Half Tone.docx

  • Uploaded by: Senthil Kumar
  • 0
  • 0
  • April 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Half Tone.docx as PDF for free.

More details

  • Words: 7,272
  • Pages: 41
ABSTRACT Halftone watermarking is the art and science of communicating in such a way that the presence of a message cannot be detected. It includes the concealment of information with in computer files. watermarking c messages are often first encrypted by some traditional means, and then a cover text is modified in some way to contain the encrypted message, resulting in stegotext. The strength of Halftone watermarking can thus be amplified by combining it with cryptography. The purpose of this approach is to restore the image statistics which get modified during embedding and are generally exploited by the steganalytic attacks.

OBJECTIVES 1. The letter size, spacing, typeface, or other characteristics of a cover text can be manipulated to carry the hidden message. 2. The message is the composition of some character. 3. Halftone watermarking differs from cryptography in the sense that where cryptography focuses on keeping the contents of a message secret. 4. The strength of Halftone watermarking can thus be amplified by combining it with cryptography. 5. Halftone watermarking are used to provide the more security and confidential access. 6. Hiding the image or text.

1. INTRODUCTION 1.1 ABOUT THE PROJECT Halftone watermarking is the art and science of communicating in such a way that the presence of a message cannot be detected. It includes the concealment of information with in computer files. Halftone watermarking differs from cryptography in the sense that where cryptography focuses on keeping the contents of a message secret, Halftone watermarking focuses on keeping the existence of a message secret.Steganographic messages are often first encrypted by some traditional means, and then a cover text is modified in some way to contain the encrypted message, resulting in stegotext. For example, the letter size, spacing, typeface, or other characteristics of a cover text can be manipulated to carry the hidden message. This project considers an information theoretic model for Halftone watermarking with a passive adversary being proposed. The adversary’s task of distinguishing between an innocent cover message C and modified message S containing hidden information is interpreted as a testing problem. The message is the composition of some character. Every character of the message can be represented as an ASCII value which is either even or odd. Depending on this evenness, the character is encrypted differently. This paper describes how an even-odd encryption based on ASCII value is applied and how encrypted message is converted by using Gray code and embedding with picture can secure the message and thus makes crypt analyst’s job difficult. The strength of Halftone watermarking can thus be amplified by combining it with cryptography. The purpose of this approach is to restore the image statistics which get modified during embedding and are generally exploited by the steganalytic attacks.

OBJECTIVES 1. The letter size, spacing, typeface, or other characteristics of a cover text can be manipulated to carry the hidden message. 2. The message is the composition of some character. 3. Halftone watermarking differs from cryptography in the sense that where cryptography focuses on keeping the contents of a message secret. 4. The strength of Halftone watermarking can thus be amplified by combining it with cryptography. 5. Halftone watermarking are used to provide the more security and confidential access.

1.2 PURPOSE,SCOPE AND APPLICABILITY PURPOSE OF THE PROJECT The major purpose for using this project is as follows:  This system provides high interaction and gives best quality services.  This system provide provides secure and confidential access.  Secure data communication between to parties.  Halftone watermarking are used to send image, test, audio and video files.

SCOPE OF THE PROJECT The main scope of the projects is as follows: 1. This project will help confidential access in data sharing. 2. To sent large number of files such as image,audio and video files. 3. Hacker can’t access the data.  It’s more securable.  Its used to easy to communication APPLICABILITY The applicability of this project involves the following:  It is used to promote the service to all users in efficient way.  Its secure data communication. 1.3 ACHIEVEMENTS The main achievements of this project is  It is more security.  Confidential access.  To share any multimedia components.

1.4 ORGANIZATION OF THE PROJECT REPORTS

2. SYSTEM ANALYSIS System analysis is the process of gathering and interpreting facts, diagnosing problems using the facts to improve the system. Analysis is a detailed study of various operations performed by a system and their relationship within and outside of the system. This involves gathering information and using structured tools for analysis. For the efficient and effective utilization of available resources, timing availability information is very important.

2.1 EXISTING SYSTEM In the existing system, messages are hidden using cryptography and other methods which could be easily decoded if someone have enough hardware and software resources. Another technique which is based on the information hiding strategy is digital watermarking. But, in case of digital watermarking, the important property of information hiding known as resistance to removal is preferred. So, in these applications, we are not worrying about imperceptibility but resistance to removal. This is mainly used in commercial applications like copyright protection of digital forms of media like video or image. Disadvantages of the Existing System: o The security is very less. o Message can be decoded easily without the secret key.

2.2 PROPOSED SYSTEM We are proposing a method to hide messages within digital images using secret keys which can be decoded only if the user has this application and the secret key used during encoding. The proposed system initializes some parameters, which are used for subsequent data preprocessing and region selection, and then estimates the capacity of those selected regions. If the regions are large enough for hiding the given secret message, then data hiding is performed on the selected regions. Finally, it does some post processing to obtain the stego-image. Other wise the scheme needs to revise the parameters, and then repeats region selection and capacity estimation until can be embedded completely. Please note that the parameters maybe different for different image content and secret message. We need them as side information to guarantee the validity of data extraction. In practice, such side information (7 bits in our work) can be embedded into a predetermined region of the image. In data extraction, the scheme first extracts the side information from the stego image. Based on the side information, it then does some preprocessing and identifies the regions that have been used for data hiding. Finally, it obtains the secret message according to the corresponding extraction algorithm. Advantages of the Proposed System:  The security is high.  Message cannot be easily decoded without the secret key. 2.3 PROBLEM STATEMENT  No security.  Data mismatching problem.  Unauthorized access.

3. REQUIREMENTS AND ANALYSIS 3.1 PROBLEM DEFINITION Halftone watermarking is the art and science of communicating in such a way that the presence of a message cannot be detected. It includes the concealment of information with in computer files. Messages are hidden using cryptography and other methods which could be easily decoded if someone have enough hardware and software resources. Another technique which is based on the information hiding strategy is digital watermarking. But, in case of digital watermarking, the important property of information hiding known as resistance to removal is preferred. So, in these applications, we are not worrying about imperceptibility but resistance to removal. This is mainly used in commercial applications like copyright protection of digital forms of media like video or image. 3.2 FEASIBILITY STUDY A feasibility study is carried out to select the best system that meets performance requirements. The main aim of the feasibility study activity is to determine whether it would be financially and technically feasible to develop the product. The feasibility study activity involves the analysis of the problem and collection of all relevant information relating to the product such as the different data items which would be input to the system, the processing required to be carried out on these data, the output data required to be produced by the system as well as various constraints on the behavior of the system.  Economical Feasibility  Technical Feasibility.  Social Feasibility.

ECONOMIC FEASIBILITY Economic analysis is the most frequently used technique for evaluating the effectiveness of a proposed system. More commonly known as Cost / Benefit analysis, the procedure is to determine the benefits and savings that are expected from a proposed system and compare them with costs. If benefits outweigh costs, a decision is taken to design and implement the system. Otherwise, further justification or alternative in the proposed system will have to be made if it is to have a chance of being approved. This is an outgoing effort that improves in accuracy at each phase of the system life cycle. TECHNICAL FEASIBILITY This is concerned with specifying equipment and software that will successfully satisfy the user requirement. The technical needs of the system may vary considerably, but might include: • The facility to produce outputs in a given time. • Response time under certain conditions. • Ability to process a certain volume of transaction at a particular speed. • Facility to communicate data to distant locations. In examining technical feasibility, configuration of the system is given more importance than the actual make of hardware. The configuration should give the complete picture about the system’s requirements: How many workstations are required, how these units are interconnected so that they could operate and communicate smoothly? And what speeds of input and output should be achieved at particular quality of printing. S

SOCIAL FEASIBILITY STUDY The social feasibility of its part would determine the proposed project will be satisfactory for the people or not. This assumption would in general examine the probability that the project would have to be accepted by the group of people that are directly affected by the proposed system.The legal feasibility study would determine whether the proposed project conflicts with legal requirements such as known Acts, Statutes, or any pending legislation. 3.2 SOFTWARE DESCRIPTION: SYSTEM REQUIREMENTS Hardware Requirements: 

Processor

: Dual core processor 2.6.0 GHZ



RAM

: 1GB



Hard disk

: 160 GB



Compact Disk

: 650 Mb



Keyboard

: Standard keyboard



Monitor

: 15 inch color monitor

Software Requirements: 

Operating System

: Windows OS



Front End

: PHP



IDE

: Macromedia Dreamweaver 8



Back End

: MYSQL SERVER

TECHNOLOGY REQUIREMENTS FRONT END SOFTWARE FEATURES OF PHP

PHP: Hypertext Preprocessor (the name is a recursive acronym) is a widely used, general-purpose scripting language that was originally designed for web development to produce dynamic web pages. For this purpose, PHP code is embedded into the HTML source document and interpreted by a web server with a PHP processor module, which generates the web page document. As a general-purpose programming language, PHP code is processed by an interpreter application in command-line mode performing desired operating system operations and producing program output on its standard output channel. It may also function as a graphical application. PHP is available as a processor for most modern web servers and as standalone interpreter on most operating systems and computing platforms. PHP was originally created by Rasmus Lerdorf in 1995[1] and has been in continuous development ever since. The main implementation of PHP is now produced by The PHP Group and serves as the de facto standard for PHP as there is no formal specification. PHP is free software released under the PHP License, which is incompatible with the GNU General Public License (GPL) because restrictions exist regarding the use of the term PHP. Hypertext refers to files linked together using hyperlinks, such as HTML (HyperText Markup Language) files. Preprocessing is executing instructions that modify the output. Below is a demonstration of the difference between HTML and PHP files. Accessing an HTML Page

1. Your browser sends a request to that web page's server (computer) for the file (HTML or image) you wish to view. 2. The web server (computer) sends the file requested back to your computer.

3. Your browser displays the file appropriately. 4. If you request a PHP file (ends with ".php"), the server handles it differently.

Accessing a PHP Page

1. Your browser sends a request to that web page's server for the PHP file you wish to view. 2. The web server calls PHP to interpret and perform the operations called for in the PHP script. 3. The web server sends the output of the PHP program back to your computer. 4. Your browser displays the output appropriately.

PHP originally stood for personal home page. Its development began in 1994 when the Danish/Greenlandic programmer Rasmus Lerdorf initially created a set of Perl scripts he called 'Personal Home Page Tools' to maintain his personal homepage, including tasks such as displaying his résumé and recording how much traffic his page was receiving. He rewrote these scripts as C programming language Common Gateway Interface (CGI) binaries, extending them

to add the ability to work with web forms and to communicate with databases and called this implementation 'Personal Home Page/Forms Interpreter' or PHP/FI. PHP/FI could be used to build simple, dynamic web applications. Lerdorf released PHP/FI as 'Personal Home Page Tools (PHP Tools) version 1.0' publicly on June 8, 1995, to accelerate bug location and improve the code. This release already had the basic functionality that PHP has today. This included Perl-like variables, form handling, and the ability to embed HTML. The syntax was similar to Perl but was more limited and simpler, although less consistent. A development team began to form and, after months of work and beta testing, officially released PHP/FI 2 in November 1997. A new major version has been under development alongside PHP 5 for several years. This version was originally planned to be released as PHP 6 as a result of its significant changes, which included plans for full Unicode support. However, Unicode support took developers much longer to implement than originally thought, and the decision was made in March 2010[13] to move the project to a branch, with features still under development moved to trunk. Changes in the new code include the removal of register_globals, magic quotes, and safe mode. The reason for the removals was that register_globals had given way to security holes, and the use of magic quotes had an unpredictable nature, and was best avoided. Instead, to escape characters, magic quotes may be replaced with the addslashes() function, or more appropriately

an

escape

mechanism

specific

to

the

database

vendor

itself

like

mysql_real_escape_string() for MySQL. Functions that will be removed in future versions and have been deprecated in PHP 5.3 will produce a warning if used. PHP currently does not have native support for Unicode or multibyte strings; Unicode support is under development for a future version of PHP and will allow strings as well as class, method, and function names to contain non-ASCII characters. PHP interpreters are available on both 32-bit and 64-bit operating systems, but on Microsoft Windows the only official distribution is a 32-bit implementation, requiring Windows 32-bit compatibility mode while using Internet Information Services (IIS) on a 64-bit Windows platform. As of PHP 5.3.0, experimental 64-bit versions are available for MS Windows.

Security The PHP interpreter only executes PHP code within its delimiters. Anything outside its delimiters is not processed by PHP (although non-PHP text is still subject to control structures described within PHP code). The most common delimiters are to close PHP sections. <script language="php"> and delimiters are also available, as are the shortened forms as well as ASP-style short forms <% or <%= and %>. While short delimiters are used, they make script files less portable as support for them can be disabled in the PHP configuration, and so they are discouraged. The purpose of all these delimiters is to separate PHP code from non-PHP code, including HTML. The first form of delimiters, , in XHTML and other XML documents, creates correctly formed XML 'processing instructions'. This means that the resulting mixture of PHP code and other markup in the server-side file is itself well-formed XML. Variables are prefixed with a dollar symbol and a type does not need to be specified in advance. Unlike function and class names, variable names are case sensitive. Both double-quoted ("") and heredoc strings allow the ability to embed a variable's value into the string. PHP treats newlines as whitespace in the manner of a free-form language (except when inside string quotes), and statements are terminated by a semicolon. PHP has three types of comment syntax: /* */ marks block and inline comments; // as well as # are used for one-line comments. The echo statement is one of several facilities PHP provides to output text (e.g. to a web browser). In terms of keywords and language syntax, PHP is similar to most high level languages that follow the C style syntax. if conditions, for and while loops, and function returns are similar in syntax to languages such as C, C++, Java and Perl.

BACK END SOFTWARE FEATURES OF MY SQL MySQL Introduction

The MySQL® database has become the world's most popular open source database because of its consistent fast performance, high reliability and ease of use. It's used on every continent -- Yes, even Antarctica! -- by individual Web developers as well as many of the world's largest and fastest-growing organizations to save time and money powering their highvolume Web sites, business-critical systems and packaged software -- including industry leaders such as Yahoo!, Alcatel-Lucent, Google, Nokia, YouTube, and Zappos.com. Not only is MySQL the world's most popular open source database, it's also become the database of choice for a new generation of applications built on the LAMP stack (Linux, Apache, MySQL, PHP / Perl / Python.) MySQL runs on more than 20 platforms including Linux, Windows, Mac OS, Solaris, HP-UX, IBM AIX, giving you the kind of flexibility that puts you in control. Whether you're new to database technology or an experienced developer or DBA, MySQL offers a comprehensive range of certified software, support, training and consulting to make you successful. MySQL can be built and installed manually from source code, but this can be tedious so it is more commonly installed from a binary package unless special customizations are required. On most Linux distributions the package management system can download and install MySQL with minimal effort, though further configuration is often required to adjust security and optimization settings. Though MySQL began as a low-end alternative to more powerful proprietary databases, it has gradually evolved to support higher-scale needs as well. It is still most commonly used in small to medium scale single-server deployments, either as a component in a LAMP based web application or as a standalone database server. Much of MySQL's appeal originates in its relative simplicity and ease of use, which is enabled by an ecosystem of open source tools such as phpMyAdmin. In the medium range, MySQL can be scaled by deploying it on more powerful hardware, such as a multi-processor server with gigabytes of memory. There are however limits to how far performance can scale on a single server, so on larger scales, multi-server MySQL deployments are required to provide improved performance and reliability. A typical high-end configuration can include a powerful master database which handles data write operations and is replicated to multiple slaves that handle all read operations. The master server synchronizes continually with its slaves so in the event of failure a slave can be promoted to become the

new master, minimizing downtime. Further improvements in performance can be achieved by caching the results from database queries in memory using memcached, or breaking down a database into smaller chunks called shards which can be spread across a number of distributed server clusters.

MYSQL: MySQL is the world's most used open source relational database management system (RDBMS) as of 2008 that run as a server providing multi-user access to a number of databases. The MySQL development project has made its source code available under the terms of the GNU General Public License, as well as under a variety of proprietary agreements. MySQL was owned and sponsored by a single for-profit firm, the Swedish company MySQL AB, now owned by Oracle Corporation. 1. Scalability and Flexibility The MySQL database server provides the ultimate in scalability, sporting the capacity to handle deeply embedded applications with a footprint of only 1MB to running massive data warehouses holding terabytes of information. Platform flexibility is a stalwart feature of MySQL with all flavors of Linux, UNIX, and Windows being supported. And, of course, the open source nature of MySQL allows complete customization for those wanting to add unique requirements to the database server.

2. High Performance A unique storage-engine architecture allows database professionals to configure the MySQL database server specifically for particular applications, with the end result being amazing performance results. Whether the intended application is a high-speed transactional processing system or a high-volume web site that services a billion queries a day, MySQL can meet the most demanding performance expectations of any system. With high-speed load utilities, distinctive memory caches, full text indexes, and other performance-enhancing mechanisms, MySQL offers all the right ammunition for today's critical business systems. 3. High Availability Rock-solid reliability and constant availability are hallmarks of MySQL, with customers relying on MySQL to guarantee around-the-clock uptime. MySQL offers a variety of high-

availability options from high-speed master/slave replication configurations, to specialized Cluster servers offering instant failover, to third party vendors offering unique high-availability solutions for the MySQL database server. 4. Robust Transactional Support MySQL offers one of the most powerful transactional database engines on the market. Features include complete ACID (atomic, consistent, isolated, durable) transaction support, unlimited row-level locking, distributed transaction capability, and multi-version transaction support where readers never block writers and vice-versa. Full data integrity is also assured through server-enforced referential integrity, specialized transaction isolation levels, and instant deadlock detection. 5. Web and Data Warehouse Strengths MySQL is the de-facto standard for high-traffic web sites because of its highperformance query engine, tremendously fast data insert capability, and strong support for specialized web functions like fast full text searches. These same strengths also apply to data warehousing environments where MySQL scales up into the terabyte range for either single servers or scale-out architectures. Other features like main memory tables, B-tree and hash indexes, and compressed archive tables that reduce storage requirements by up to eighty-percent make MySQL a strong standout for both web and business intelligence applications. 6. Strong Data Protection Because guarding the data assets of corporations is the number one job of database professionals, MySQL offers exceptional security features that ensure absolute data protection. In terms of database authentication, MySQL provides powerful mechanisms for ensuring only authorized users have entry to the database server, with the ability to block users down to the client machine level being possible. SSH and SSL support are also provided to ensure safe and secure connections. A granular object privilege framework is present so that users only see the data they should, and powerful data encryption and decryption functions ensure that sensitive data is protected from unauthorized viewing. Finally, backup and recovery utilities provided through MySQL and third party software vendors allow for complete logical and physical backup as well as full and point-in-time recovery. 7. Comprehensive Application Development

One of the reasons MySQL is the world's most popular open source database is that it provides comprehensive support for every application development need. Within the database, support can be found for stored procedures, triggers, functions, views, cursors, ANSI-standard SQL, and more. For embedded applications, plug-in libraries are available to embed MySQL database support into nearly any application. MySQL also provides connectors and drivers (ODBC, JDBC, etc.) that allow all forms of applications to make use of MySQL as a preferred data management server. It doesn't matter if it's PHP, Perl, Java, Visual Basic, or .NET, MySQL offers application developers everything they need to be successful in building database-driven information systems. 8. Management Ease MySQL offers exceptional quick-start capability with the average time from software download to installation completion being less than fifteen minutes. This rule holds true whether the platform is Microsoft Windows, Linux, Macintosh, or UNIX. Once installed, selfmanagement features like automatic space expansion, auto-restart, and dynamic configuration changes take much of the burden off already overworked database administrators. MySQL also provides a complete suite of graphical management and migration tools that allow a DBA to manage, troubleshoot, and control the operation of many MySQL servers from a single workstation. Many third party software vendor tools are also available for MySQL that handle tasks ranging from data design and ETL, to complete database administration, job management, and performance monitoring.

3.4 PRELIMINARY PRODUCT DESCRIPTION Identification of the hardware requirements needed for doing projects such as requirement, graphics card, numeric co-processor, mouse, disk capacity, ram capacity, CPU speed, keyboard, motherboard and monitor. This project uses software tools such as operation system, the compiler, testing tools and library are necessary tools to compile, link and install the software that are specified. The objective of the system is all the facilities to fulfill the drawbacks found in the existing system. Here there is not at all any kind of paper work to be done to maintain the record details of the users. 3.5 DATA FLOW DIAGRAM A data flow diagram (DFD) is a graphical representation of the "flow" of data through an information system, modeling its process aspects. Often they are a preliminary step used to create an overview of the system which can later be elaborated. DFDs can also be used for the visualization of data processing.A DFD shows what kind of information will be input to and output from the system, where the data will come from and go to, and where the data will be stored. It does not show information about the timing of processes, or information about whether processes will operate in sequence or in parallel.

Login

Database

Registration

Home

Load

Encode

Save

Decode

Load

UML DIAGRAM: UML is a standard language for specifying, visualizing, constructing, and documenting the artifacts of software systems. 

UML stands for Unified Modeling Language.



UML is different from the other common programming languages like C++, Java, COBOL etc.



UML is a pictorial language used to make software blue prints.

So UML can be described as a general purpose visual modeling language to visualize, specify, construct and document software system. Although UML is generally used to model software systems but it is not limited within the boundary. It is also used to model non software systems as well like process flow in a manufacturing unit.UML is not a programming language but tools can be used to generate code in various languages using UML diagrams. UML has a direct relation with object oriented analysis and design. After some standardization UML is become an OMG (Object Management Group) standard. Class Notation: UML class is represented by the diagram shown below. The diagram is divided into four parts. 

The top section is used to name the class.



The second one is used to show the attributes of the class.



The third section is used to describe the operations performed by the class.



The fourth section is optional to show any additional components.

Classes are used to represent objects. Objects can be anything having properties and responsibility.

Object Notation: The object is represented in the same way as the class. The only difference is the name which is underlined as shown below.

As object is the actual implementation of a class which is known as the instance of a class. So it has the same usage as the class.

Interface Notation: Interface is represented by a circle as shown below. It has a name which is generally written below the circle.

Interface is used to describe functionality without implementation. Interface is the just like a template where you define different functions not the implementation. When a class implements the interface it also implements the functionality as per the requirement. Collaboration Notation: Collaboration is represented by a dotted eclipse as shown below. It has a name written inside the eclipse.

Collaboration represents responsibilities. Generally responsibilities are in a group. Use case Notation: Use case is represented as an eclipse with a name inside it. It may contain additional responsibilities.

Use case is used to capture high level functionalities of a system. Actor Notation: An actor can be defined as some internal or external entity that interacts with the system.

Actor is used in a use case diagram to describe the internal or external entities.

USECASE DIAGRAMS

Upload the image

Add text or images

Destination Source Hide the image or text

Extract the image

Get the original image or text

3.5.3 ENTITY RELATIONSHIP DIAGRAM

Image or text

Encryption

Source

Extracting Image

Destination

Upload image Hiding the image

4. SYSTEM DESIGN 4.1 BASIC MODULE o Identify Authentication o Encoding o Key Generation o Calculate PSNR Value o Decoding MODULE DESCRIPTION: IDENTIFY AUTHENTICATION Authentication factor covers a range of elements used to authenticate or verify a person identity prior to being granted access, approving a transaction request, signing a document or other work product, granting authority to others, and establishing a chain of authority. ENCODING

In this module, users can load a bitmap image in to the application and can encode a message along with a secret code in to the digital image and the user can save the encoded image and can send to any one through email and other means. KEY GENERATION Key generation is the process of generating keys for cryptography. A key is used to encrypt and decrypt whatever data is being encrypted/decrypted. A license or product generator (usually stylized as keygen) is either a computer program that generates a licensing key, serial number, or some other registration information necessary to activate for use a software application, or a program that generates public-key data for cryptographic applications. CALCULATE PSNR VALUE The PSNR is most commonly used as a measure of quality of reconstruction of lossy compression codecs (e.g., for image compression). The signal in this case is the original data, and the noise is the error introduced by compression. When comparing compression codecs it is used as an approximation to human perception of reconstruction quality, therefore in some cases one reconstruction may appear to be closer to the original than another, even though it has a lower PSNR (a higher PSNR would normally indicate that the reconstruction is of higher quality). DECODING In this module, users who have access to the Image Halftone watermarking application and the secret key used during encoding can load the encoded image and decode it using the secret key to obtain the message hidden during the encoding module. 4.2 HIGH LEVEL DESIGN

The highest level solution design should briefly all platforms, systems Products, services and processes that it depends upon and include any important changes that need to be made to them. A high-level design document will usually include a high –level architecture diagram depicting the components, interfaces and networks that need to be further specified or developed. The document may also depict or otherwise refer to work flows and or data flows between component systems.

4.3 LOW LEVEL DESIGN The most creative and challenging face of the system development is low level design. If provides the understanding and procedural detail nessary for implementing the system recommended in the feasibility study. Design goes through the logical and physical stages of development . In designing a new system, analysis must have a clear understanding of the objectives, which the design is aiming to fulfill. INPUT DESIGN This section is a description of the input media used by the operator for providing information to the system; show a mapping to the high-level data flows For example, data entry screens, optical character readers, bar scanners, etc. If appropriate, the input record types, file structures, and database structures provided in Section 3, File and Database Design, may be referenced. Include data element definitions, or refer to the data dictionary.

Provide the layout of all input data screens or graphical user interfaces (GUTs) (for example, windows). interface.

Provide a graphic representation of each

Define all data elements associated with each screen or GUI, or

reference the data dictionary. This section should contain edit criteria for the data elements, including specific values, range of values, mandatory/optional, alphanumeric values, and length. Also address data entry controls to prevent edit bypassing.

Discuss the miscellaneous messages associated with operator inputs, including the following:  Copies of form(s) if the input data are keyed or scanned for data entry from printed forms  Description of any access restrictions or security considerations  Each transaction name, code, and definition, if the system is a transaction-based processing system OUTPUT DESIGN This section describes of the system output design relative to the user/operator; show a mapping to the high-level data flows. System outputs include reports, data display screens and GUIs, query results, etc. The output files are described in Section 3 and may be referenced in this section. The following should be provided, if appropriate:  Identification of codes and names for reports and data display screens

 Description of report and screen contents (provide a graphic representation of each layout and define all data elements associated with the layout or reference the data dictionary).

5.IMPLEMENTATION AND TESTING 5.1 SYSTEM IMPLEMENTATION Implementation is the realization of an application, or execution of a plan, idea, model, design, specification, standard, algorithm, or policy. In computer science, an implementation is a realization of a technical specification or algorithm as a program, software component, or other computer system through programming and deployment. Many implementations may exist for a given specification or standard. For example, web browsers contain implementations of World Wide Web Consortium-recommended specifications, and software development tools contain implementations of programming languages. System implementation generally benefits from high levels of user involvement and management support. User participation in the design and operation of information systems has several positive results. First, if users are heavily involved in systems design, they move opportunities to mold the system

according to their priorities and business requirements, and more opportunities to control the outcome. Second, they are more likely to react positively to the change process. Incorporating user knowledge and expertise leads to better solutions. The relationship between users and information systems specialists has traditionally been a problem area for information systems implementation efforts. Users and information systems specialists tend to have different backgrounds, interests, and priorities. This is referred to as the user-designer communications gap. These differences lead to divergent organizational loyalties, approaches to problem.

5.2 CODING DETAILS AND EFFICIENCY

5.3 TESTING APPROACHES TESTING A “Program unit” stands for a routine or a collection of routines implemented by an individual programmer. It might even be a stand-alone program or a functional unit a larger program.

TYPES OF TESTING 1. Unit testing 2. System testing 3. Integration testing 4. Acceptance testing 5. Software testing 6. Integration testing 7. Validation testing 8. Recovery testing 9. Security testing

UNIT TESTING Unit testing is performed prior to integration of the unit into a larger system. It is like Coding and debugging -> unit testing -> integration testing A program unit must be tested for Functional tests, Performance tests, Stress tests and Structure tests. Functional tests refer to executing the code with standard inputs, for which the results will occur within the expected boundaries. Performance test determines the execution time spent in various parts of the unit, response time, device utilization and throughput. Performance testing will help the tuning of the system. Stress tests drive the system to its limits. They are designed to intentionally break the unit. Structure tests verify logical execution along different execution

paths. Functional, performance and stress tests are collectively known as “Black box testing”. Structure testing is referred to as “White box” or “glass box” testing. Program errors can be classified as missing path errors, computational errors and domain errors.Even if it looks like all possible execution paths have been tested, there might still exist some more paths. A missing path error occurs, when a branching statement and the associated computations are accidentally omitted. Missing paths can be detected only by functional specifications. A domain error occurs when a program traverses the wrong path because of an incorrect predicate in a branching statement. When a test case fails to detect a computational error there is said to be a coincidental error. DEBUGGING Debugging is eliminating the cause of known errors. Commonly used debugging techniques are induction, deduction and backtracking. Debugging by induction involves the following steps: 1. Collect all the information about test details and test results 2. Look for patterns 3. Form one or more hypotheses and rank /classify them. 4. Prove/disprove hypotheses. Re examine 5. Implement appropriate corrections 6. Verify the corrections. Re run the system and test again until satisfactory Debugging by deduction involves the following steps: 1. List possible causes for observed failure 2. Use the available information to eliminate various hypotheses 3. Prove/disprove the remaining hypotheses

4. Determine the appropriate corrections 5. Carry out the corrections and verify

Debugging by backtracking involves working backward in the source code from Point where the error was observed. Run additional test cases and collect more information.

SYSTEM TESTING System testing involves two activities: Integration testing and Acceptance testing. Integration strategy stresses on the order in which modules are written, debugged and unit tested. Acceptance test involves functional tests, performance tests and stress tests to verify requirements fulfillment. System checking checks the interfaces, decision logic, control flow, recovery procedures, and throughput, capacity and timing characteristics of the entire system. INTEGRATION TESTING Integration testing strategies include bottom-up (traditional), top-down and sandwich strategies. Bottom-up integration consists of unit testing, followed by sub system testing, followed by testing entire system. Unit testing tries to discover errors in modules. Modules are tested independently in an artificial environment known as a “test harness”. Test harnesses provide data environments and calling sequences for the routines and subsystem that are being tested in isolation. Disadvantages of bottom-up testing include that harness preparation, which can sometimes take almost 50% or more of the coding and debugging effort for a smaller product. After testing all the modules independently and in isolation, they are linked and executed in one single integration and in isolation; they are linked

and executed in one single integration run. This known as “Big bang” approach to integration testing. Isolating sources of errors is difficult in “big bang“ approach. Top-down integration starts with the main routine and one or two immediately next lower level routines. After a thorough checking the top level becomes a test harness to its immediate subordinate routines. Top-down integration offers the following advantages. 1. System integration is distributed throughout the implementation phase. Modules are integrated as they are developed. 2. Top-level interfaces are first test 3. Top-level routines provide a natural test harness for lower-level routines. 4. Errors are localized to the new modules and interfaces that are being added. Though top-down integrations seem to offer better advantages, it may not be applicable in certain situations. Sometimes it may be necessary to test certain critical low-level modules first. In such situations, a sandwich strategy is preferable. Sandwich integration is mostly top-down, but bottom-up techniques are used on some modules and sub systems. This mixed approach retains the advantages of both strategies.

ACCEPTANCE TESTING Acceptance testing involves planning and execution of functional tests, performance tests and stress tests in order to check whether the system implemented satisfies the requirements specifications. Quality assurance people as well as customers may simultaneously develop acceptance tests and run them. In addition to functional and performance tests, stress test are performed to determine

the limits/limitations of the system developed. For example, a complier may be tested for its symbol table overflows or a real-time system may be tested for its symbol table overflows or a real-time system may be tested to find how it responds to multiple interrupts of different/same priorities. Acceptance test tools include a test coverage analyzer, and a coding standards checker. Test coverage analyzer records the control paths followed for each test case. A timing analyzer reports the time spent in various regions of the source code under different test cases. Coding standards are stated in the product requirements. Manual inspection is usually not an adequate mechanism from detecting violations of coding standards. SOFTWARE TESTING Software testing is an important element of software quality assurance and represents the ultimate review of specification design and coding. The user tests the developed system and changes are made according the needs. The testing phase involves testing of developed system using various kinds of data. An elaborated test data is prepared and system using the data. Whole testing is noted and corrections are made. TESTING OBJECTIVES  Testing is a process of executing a program with the intent of finding on errors.  A good test is on that has a high probability of finding an undiscovered errors. Testing is vital to the success of the system. System testing is the state of implementation, which ensures that the system works accurately before live

operations commence. System testing makes a logical assumption that the system is correct and that the goals are successfully achieved. EFFECTIVE TESTING PREREQUISITES 1) Types of Testing Done INTEGRATION TESTING An overall test plan for the project is prepared before the start of coding. VALIDATION TESTING This project will be tested under this testing using sample data and produce the correct sample output. RECOVERY TESTING This project will be tested under this testing using correct data input and its product and the correct valid output without any errors. SECURITY TESTING This project contains password to secure the data.

6. SCREEN SHOT

7. CONCLUSION Halftone watermarking is the art and science of communicating in such a way that the presence of a message cannot be detected. It includes the concealment of information with in computer files. We are proposing a method to hide messages within digital images using secret keys which can be decoded only if the user has this application and the secret key used during encoding. The proposed system initializes some parameters, which are used for subsequent data preprocessing and region selection, and then estimates the capacity of those selected regions. If the regions are large enough for hiding the given secret message, then data hiding is performed on the selected regions. Finally, it does some post processing to obtain the stego-image. Other wise the scheme needs to revise the parameters, and then repeats region selection and capacity estimation until can be embedded completely. Please note that the parameters maybe different for different image content and secret message. We need them as side information to guarantee the validity of data extraction. In practice, such side information (7 bits in our work) can be embedded into a predetermined region of the image. In data extraction, the scheme first extracts the side information from the stego image. Based on the side information, it then does some preprocessing and identifies the regions that have been used for data hiding. Finally, it obtains the secret message according to the corresponding extraction algorithm.

8. BIBLIOGRAPHY REFERENCE BOOK REFERENCE • Book Name: Programming PHP , Author Name: Rasmus Lerdorf, Kevin Tatroe • Book Name: PHP developer's cookbook Author Name: Sterling Hughes,Andrei Zmievski • Book Name: MySQL: the complete reference Author Name: Vikram Vaswani

WEBSITE REFERENCE • http://www.vhsoft.com/products/vhtender.htm http://www.bloochip.com/website/site/products/tender_management_sys tem/home.htm • http://www.c1india.com/solutions/tender.html

Related Documents

Half
November 2019 22
Half And Half
June 2020 12
Half Brothers
May 2020 12
Half Tone.docx
April 2020 12
First Half
November 2019 16
Half -life
April 2020 7

More Documents from ""