SECURE DATA TRANSMISSION THROUGH NETWORK...ne
-
Upload
vijaybharadwaj202 -
Category
Documents
-
view
749 -
download
2
Transcript of SECURE DATA TRANSMISSION THROUGH NETWORK...ne
![Page 1: SECURE DATA TRANSMISSION THROUGH NETWORK...ne](https://reader033.fdocuments.net/reader033/viewer/2022050808/551674c0497959071e8b525f/html5/thumbnails/1.jpg)
SECURE DATA TRANSMISSION THROUGH NETWORK
![Page 2: SECURE DATA TRANSMISSION THROUGH NETWORK...ne](https://reader033.fdocuments.net/reader033/viewer/2022050808/551674c0497959071e8b525f/html5/thumbnails/2.jpg)
Introduction:
Secure data transmission
• Today in the widespread computer world the security of the data plays a vital role. Computer security is a process of preventing and protecting unauthorized use of your computer.
• Data security measures are needed to protect data during transmission.
![Page 3: SECURE DATA TRANSMISSION THROUGH NETWORK...ne](https://reader033.fdocuments.net/reader033/viewer/2022050808/551674c0497959071e8b525f/html5/thumbnails/3.jpg)
• A system for transmitting secure data between a sender’s terminal equipment and a recipient’s terminal equipment over a network.
• The system comprising a sender’s encryption server and a recipient’s encryption server.
• Each of the encryption serves comprise a data receiver, a decryptor an encryptor and a transmitter
![Page 4: SECURE DATA TRANSMISSION THROUGH NETWORK...ne](https://reader033.fdocuments.net/reader033/viewer/2022050808/551674c0497959071e8b525f/html5/thumbnails/4.jpg)
• The sender’s encryption server being data connectable to the sender’s terminal equipment over a first link of the network and to the recipient’s encryption server over a second link of the network.
• The receiver’s terminal equipment being further data connectable to the recipient’s terminal equipment over a third link of the network.
![Page 5: SECURE DATA TRANSMISSION THROUGH NETWORK...ne](https://reader033.fdocuments.net/reader033/viewer/2022050808/551674c0497959071e8b525f/html5/thumbnails/5.jpg)
EXISTING SYSTEM
Reliable data transmission over wireless networks has been subject of continuous research over the last decade
The data confronts the security risk during transmission over wireless network
It is relatively easy to listen secretly to a private on video/audio conversation intercept and modify data packets.
With the increase in the dependence of the organization on the information system, there exists an opportunity for the competitive organizations and disruptive forces to gain access to other organizations information system.
![Page 6: SECURE DATA TRANSMISSION THROUGH NETWORK...ne](https://reader033.fdocuments.net/reader033/viewer/2022050808/551674c0497959071e8b525f/html5/thumbnails/6.jpg)
Any one with a PC and access to the public network has the ability to capture network traffic, potentially compromising the privacy and the reliability of the applications
It is mandatory for wireless applications to guarantee authentication, confidentiality and integrity of data
![Page 7: SECURE DATA TRANSMISSION THROUGH NETWORK...ne](https://reader033.fdocuments.net/reader033/viewer/2022050808/551674c0497959071e8b525f/html5/thumbnails/7.jpg)
Proposed System
The index terms are used in this process are: LSB Technique. Transmission. Image viewer
1. LSB Technique:
The information is hidden in the least significant bits of the image data of the server sockets.
![Page 8: SECURE DATA TRANSMISSION THROUGH NETWORK...ne](https://reader033.fdocuments.net/reader033/viewer/2022050808/551674c0497959071e8b525f/html5/thumbnails/8.jpg)
2. Transmission:
The image containing information transmitted to network.
3. Image Viewer:
It is used to view the normal and stegoimages. quality measures gives the variation between original and stegoimage information.
![Page 9: SECURE DATA TRANSMISSION THROUGH NETWORK...ne](https://reader033.fdocuments.net/reader033/viewer/2022050808/551674c0497959071e8b525f/html5/thumbnails/9.jpg)
In the receiver side the same software is to be installed.
When the image file is opened the software tells the user whether that contains any hiding information or not.
If the image contains hidden information then client sockets will receive it.
Most of the 600 filling stations and companys are needs a powerful and capable system to transport and pick-up data from each location all over the country
![Page 10: SECURE DATA TRANSMISSION THROUGH NETWORK...ne](https://reader033.fdocuments.net/reader033/viewer/2022050808/551674c0497959071e8b525f/html5/thumbnails/10.jpg)
Modules:
• 1. Login.• 2.Key Exchange Algorithm.• 3.Encryption Algorithm.• 4.Send File.• 5. View File.
![Page 11: SECURE DATA TRANSMISSION THROUGH NETWORK...ne](https://reader033.fdocuments.net/reader033/viewer/2022050808/551674c0497959071e8b525f/html5/thumbnails/11.jpg)
1.Login
• This is one of the module is used to login into the
network.
• Here there are three pc’s are connected to make a network.
![Page 12: SECURE DATA TRANSMISSION THROUGH NETWORK...ne](https://reader033.fdocuments.net/reader033/viewer/2022050808/551674c0497959071e8b525f/html5/thumbnails/12.jpg)
2.Key Exchange Algorithm
• Diffie –Hellman key exchange Algorithm is used in this project.
• Diffie–Hellman key exchange is a specific method of exchanging keys.
• The Diffie–Hellman key exchange method allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure communications channel.
![Page 13: SECURE DATA TRANSMISSION THROUGH NETWORK...ne](https://reader033.fdocuments.net/reader033/viewer/2022050808/551674c0497959071e8b525f/html5/thumbnails/13.jpg)
3.Encryption Algorithm
Encryption is the process of converting a plaintext message into ciphertext which can be decoded back into the original message.
An encryption algorithm along with a key is used in the encryption and decryption of data.
In conventional symmetric encryption a single key is used. With this key, the sender can encrypt a message and a recipient can decrypt the message but the security of the key becomes problematic.
![Page 14: SECURE DATA TRANSMISSION THROUGH NETWORK...ne](https://reader033.fdocuments.net/reader033/viewer/2022050808/551674c0497959071e8b525f/html5/thumbnails/14.jpg)
4.Send File
Now the sender can send the file which can be encrypted.
The encrypted file transferred to the receiver through network.
5.View File• The receiver receives the file which can be sent by
the sender.
• The Receiver can view the received file and access the information.
![Page 15: SECURE DATA TRANSMISSION THROUGH NETWORK...ne](https://reader033.fdocuments.net/reader033/viewer/2022050808/551674c0497959071e8b525f/html5/thumbnails/15.jpg)
Scope of the Project:
• A management system is used to secure a communications channel between at least two clients.
• The management system includes a network management server which includes network management software.
• The network management server is coupled to the clients for managing the communication between clients.
![Page 16: SECURE DATA TRANSMISSION THROUGH NETWORK...ne](https://reader033.fdocuments.net/reader033/viewer/2022050808/551674c0497959071e8b525f/html5/thumbnails/16.jpg)
• The network management system further includes at least two secured communication channels established by the network management server between the network management server and each of the clients respectively.
• So that at least two clients can securely communicate with each other
![Page 17: SECURE DATA TRANSMISSION THROUGH NETWORK...ne](https://reader033.fdocuments.net/reader033/viewer/2022050808/551674c0497959071e8b525f/html5/thumbnails/17.jpg)
HardWare Requirements:
1. PIII 1.2 GHz Processor.
2. RAM 512MB.
3. HDD 20GB HARD DISK SPACE.
Software Requirements:
1.WINDOWS OS(XP)
2.JAVA,JSP,JDBC,SERVLETS
3.TOMCAT 5.0
4.NET BEANS
5.ORACLE 9i
![Page 18: SECURE DATA TRANSMISSION THROUGH NETWORK...ne](https://reader033.fdocuments.net/reader033/viewer/2022050808/551674c0497959071e8b525f/html5/thumbnails/18.jpg)
CONCLUSION
This project “Secured Data Transmission through Network” handles hiding a secret message with in an image in such a way others cannot discern the presence or contents of the hidden message.
![Page 19: SECURE DATA TRANSMISSION THROUGH NETWORK...ne](https://reader033.fdocuments.net/reader033/viewer/2022050808/551674c0497959071e8b525f/html5/thumbnails/19.jpg)
SCREEN SHOTS
![Page 20: SECURE DATA TRANSMISSION THROUGH NETWORK...ne](https://reader033.fdocuments.net/reader033/viewer/2022050808/551674c0497959071e8b525f/html5/thumbnails/20.jpg)
![Page 21: SECURE DATA TRANSMISSION THROUGH NETWORK...ne](https://reader033.fdocuments.net/reader033/viewer/2022050808/551674c0497959071e8b525f/html5/thumbnails/21.jpg)
![Page 22: SECURE DATA TRANSMISSION THROUGH NETWORK...ne](https://reader033.fdocuments.net/reader033/viewer/2022050808/551674c0497959071e8b525f/html5/thumbnails/22.jpg)
![Page 23: SECURE DATA TRANSMISSION THROUGH NETWORK...ne](https://reader033.fdocuments.net/reader033/viewer/2022050808/551674c0497959071e8b525f/html5/thumbnails/23.jpg)
![Page 24: SECURE DATA TRANSMISSION THROUGH NETWORK...ne](https://reader033.fdocuments.net/reader033/viewer/2022050808/551674c0497959071e8b525f/html5/thumbnails/24.jpg)
![Page 25: SECURE DATA TRANSMISSION THROUGH NETWORK...ne](https://reader033.fdocuments.net/reader033/viewer/2022050808/551674c0497959071e8b525f/html5/thumbnails/25.jpg)
![Page 26: SECURE DATA TRANSMISSION THROUGH NETWORK...ne](https://reader033.fdocuments.net/reader033/viewer/2022050808/551674c0497959071e8b525f/html5/thumbnails/26.jpg)
![Page 27: SECURE DATA TRANSMISSION THROUGH NETWORK...ne](https://reader033.fdocuments.net/reader033/viewer/2022050808/551674c0497959071e8b525f/html5/thumbnails/27.jpg)
![Page 28: SECURE DATA TRANSMISSION THROUGH NETWORK...ne](https://reader033.fdocuments.net/reader033/viewer/2022050808/551674c0497959071e8b525f/html5/thumbnails/28.jpg)
![Page 29: SECURE DATA TRANSMISSION THROUGH NETWORK...ne](https://reader033.fdocuments.net/reader033/viewer/2022050808/551674c0497959071e8b525f/html5/thumbnails/29.jpg)
![Page 30: SECURE DATA TRANSMISSION THROUGH NETWORK...ne](https://reader033.fdocuments.net/reader033/viewer/2022050808/551674c0497959071e8b525f/html5/thumbnails/30.jpg)
![Page 31: SECURE DATA TRANSMISSION THROUGH NETWORK...ne](https://reader033.fdocuments.net/reader033/viewer/2022050808/551674c0497959071e8b525f/html5/thumbnails/31.jpg)
By our team:
Arun KumarNagarajuGovardhanNaresh