project blog responsive ads

Free download management system project documentation with JAVA, PHP AND ASP.NET source code. In all project report you will get introduction and objective of the project, system analysis, feasibility study, project planning, DFD diagram, system design, database design, complete project coding, and ER diagram of the project. These project reports and synopsis are useful for BCA, MCA BSC CS, MSC IT B.TECH, M.TECH and BE computer science last year students IGNOU, SMU university final year projects

Sponsored Links

Wednesday, December 11, 2013

bca final year projects in asp.net free download

bca final year projects in asp.net free download


BCA PROJECT # 2- Hospital Information System
FRONT END - VB6.0
BACK END - SQL SEVER 2000

FRONTEND - C # AND .NET FRAMEWORK 

BACKEND - SQL SERVER 2008

SYNOPSIS OF PROJECT  ONLINE AUCTION SYSTEM

FINAL REPORT WITH FULL DOCUMENTATION and SOURCE CODE  OF PROJECT  ONLINE AUCTION SYSTEM

                              CRYPTOGRAPHY

 Cryptography is the science of writing in secret code and is an ancient art Cryptography has a long and colorful history. It can reformat and transform your data, making it safer on its trip between computers. Cryptography is not only the means of providing information security, but rather one set of techniques. Crypto techniques give the right balance of communication capabilities and security protection. Cryptography allows people to carry over the confidence found in the physical world to the electronic world. In data and telecommunications, cryptography is necessary when communicating over any non trusted medium, which includes just about any network, particularly the Internet.

Within the context of any application-to-application communication, there are some specific security requirements, including:

Authentication: The process of proving one's identity.

Privacy/confidentiality: Ensuring that no one can read the message except the intended receiver.

Integrity: Assuring the receiver that the received message has not been altered in any way from the original.

Non-repudiation: A mechanism to prove that the sender really sent this message.

 

Cryptography, then, not only protects data from theft or alteration, but can also be used for user authentication. There are, in general, three types of cryptographic schemes typically used to accomplish these goals: secret key (or symmetric) cryptography, public-key (or asymmetric) cryptography, and hash functions, each of which is described below. In all cases, the initial unencrypted data is referred to as plaintext. It is encrypted into cipher text, which will in turn (usually) be decrypted into usable plaintext.

 

The following is done, firstly

GENERATION: This part deals with the generation of CRC for the Actual Data. The CRC generated is stored back with the Actual Data.

VERIFICATION: At the receiving end the CRC is calculated for the received data and then compared with the CRC of the Actual Data. The CRC values of both the data, if match, then the data is accepted by the receiver else it is rejected indicating that the data is corrupted.

COMPRESSION: It compresses or packs the data in order to reduce the file size. We shall compress the .Actual Data & the CRC together and then transmitted. Compression in turn also leads to the automatic Encryption of the Actual Data & CRC.

DE-COMPRESSION: The receiver receives the compressed file and performs the decompression process in order to retrieve the actual sized file. A new file is created that contains the CRC and the Actual Data.

EMBED: The compressed data & CRC file is appended (embed) to the end of the image file without affecting the image data or the header information of that image. The software stores the data in a format that is not recognizable even when viewed from a text or document editor.

DE-EMBED: At the receiving end the module identify the location of the data picks up the size of the file, filename and reads the data to the length of the data file and regenerate the text file that was embedded with in the image file.

  

The system deals with security during transmission of data. Commonly used technology is cryptography. This system deals with implementing security-using steganography.

                        In this technology, the end user identifies an image which is going to act as the carrier of data. The data file is also selected and then to achieve greater speed of transmission the data file and image file are compressed and sent. Prior to this the data is embedded into the image and then sent. The image if hacked or interpreted by a third party user will open up in any image previewer but not displaying the data. This protects the data from being invisible and hence be secure during transmission. The user in the receiving end uses another piece of code to retrieve the data from the image.

                  Steganography is the art and science of hiding that communication is happening. Classical steganography systems depend on keeping the encoding system secret, but modern steganography is detectable only if secret information is known, e.g. a secret key. Because of their invasive nature, steganography systems leave detectable traces within a medium's characteristics. This allows an eavesdropper to detect media that has been modified, revealing that secret communication is taking place. Although the secrecy of the information is not degraded, its hidden nature is revealed, defeating the main purpose of Steganography.

                  For JPEG images, Outguess preserves statistics based on frequency counts. As a result, statistical tests based on frequency counts are unable to detect the presence of steganographic content. Before embedding data into an image, Outguess can determine the maximum message size that can be hidden while still being able to maintain statistics based on frequency counts.

                  Outguess uses generic iterators object to select which bits in the data should be modified. A seed can be used to modify the behavior of the iterator. It is embedded in the data along with the rest of the message. By altering the seed, OutGuess tries to find a sequence of bits that minimizes the number of changes in the data that have to be made.

 

 

                         Compression reduces the average code length used to represent the symbols of an alphabet. Symbols of the source alphabet which occur frequently are assigned with short length codes. The general strategy is to allow the code length to vary from character to character and to ensure that the frequently occurring character have shorter codes.

           CRCSET is an anti-virus utility.  Its purpose is to protect programs from third parties manipulation .CRC set is the most effective weapons against computer viruses. This the Cyclic Redundancy Check, or CRC, is an error-checking algorithm used in many types of computer operations, especially in data transfer.

 

            Before transmitting the data, the utility want to calculate the CRC value and attach with data. In receiving end, the CRC is recalculated and based on that calculated value, it will specify the acceptance or rejection.

 

 

  TYPES OF CRYPTOGRAPHIC ALGORITHMS

There are several ways of classifying cryptographic algorithms. For purposes of this paper, they will be categorized based on the number of keys that are employed for encryption and decryption, and further defined by their application and use. The three types of algorithms that will be discussed are (Figure 1):

·                     Secret Key Cryptography (SKC): Uses a single key for both encryption and decryption

·                     Public Key Cryptography (PKC): Uses one key for encryption and another for decryption

·                     Hash Functions: Uses a mathematical transformation to irreversibly "encrypt" information

 

 

 

                                            STEGANOGRAPHY

 

"Steganography is the art and science of communicating in a way which hides the existence of the communication. In contrast to Cryptography, where the enemy is allowed to detect, intercept and modify messages without being able to violate certain security premises guaranteed by a cryptosystem, the goal of Steganography is to hide messages inside other harmless messages in a way that does not allow any enemy to even detect that there is a second message present".   

In a digital world, Steganography and Cryptography are both intended to protect information from unwanted parties. Both Steganography and Cryptography are excellent means by which to accomplish this but neither technology alone is perfect and both can be broken. It is for this reason that most experts would suggest using both to add multiple layers of security.

Steganography can be used in a large amount of data formats in the digital world of today. The most popular data formats used are .bmp, .doc, .gif, .jpeg, .mp3, .txt and .wav.

Mainly because of their popularity on the Internet and the ease of use of the steganographic tools that use these data formats. These formats are also popular because of the relative ease by which redundant or noisy data can be removed from them and replaced with a hidden message.

Steganographic technologies are a very important part of the future of Internet security and privacy on open systems such as the Internet. Steganographic research is primarily driven by the lack of strength in the cryptographic systems on their own and the desire to have complete secrecy in open-systems environment. This menu consists of the following submenu content.

 

 

§  Embed

§  Deem bed

 

 

EMBED

                     

      This process plays the vital role in the steganography part. Here the package accepts the Image file name and Data file name from the user. The important point to be noted is, the image file must be the JPEG or BMP format, the data file must be in the compressed format (i.e., .CMP extension).

                  The package embed the compressed Data file with the Image file specified by the user, in such a way that the image will not be distributed after the embed process. The embedding process is graphically simulated with the help of progress bar.

 

 

DE EMBED

     

This process plays an alternate role against the embed. Here the package accepts the Image file name that present in the system. The important point to be noted is, the Image file format must be JPEG or BMP format. The process should checks for the presence of data, if the presence of data is identified, then the process request the path of the destination file (i.e., Data file with .CMP extension) for the retrieval of data from the Image file. Here all the process is graphically simulated with the help of progress bar.

 

 

 

EXISTING SYSTEM

In today’s dynamic and information rich environment, information systems have become vital for any organization to survive. With the increase in the dependence of the organization on the information system, there exists an opportunity for the competitive organizations and disruptive forces to gain access to other organizations information system. This hostile environment makes information systems security issues critical to an organization. Current information security literature either focuses on anecdotal information by describing the information security attacks taking place in the world or it comprises of the technical literature describing the types of security threats and the possible security systems.

 

              In order to secure the transmission of data, Cryptography has to be implemented. Cryptography is the science of devising methods that allow information to be sent in a secure form in such a way that the only person able to retrieve this information is intended recipient.

 

     The basic principle is this

A message being sent is known as plaintext. The message is then coded using a cryptographic algorithm. This process is called encryption, an encrypted message is known as cipher text, and is turned back into plaintext by the process of decryption. Encryption can be done using symmetric or asymmetric algorithms. In symmetric algorithms only one key is used both to encrypt and decrypt the message. In asymmetric algorithms, a key used to encrypt a message is different from the key that is used to decrypt the message. There are several algorithms present in the market for Cryptography.  Some of the commonly used once are Idea A, RSA and Glow fish that1 involves asymmetric or symmetric methods and also involves private and public keys.

 

 

                                      PROPOSED SYSTEM

 

            The algorithms present in the existing system were some what complicated.  In Cryptography, the meaning of data has been changed. So, it makes intention to the hacker to hack or destroy the data. In our proposed system, we implement a new technology called Stenography for Network security. It not only changes the meaning of data but also hides the presence of data from the hackers.


 Steganography is not actually a method of encrypting messages, but hiding them within something else to enable them to pass undetected. Traditionally this was achieved with invisible ink, microfilm or taking the first letter from each word of a message. This is now achieved by hiding the message within a graphics or sound file. For instance in a 256-greyscale image, if the least significant bit of each byte is replaced with a bit from the message then the result will be indistinguishable to the human eye. An eavesdropper will not even realize a message is being sent. This is not cryptography however, and although it would fool a human, a computer would be able to detect this very quickly and reproduce the original message.

In the case of using this technique of hiding the data with an image file, the visibility of the image, resolution or clarity is not being affected. The hidden data can be of length in size. To the Hacker, only the image is make going to be visible when previewed and not a trace of the hidden data.

If the image file is opened across a text editor, then also the data is not going to be visible as the information is stored in an encryption form, which is also binary.  Hence making it difficult for the enclosure to differentiate the data to the image file.

                              ADVANTAGES

 

·         The main advantage is we can provide seurity to data with multiple levels of security .

·          We can embed huge volumes of data with  modern Steganography.

 

·         The hacker would not know the presence of the confidential data inside the image being transmitted in the first place.

·         Even if he identifies it, we would not know that the data had been compressed.

·         Even if he identifies the presence of compression, he would find the data as encrypted.

·         Even if he does decrypt the data, he would not know the presence of CRC inside the data.

·         Even if he identifies its presence he would not know which part of data is the Actual data and which is CRC and would tamper the data.

·         The tampered data on the receiving end would not have its CRC match with the CRC of the original data. And the user rejects it.

·         Both Steganography and Cryptography are excellent means by which to accomplish this but neither technology alone is perfect and both can be broken. It is for this reason that most experts would suggest using both to add multiple layers of security.

·         Last but not least  we can share huge volumes data through this system which is very advantageous.

The system deals with providing an easy and secures files transmissions across

the network. The data is encrypted and embedded with any container file and transmitted through the network. At the receiving end the data is de-embedded, decrypted and displayed.

 

The application can now be used in any organization that uses networks. The type of the network or protocol will not affect the application.Thus, this entire process of hacking the data becomes  time-consuming and a menace to the hack. Therefore, defeating the   entire purpose of   hacking and hence making data transmission more secure.

BCA Project Can be submitted by - BE, BCA, MCA, B TECHComputer Science Final Year students. IGNOU BCA, IGNOU MCA, SMU BCA, SMU MCA, B.Tech/B.E in Computer Science or Information technology, MTech, MS, BSC-IT as final year project.

The Bca final year projects in asp.net free download application which we are developing is Two Tier architecture. Here we have 3 Tiers user interface, BAL and DAL.
In our project user interface is a J2ME part where we can see the output screens in the emulator.
Business access layer is The Bca final year projects in asp.net free download action class in J2ME. In this class we will open the connection to the tomcat server for sending The Bca final year projects in asp.net free download values & get them as parameters in the servlet.
Data access layer is the servlet class in the tomcat server for connecting to The Bca final year projects in asp.net free download database for inserting and retrieving the data from the database.
Here in three Tiers the request and response will be a Bi-directional.
When a request is generated from The Bca final year projects in asp.net free download J2ME emulator the request will be sent to the action class through servlet and connects to the database. In The Bca final year projects in asp.net free download same way response will be generated by sending the requested data from the database to the servlet via action class to The Bca final year projects in asp.net free download emulator.

bca final year projects in asp.net free download

Here the DAL and database may change but the user interface and BAL doesn’t change.
The entire system is a system is a thread based process. A thread is generated when a request is generated from The Bca final year projects in asp.net free download mobile to the action class to open the StreamConnection to the servlet for each and every request.

Application Architecture:

Application architecture is nothing but The Bca final year projects in asp.net free download project flow. In the users block the users are the customers of The Bca final year projects in asp.net free download bank. They can access all the banking transactions which are mentioned provided they should have a bank account and should be registered for the application. Customers are provided with user id & password by the bank authorities.
The Bca final year projects in asp.net free download customers will access all the banking transactions which are mentioned in the Action class such as change password, mini statement, balance enquiry, view bills, cheque request cheque status, and Fund transfer. In the action class block we have The Bca final year projects in asp.net free download user interface design and also the request to open the connection for the server.

FREE DOWNLOAD BCA PROJECTS

In servlet block we have The Bca final year projects in asp.net free download corresponding pages for the action class to connect to the database for inserting and getting the details.

Links:



No comments:

G+

Pages