secure data transmission or information hiding systemhas been developed to provide confidentiality securityservice.

    Second and main advantage is if the hacker wants toextract the embedded message in image file he must

    and should the following algorithms:a) Algorithm to extract the message from the image (Stego

    algorithm),

    b) Encryption algorithm,

    c) Correct password for algorithm, and

    d) Message process algorithm for check integrity ofmessage.

    This increases levels of protection using encryptionalgorithm, the proposed system for steganography isstronger from the attacks than any other existing system.

  • 8/12/2019 Bluetooth Security Ppt3

    5/27

    MODULE DESCRIPTION

    There is 1 module in this Secured Data Transmission

    over the Network. They are:User

    User Module

    The functionalities of the User module are:

    A user runs application.

    User selects data to process.

    Application processes the data Encrypt or Decrypt data.

    User sends or receives data securely.

  • 8/12/2019 Bluetooth Security Ppt3

    6/27

    USE CASE DIAGRAM

    A use case diagram is a diagram that shows a set of use cases and actorsand relationships.

  • 8/12/2019 Bluetooth Security Ppt3

    7/27

    ACTIVITY DIAGRAM

    An activity diagram shows the flow from activity to activity

    Run Application Process:

  • 8/12/2019 Bluetooth Security Ppt3

    8/27

    Encryption Process:

  • 8/12/2019 Bluetooth Security Ppt3

    9/27

    Decryption Process:

  • 8/12/2019 Bluetooth Security Ppt3

    10/27

  • 8/12/2019 Bluetooth Security Ppt3

    11/27

  • 8/12/2019 Bluetooth Security Ppt3

    12/27

    Types Of Testing

    Smoke Testing.

    Sanitary Testing. Regression Testing.

    Re-Testing.

    Static Testing.

    Dynamic Testing.

    Alpha-Testing.

    Beta-Testing.

    Monkey Testing.

    Compatibility Testing.

    Installation Testing.

    Adhoc Testing.

    Ext.

  • 8/12/2019 Bluetooth Security Ppt3

    13/27

    TCD (Test Case Documentation)

    STLC

    Test Planning. Test Development.

    Test Execution.

    Result Analysis.

    Bug-Tracing.

    Reporting.

    Microsoft Windows Standards

    Manual Testing

    Automation Testing (Tools) Win Runner.

    Test Director

  • 8/12/2019 Bluetooth Security Ppt3

    14/27

    HOME PAGE

  • 8/12/2019 Bluetooth Security Ppt3

    15/27

    WRITE THE TEXT

  • 8/12/2019 Bluetooth Security Ppt3

    16/27

    APPEND THE TEST WITH IMAGE

  • 8/12/2019 Bluetooth Security Ppt3

    17/27

    ENTER OUTER FILE NAME

  • 8/12/2019 Bluetooth Security Ppt3

    18/27

    IMAGE ENCODED

    SUCCESSFULLY

  • 8/12/2019 Bluetooth Security Ppt3

    19/27

  • 8/12/2019 Bluetooth Security Ppt3

    20/27

    NOW DECODE

  • 8/12/2019 Bluetooth Security Ppt3

    21/27

    OPEN THE IMAGE WHICH YOU

    WANT TO DECODE

  • 8/12/2019 Bluetooth Security Ppt3

    22/27

    THE IMAGE WAS DECODED

    SUCCESSFULLY

  • 8/12/2019 Bluetooth Security Ppt3

    23/27

    DECODED DATA

  • 8/12/2019 Bluetooth Security Ppt3

    24/27

    CONCLUSION

    Until recently information hiding techniques received verymuch less attention from the research community and

    from industry than cryptography.

    Steganography has its place in security.

    It is not intended to replace cryptography but supplementit.

    In this system it has given an idea to enhance the

    security of system with a by combining techniques.

    It can enhance confidentiality of information and ofinformation and provides a means of communicating

    privately.

  • 8/12/2019 Bluetooth Security Ppt3

    25/27

    Here message is encrypted and then embed in imagefile with help of Steganographic system.

    The system security further enhance by using password

    to embed the message. This system explains a tiny fraction of the art of

    steganography; it goes well beyond simply embedding

    text in an image.

  • 8/12/2019 Bluetooth Security Ppt3

    26/27

    SOFTWARE REQUIRMENTS

    Click to add The minimum software requirement

    specifications for developing this project are as follows:

    Operating System : Window 2000, XP

    Presentation layer : Java awt, Swingsjava.net;

    Presentation : Power Point 2003

    Documentation Tool : Ms Office / GoBe Productive

  • 8/12/2019 Bluetooth Security Ppt3

    27/27

    HARDWARE REQUIRMENTS

    The minimum hardware requirement specification fordeveloping this project is as follows:

    Processor : Pentium IV/AMD Athelon (1.6 GHz)

    RAM : 512MB RAM

    Hard Disk : 10GB

    Monitor : Standard Color Monitor

    Keyboard : Standard Keyboard

    Mouse : Standard Mouse