Image Steganography Project Report in C#.Net

Moreover, the intruders can even manipulate it as per their requirement or reveal it in front of others. Further in certain in cases it can also be used for launching an attack. Stenography is the only solution to it. This is a most common technique of hiding information in the form of digital images. In comparison to the cryptography technique this method not only make it known to others that information is retained in the hidden form but also restrict other from even making out that any such information exists.

As more and more people are going the cyberspace revolution this technique of steganography is also gaining a lot of importance. This is the way of hiding information in such a manner that it does not enable the intruder to detect the secret message. An array of communication methods that are need to be kept secretively makes up the steganography. This is the system that enables to hide the secret message and also protect it from being discovered.

Information is now kept electronically with the advancement in ICT. Information security is the most important issue nowadays. For securing the information’s apart from using the cryptographic method nowadays steganography is also being used. In the cryptography technique usually the message that is encrypted is embed before passing on with the help of the network connection, in a digital host. This keeps the presence of the message unknown. Not only this system helps in hiding the dats but it has also extended in the protection of copywriting of video, images and audio for media.

Special means of security are required for the growing modern communications. The security of networking is becoming more important as there is an enhancement in the data being exchanged on the internet. Data integrity and confidentiality is required against the protection of unauthorized uses.

Steganography Project Report for B.tech CSE Major Project

Introduction to Steganography Project Topic:

We propose a latest technique in the steganography system to hide the information that is not to be disclosed with the image of the digital format. To hide the data we use BMP image. LSB algorithm stenography is the most common mode and it is used as the base. We have made some changes that are based on the innovative idea which include the integration of second and first LSB algorithms. The security here is considered to be the main aspect. 

Randomization concept is applied to the selection of pixels in pictures to  hide the data. Values are generated randomly with the help of secret keys. Unless the hackers have the key they will not able to find the numbers because they based on random physics. Analysis of statistics and detailed visualization of algorithms disclosed that it provides results that are satisfactory. It can be easily proved that the decoding system is very difficult in the proposed algorithm.

The work that is presented in this document is only the effort to create a strong stenographic system for Convery communication use. The algorithm proposed can be incorporated from various techniques that are existing and it results in an efficient algorithm of steganography. For high security of steganography we have developed a new technique. We are planning to improve our system in the future with robust build and high payload capacity as well as imperceptibility.

Steganography is similar to cryptography and it provides a way for communication of secret messages. A message is usually scrambled in the cryptographic technique so that it cannot be deciphered. On the other hand, the technique of The steganography technique hides the presence of the messages by concealing it inside a file. The cartographic messages can be intercepted with the help of eavesdropper but it will not enable an intruder to know that even the message exists.

Steganography Project Report in Java

Introduction to Steganography Project in Java:

In comparison to the technique of cryptography where the messaged has not disguised itself but the content is obscured. With the advent of steganography over the technique of cartography alone the security of messages has highly increased. The messages do not attract the attention of other recipients, to themselves and to the messengers. The art and science of hidden messages are hidden in the technique of steganography and it is done in such a manner that no one other than the recipient who is intended to receive the message can discover the secret message.

Traditional means are used for encryption of steganographic messages and then the cover text is further changed in some or other manner. The encrypted message results in stegotext. Letter size, typeface, spacing and other convert text characteristics can changes are made to execute the hidden message. This means that only the receiver of the message can recover and decryption it. Steganographic coding present in a transport layer likeMP3 file and protocol like UDP are then used in the electronic communication system.

For transmission of data safely and securely the steganographic system is used and it also enables safe storage of data in the network. There are many files that are important and include confidential data, they can be stored in encrypted form in the server. These files can be used only by authorized users.

Transmission of these files can be made possible only in the form of encrypted data and it does not disclose the message to the intruders. This means that the hackers and intruders will not able to make out any meaningful information during the transit. Moreover before trying to use the files the users need to enter the system with the help of valid password and user id that is allotted by the administrator to him.

Statistical Techniques for Detecting Traffic Anomalies Through Packet Header Data Project Abstract

The main aim of this project is to design a technique for the anomaly of the traffic detection that is based on the analyzing correlation of the IP destination in the outgoing of traffic at egress router. This data on address correlation are transformed with the use of discrete wavelet for providing effective detection of anomalies with the analysis of the statistics.

The motivation for this project arise from a requirement and it aimed to reduce the chances of intruders from attacking the campus machines. Using this system the campus may prevent hijacking of the system and also the liability for such attacks reduced. Outgoing traffic of header data packet is studied and it includes destination address, number of flows, port numbers etc. it is used in order to find out the anomalies origination at the campus edge of the campus.

Detecting attackers and anomalies that allow close to the main source to put an end to the potential damage that is close to the attacking machines. The technique of traffic monitoring that is close to the source enable quicker identification of the operator. It also allows administrators control domain’s records. By the process of early detection attack propagation speed can be reduced to a large extent.

Our approach monitors the traffic on the network at periodical interval and also analyze it to find if any kind of abnormalities persist in the traffic. Correlating and observing the traffic with its previous conditions it is possible to find out whether the present traffic is behaving in the same manner or not. due to the flash crowds, infrastructure problem and changing of accessing patterns and DoS attacks the network traffic can appear a bit different. The network usage can increased and various abnormalities can even pop up in case of an attack of the bandwidth.

SMS Based Mobile Banking with Security Java Project

An application known as Secure Messenger and it is used for decryption and encryption of the message which is based on Quasigroups Cryptographic Algorithm. This message is used to send messages that are encrypted for the users that are targeted. And it is necessary that the end user also have the secure message about the similar version. This message is encrypted using the Java MIDLET on the mobile phone. It allows transfer of money between two people. A message that is encrypted can be passed on to the network even though it cannot read or detect the message.

Mobile transaction process is used to transform money between two people. And both of them must be registered with a bank. For this process a mobile phone for both the users is very necessary and it starts with SMS. Like if A wants to pay B then both of them should poccess a mobile.

Then user A will have to type the words SMS to the bank with whom he is registered along with his pin code that usually consists of 4 digits followed by the account number and the amount he wants to transfer. Further the request will be processed by the bank within a short time and the amount will be quickly transferred to the mentioned account id. This will be followed by confirmation SMS to both the users.

In the application for sending of encrypted SMS with the help of cryptographic methods are based on the quasi groups theory. This algorithm is characterized with a secret key and the application used the Java language as the basic programming language along with the J2ME environment.

For the exchange of confidential data SMS messages are important and also even used sometimes and it also provides a high level of security for the users.

CSE Mini Project on Sms Topup Project Report on Java

Introduction to Sms Topup Project:

The pre-paid recharging system focus to maximize the pre-paid card system that already exist and offered by the pre-paid card agents as per the requirements of the bank. This system will be the base as well as the foundation of a wireless commerce framework. Service provider and the bank are the base audience. All the members who are involved of the project team are also the intended audience. The product must based on the web application and at the same time work as a stand alone product.

Our projects are aimed to enable customer to recharge his phone from sitting at his place and without the need to go anywhere outside his premises. This means that through a single message the client will able to recharge his phone from wherever he is sitting. The product must use the link to its home page and free of the platform. This software will further satisfy the requirements of the clients with its fabulous aspects of security and the controls that are necessary, adopted by the programmer. It also saves the messages that have been sent.

Today cellular phones are used by almost everyone around the world and the normal pre-paid system activation makes use of various things. Firstly, it requires the purchase of a SIM card from the retailer who deals in mobile phone topup followed by scratching of the card and typing the 13 digit secret code number. After the completion of all these procedures the system of prepaid will exist in the cell phone.

This is what happened according to the existing system and it is not a matter of problem for the consumers. But in today’s fast moving world where everyone seems to be working like a machine a more updated system should be developed. The sms topup system introduced by us will save the precious time of our customers and will also make the task of recharging smooth and tension free. It is totally different in the new proposed system.

Supermarket Management System Project

Introduction to Supermarket Management System Project:

The Supermarket Management System is a project that deals with supermarket automation and it includes both purchasing a selling of items. This project is designed with a goal to making the existing system more informative, reliable, fast and easier. There are many reasons for the starting of the project because in the selling of items through the manual system of salesperson faces a lot of inefficiencies. It requires handling of large record books that consist of both irrelevant and important information’s thus making it difficult to find out the required information as per necessity.

This is also a clumsy and untidy process that disturbs the smooth flow of work. But this system introduced by us will reduce the huge number of paper works while on the other side there are many more problems that persist in the manual system. They reduce efficiency as well as the productivity level of human. Administrative module, purchase module, employee module, sales module and billing module are some of the various modules that make up our project.

The administrators consist of a unique password and names of the employees. It helps the employees to make secure login. The ids and passwords are kept secret from others. The modules of sales and purchase include all the details of selling and purchasing. In the billing module the details of payments are clearly shown.

This is one of the best system that can be introduced in the supermarket for efficient management. It will also reduce the cumbersome job of finding the most accurate data from the huge log books. It also helps the management to keep efficient records of all the purchases and sales. The introduction of ID and password will further reduce the manipulation and thus providing the accurate and transparent data. This system will increase the productivity and reduce the need of manual system to a large extent.

Smarter Work Management System Project Full Report

Introduction to Smarter Work Management System Project:

A smarter work management system consists of stand alone system combination and it is much more powerful and larger in comparison to the components of the managements. As IBM has created this using smarter grids therefore it come to be known as “smarter”. Because of the complexity of the interactions it is quite difficult to achieve this goal. Throughout the world almost hundred million of dollars have been invested over the past few decades to develop the AMR systems that enable in collection of billing information from water meters and electricity.

In deploying advanced meter infrastructure investment of utilities have begun. TOU can send more flexible metering data to the data center of the utility and it is also a better step towards a smarter grid. Both of these systems are based on a single application and are not created with the purpose of integration with some other devices for delivering the required information to build a better grid system. Before the normal end it is not suggested to replace these solutions as it is not a perfect option. Scaling back and delaying of smart grid plans are some of the considerations of utilities.

The field of information technology IBM is the world leader and it also ruled over the education region  with the help of its Advanced Career Education Centers that offers high and branded basic high technical training. This is offered only to Advance Level Software skilled students who had already compete their courses at the college level.

The needs of the project are accomplished successfully by the EB cap especially regarding the billing system. The sophisticated IIBM told are perfectly implemented by this project. Plus this project involves the most easiest and efficient way of dispatching and calculating of electric bills for million of customers of the EB company.

Smarter Billing System Project Design Document for B.tech Final Year CSE Students

Introduction to Smarter Billing System Project:

The Software Requirements Specification document acts as a guideline and it also detailed the level of requirements elaboration. This document should be used by students as a guideline to design the Solution Architecture, required for this project work. The broad scope of the project is also highlighted in this document along with the necessities of DB requirements that are captured in the DB specifications. While designing the solution if the developer has a valid point along with sufficient details that it can be specified within the scope of the project. After consultation it can be further accommodated.

The scope of the smarter billing system is further described elaborately in this document for the board of electricity. All the requirements of higher level are detailed in this document with the intention to validate the requirements of the electricity board. The developers and architectures can use this document to design the solution architecture.

Plus the broad scope also explains in details. The integration of the components is involved in this project and this also helped in the incorporation of IT solutions for billing and reading of meters. It will thus help in the collection of accurate data which will enhance the work efficiency of the employees. This will also lead to increase the satisfaction level of the customers and the collection of revenues. In the long run we will make the utility self sustainable.

Some of the assumptions that are made in this document are firstly the engine for maintenance is responsible for the entire data processing that helps in calculating the charges of electricity and rent. It depends on the amount of consumption. Secondly, the interface of the system has a mailing system and a messaging engine. This system is overall very efficient and helpful for calculation and the electricity board.

SIMPS Using Sociology for Personal Mobility B.tech Final Year Project Report for CSE in Java

In the fashion mode it is difficult to access the mobility and is also a crucial step in making an efficient network design for mobile. According to the recent research on the subject of mobility it focused on two points that is studying the impact of the models on the transportation of data and analyzing the models. These investigations can bring a good consequence for the mobility.

These models used a process known as sequestration and it is rendered by two behaviors like to isolate and socialize that helps in individual with regard to his level of sociability. SIMPS agreed with the scaling laws that is observed with large and small scale human motion. Behavior of two simple individuals is only defined by our models and we further observed various emerging behaviors of collective modes.

As per the existing system the mobile ad hoc networks depend on stimulation which rely on the movements of the models for creditably . In the absence of realistic data synthetic models must be used for the movement of pattern generation. The currently used models are very simple and they are also used worldwide. It is preferred to have models that highlight the movement of the users which is currently not possible to track any movement against the real data.

According to the proposed system we focus on the mobility causes. We propose SIMPS starting from the research establishments in the field of sociology. Socialization needs are specific in all human and that is quantified by a targeted social level of interaction that is similar to the personal status like social class and age. In order to meet the interactions of the social goal human make acquaintances. These two characters can be translated into a set of behaviors known as speculation.