0% found this document useful (0 votes)
133 views56 pages

Email Encryption & Decryption

Uploaded by

Sujith S.B
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
133 views56 pages

Email Encryption & Decryption

Uploaded by

Sujith S.B
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 56

EMAIL ENCRYPTION AND DECRYPTION

A MINOR PROJECT REPORT


Submitted by

NITHEESHKUMAR S (20BIT4065)
PREMKUMAR P (20BIT4068)
RAJALINGAM V (20BIT4305)
VYSHAKH S (20BIT4308)

in partial fulfillment of the requirements for the degree of

BACHELOR OF TECHNOLOGY
in

DEPARTMENT OF INFORMATION TECHNOLOGY

M.KUMARASAMY COLLEGE OF ENGINEERING


(Autonomous)

KARUR – 639113.
NOVEMBER 2022
EMAIL ENCRYPTION AND DECRYPTION
A MINOR PROJECT REPORT
Submitted by

NITHEESHKUMAR S (20BIT4065)
PREMKUMAR P (20BIT4068)
RAJALINGAM V (20BIT4305)
VYSHAKH S (20BIT4308)

in partial fulfillment of the requirements for the degree of

BACHELOR OF TECHNOLOGY
in

DEPARTMENT OF INFORMATION TECHNOLOGY

M.KUMARASAMY COLLEGE OF ENGINEERING


(Autonomous)

KARUR – 639113.
NOVEMBER, 2022.

i
M.KUMARASAMY COLLEGE OF ENGINEERING VISION

To emerge as a leader among the top institutions in the field of technical


education.

MISSION

Produce smart technocrats with empirical knowledge who can surmount the
global challenges.

Create a diverse, fully-engaged, learner-centric campus environment to provide


quality education to the students.

Maintain mutually beneficial partnerships with our alumni, industry and


professional associations.

DEPARTMENT OF INFORMATION TECHNOLOGYVISION

To create groomed, technically competent and skilled intellectual IT


professionals to meet the current challenges of the modern computing industry.

MISSION

To ensure the understanding of fundamental aspects of Information Technology


Prepare students to adapt to the challenges of changing market needs by
providing an environment.
Build necessary skills required for employability through career development
training to meet the challenges posed by the competitive world.

ii
PROGRAM EDUCATIONAL OBJECTIVES

 PEO1: Graduates will be able to solve real world problems using learned
concepts Pertaining to Information Technology domain.

 PEO2: Encompass the ability to examine, plan and build innovative software
products and become a successful entrepreneur.

 PEO3: Graduates will be able to carry out the profession with ethics, integrity,
leadership and social responsibility.

 PEO4: Graduates will practice ethics and have habit of continuous learning for
their success in the chosen career.
PROGRAM SPECIFIC OUTCOMES
 PSO1: Professional Skills: Comprehend the technological advancements and
practice professional ethics and the concerns for societal and environmental
well-being.

 PSO2: Competency Skills: Design software in a futuristic approach to support


current technology and adapt cutting-edge technologies.

 PSO3: Successful career: Apply knowledge of theoretical computer science to


assess the hardware and software aspects of computer systems.

PROGRAM OUTCOMES

Graduates of Bachelor of Information Technology will have the following


ability and capability at the end of course :-

 PO1: Engineering knowledge: Apply the knowledge of mathematics, science,


engineering fundamentals, and an engineering specialization to the solution of
complex engineering problems.

 PO2: Problem analysis: Identify, formulate, review research literature, and


analyze complex engineering problems reaching substantiated conclusions using
first principles of mathematics, natural sciences, and engineering sciences.

 PO3: Design/development of solutions: Design solutions for complex


engineering problems and design system components or processes that meet the
specified needs with appropriate consideration for the public health and safety,
and the cultural, societal, and environmental considerations.

 PO4: Conduct investigations of complex problems: Use research-based

iii
knowledge and research methods including design of experiments, analysis and
interpretation of data, and synthesis of the information to provide valid
conclusions.

 PO5: Modern tool usage: Create, select, and apply appropriate techniques,
resources, and modern engineering and IT tools including prediction and
modelling to complex engineering activities with an understanding of the
limitations.

 PO6: The engineer and society: Apply reasoning informed by the contextual
knowledge to assess societal, health, safety, legal and cultural issues and the
consequent responsibilities relevant to the professional engineering practice.

 PO7: Environment and sustainability: Understand the impact of the professional


engineering solutions in societal and environmental contexts, and demonstrate
the knowledge of, and need for sustainable development.

 PO8: Ethics: Apply ethical principles and commit to professional ethics and
responsibilities and norms of the engineering practice.

 PO 9: Individual and team work: Function effectively as an individual, and as a


member or leader in diverse teams, and in multidisciplinary settings.

 PO10: Communication: Communicate effectively on complex engineering


activities with the engineering community and with society at large, such as,
being able to comprehend and write effective reports and design documentation,
make effective presentations, and give and receive clear instructions.
 PO11: Project management and finance: Demonstrate knowledge and
understanding of the engineering and management principles and apply these to
one’s own work, as a member and leader in a team, to manage projects and in
multidisciplinary environments.
 PO12: Life-long learning: Recognize the need for, and have the preparation and
ability to engage in independent and life-long learning in the broadest context of
technological change

iv
M.KUMARASAMY COLLEGE OF ENGINEERING
(Autonomous Institution affiliated to Anna University, Chennai)

BONAFIDE CERTIFICATE

Certified that this minor project report “EMAIL ENCRYPTION AND


DECRYPTION ” is the bona fide work of “NITHEESHKUMAR S
(20BIT4065), PREMKUMAR P (20BIT4068), RAJALINGAM V
(20BIT4305),VYSHAKH S (20BIT4308),” who carried out the project work
during the academic year 2022- 2023 under my super vision. Certified further
,that to the best of our knowledge the reported herein does not form of any other
minor project report or dissertation on the basis of which a degree or award was
conferred on an earlier occasion on this or any other candidate.

Signature Signature

Mrs.S.RAMYA M.E., Dr.R. PUNITHAVATHI, M.E, Ph.D.,


ASSISTANT PROFESSOR/IT, HEAD OF THE DEPARTMENT,
Department of Information Technology Department of Information Technology
M.Kumarasamy College of Engineering, M.Kumarasamy College of Engineering,
Thalavapalayam, Karur-639113. Thalavapalayam, Karur-639113.

v
ABSTRACT

Data sharing and Protection are increasingly becoming an essential part


of the daily life for end users to access different systems, services, and
applications. Data disclosure frequently occurs in real-world E-mail services.
Authentication and copyright protection of multimedia contents has always been
a concern in secure data transfer media. The problem has become more critical
with the increasing use of the Internet and digital technologies. However, making
the protection of copyright is more complex and difficult. Digital watermarking
came up as a solution for copyright protection problem. In proposed approach
using Geo-fense technology, both Watermarking and Encryption approach
utilized for efficient content sharing. Watermarking is used to hiding the
information such as hide secret information in digital media like images.
Encryption techniques used to provide security to data. In encryption, the
information is encoding to prevent unauthorized access and the unauthorized
persons cannot read it. Finally, authorized user can extract decryption key with
the help of embedded data verification process. Unauthorized or illegal access
can identified, when user information does not match with embedded
information. This proposed application helps to track the illegal access and avoid
the content re-distribution in Email environment. And also provide group data
sharing based on rules based approach using Machine learning algorithm and
also provide acknowledgement system for mail delivery system.

vi
TABLE OF CONTENTS
CHAPTER CONTENTS PAGE
Abstract vi
List Of Figures viii
1 Introduction 1
1.1.1 General 1
1.1.2 Scope 2
1.2 Existing System 4
1.2.1 Disadvantages 5
1.3 Proposed System 5
1.3.1 Advantages 6
1.4 Literature Survey 6
2 System Design And Implementation 13
2.1 System Specification 13
2.1.1 Hardware Requirement 13
2.1.2 Software Requirement 13
2.1.3 Software Description 13
2.2 System Design 15
2.3 System Testing And Implementation 24
2.4 Module Description & Implementation 26
2.5 Sample Coding 29
2.6 Screenshots 36
3 Conclusion And Future Work 43
3.1 Conclusion 43
3.2 Future Work 43
3.3 Reference 44

vii
LIST OF FIGURES
FIGURE NO. NAME PAGE NO.
2.2 Block Diagram 15
2.2.2 Use Case Diagram 17
2.2.3 Class Diagram 18
2.2.4 Sequence Diagram 19
2.2.5 Deployment Diagram 20
2.2.6 DFD Level 0 22
2.2.6.1 DFD Level 1 22
2.2.6.2 DFD Level 2 23
2.2.6.3 DFD Level 3 23
2.6.1 Home Page 36
2.6.2 Sign Up Page 36
2.6.3 Sign In Page 37
2.6.4 User Profile 37
2.6.5 Compose Page 38
2.6.6 Mail Sent Page 38
2.6.7 Outbox Page 39
2.6.8 Inbox Page 39
2.6.9 Key Approval Sent 40
2.6.10 Read Mail 40
2.6.11 Download Message 41
2.6.12 Admin Sign In Page 41
2.6.13 Admin Page 42

viii
CHAPTER - 1
INTRODUCTION
CHAPTER 1
1.1 INTRODUCTION

1.1.1 GENERAL
Electronic mail (Email) is a method in transmitting digital messages
between senders and recipients by telecommunication, namely Internet. Most
email programs such as Gmail, Yahoo, Hotmail etc have make it easy in sending
file attachments. The file attachments can be documents, photos, music and
videos. Email can be easily accessed using digital devices such as computer,
notebook, smartphone or I-pad.These software or tools are used by attackers on
a network to obtain confidential data and attachment. Thus, the confidentiality,
integrity, and authentication of that information can be abused. Security in
Information and Communication Technology is defined as adequate protection
of information against unauthorized disclosure, unauthorized modification and
unauthorized withholding. It has a close relationship with privacy as insecure
information cannot ensure users privacy. In E-mail messaging, security can be
defined as the ability of the system to provide i) privacy, ii) sender authentication,
iii) message integrity, iv) non-repudiation, and v) consistency. Email
authentication is a technical solution to proving that an email is not forged. In
other words, it provides a way to verify that an email comes from who it claims
to be from. Email authentication is most often used to block harmful or fraudulent
uses of email such as phishing and spam.

 Authentication is used by a server when the server needs to know exactly


who is accessing their information or site.
 Authentication is used by a client when the client needs to know that the
server is system it claims to be.
 In authentication, the user or computer has to prove its identity to the server
or client.
 Finally provide the acknowledgement system for Mail delivery system.

1
1.1.2 SCOPE
Email Services have been started to emerge as a result of the contrary
advancements within the Internet applications technologies, as well as the novel
infrastructures and platforms which are dominating today’s WWW. Cloud email
services have been recently introduced to the public since less than a decade. This
evolution started when the first cloud based application “Send mail” was
introduced. To make e-mail communication secure and private, e-mail servers
incorporate one or more security features using add-on security protocols. The
add-on security protocols provide a reasonable security but have several
limitations. This project discusses limitations of e-mail security protocols,
analyses and evaluates their effectiveness in e-mail servers. It also proposes
methods to improve efficiency of e-mail servers in detecting spoofed e-mails
from domains that do not follow any standard anti-spoofing protocol. Further, it
presents results of studies carried out to appraise e-mail user practice; knowledge
of security protocols and their confidence in e-mail system.

Email encryption involves encrypting, or disguising, the content of email


messages in order to protect potentially sensitive information from being read
by anyone other than intended recipients. Email encryption often includes
authentication.

 Control device access.


 Identify suspicious user behavior.
 Improve spam and phishing protection.
 Maintain communication confidentiality.
 Protection against zero-day threats.
 Real-time threat protection.
 Stop ransomware attacks and other threats.

2
FEASIBILITY STUDY
The feasibility of the project is analyzed in this phase and business proposal
is put forth with a very general plan for the project and some cost estimates.
During system analysis the feasibility study of the proposed system is to be
carried out. This is to ensure that the proposed system is not a burden to the
company. For feasibility analysis, some understanding of the major requirements
for the system is essential. Three key considerations involved in the feasibility
analysis are
1. Economical Feasibility
2. Technical Feasibility
3. Social Feasibility
a) Economical Feasibility This study is carried out to check the economic impact
that the system will have on the organization. The amount of fund that the
company can pour into the research and development of the system is limited.
The expenditures must be justified. Thus the developed system as well within the
budget and this was achieved because most of the technologies used are freely
available. Only the customized products had to be purchased.
b) Technical Feasibility This study is carried out to check the technical
feasibility, that is, the technical requirements of the system. Any system
developed must not have a high demand on the available technical resources. This
will lead to high demands on the available technical resources. This will lead to
high demands being placed on the client. The developed system must have a
modest requirement, as only minimal or null changes are required for
implementing this system.
c) Social Feasibility The aspect of study is to check the level of acceptance of
the system by the user. This includes the process of training the user to use the
system efficiently. The user must not feel threatened by the system, instead must
accept it as a necessity. The level of acceptance by the users solely depends on
the methods that are employed to educate the user about the system and to make
him familiar with it. His level of confidence must be raised so that he is also able

3
to make some constructive criticism, which is welcomed, as he is the final user
of the system.
1.2 EXISTING SYSTEM
An email server, or simply mail server, is an application or computer in a
network whose sole purpose is to act as a virtual post office. The server stores
incoming mail for distribution to local users and sends out outgoing messages.
To support access control for secure data sharing in the encrypted cloud media
centre, basically there are two widely popular approaches in the literature. The
first kind of approach is based on attribute-based encryption (ABE) where a
content provider can specify an associated access structure over attributes, and
thus the cipher text stored in the cloud can only be decrypted by users whose
attributes satisfy that access structure. The latter kind is based on proxy re-
encryption (PRE) where the cloud acts as a proxy to help delegate the decryption
rights to authorized users in a controllable manner. Compared with ABE, PRE
could be more advantageous in the sense that, in ABE the content provider needs
to download, decrypt, and re-encrypt data when access policies change
frequently. This work focuses on PRE for secure media sharing in the encrypted
cloud media centre. Digital watermarking is a kind of technique that provides
viable solutions to the problem of tracing illegal content redistribution. Typically,
it works by first imperceptibly embedding a unique watermark in each copy of
the plain media content, and later detecting the existence of the unique watermark
from a suspicious copy for traitor tracing. Earlier watermarking schemes had a
limitation though: a malicious content provider could frame a user by unfairly
accusing him of leaking a media object. To solve this problem, a user should be
able to argue against that during a dispute. While ensuring traceability, fair
watermarking further provides fairness to prevent the content provider from
framing users. However, for secure cloud-based media sharing, how to properly
apply fair watermarking to enable fair traitor tracing is not yet clear and remains
to be fully explored.

4
1.2.1 DISADVANTAGES
• There is no security in email data sharing

• Only analysed the activity of mail access

• Easily hack the uploaded data

1.3 PROPOSED SYSTEM


Security in Information and Communication Technology is defined as
adequate protection of information against unauthorized disclosure, unauthorized
modification and unauthorized withholding. It has a close relationship with
privacy as insecure information cannot ensure users privacy. In E-mail
messaging, security can be defined as the ability of the system to provide i)
privacy, ii) sender authentication, iii) message integrity, iv) non-repudiation, and
v) consistency. E-mail system consists of a number of hardware and software
components that follow some defined standards. These standards also include
standards for message addressing and formatting and a number of related
protocols. Simple Mail Transport Protocol is the primary and the most widely
adopted protocol for e-mail delivery. It lacks security features for privacy and
authentication of sending party. E-mail in plain text passes from sender to
recipient through many intermediaries like routers, and mail servers. It is thus,
inherently vulnerable to both physical and virtual eavesdropping as malicious
attackers who gain access to these intermediaries can read e-mails. Further, E-
mail Service Providers (ESPs) have capabilities to store copies of e-mail
messages even when these are deleted by the users from their mailboxes. It has
no mechanism to authenticate the sender or other trusted fields in any way. It does

not verify or validate the senders e-mail address or other header fields. As such
senders can lie about their true identities, date and time of creation of message,
return address and other details which result in security challenges of different
types. In this project, developer can implement the framework to authenticate the
users and also provide the security based on geofense framework. This

5
framework include the watermarking, encryption and machine learning
techniques. Sender can send the file and watermarked by discrete wavelet
transform algorithm and also encrypted using AES algorithm. Then send the file
to appropriate uses from the specific groups. And also send notification about
unauthorized access.
1.3.1 ADVANTAGES
• It avoids the illegal distribution of shared data in storage.

• The user’s watermark is well protected against the hackers

• All the private data are well protected against the cloud and the goal of data
confidentiality is achieved.

• The Content Provider should be endowed with the capability to trace illegal
content redistribution.

1.4 LITERATURE SURVEY


TITLE: ON THE IMPLEMENTATION OF A SECURE EMAIL SYSTEM
WITH ID-BASED ENCRYPTION
AUTHOR: Abdelsatir, Eltigani B, 2020
As with all traffic over the public networks, securing email
communications is increasingly demanded and fairly essential. Most of today's
encryption schemes use techniques such as PGP and S/MIME that encrypts the
entire message between the sender and the receiver. Conventional Public Key
Infrastructure (PKI) systems rely on digital certificates to associate the identity
of a user to a public key. The result is a digital certificate that should be effectively
and constantly managed. The storage, distribution, and revocation of these
certificates is a source of concern when it comes to real-world implementation.
For example, X.509 PKI is the most flexible available format of PKI models. In
fact, there is a wide gap between real-world business demands and
traditionalX.509 model offerings as current commercial applications often need
to adapt their inner workings to be able to work with X.509 certificates. Currently,
many email systems are based on schemes such as S/MIME,PGP and PKI to

6
secure communication. However, authentication methods utilized in these
systems can become costly with the growing burden of certificate management
and pre-enrolment as the number of users increases. In this paper, a secure email
framework while taking into account Identity-Based Encryption without pairing
is considered.
DISADVANTAGES
• Space-efficiency is low.

TITLE: A UNIFORM APPROACH FOR MULTILEVEL EMAIL


SECURITY USING IMAGE AUTHENTICATION, COMPRESSION, OTP
& CRYPTOGRAPHY
AUTHOR: Nemavarkar, Apeksha, 2015
This work proposes the new idea of the multilevel email files security
structural engineering ISA-CC through known parameters. Improved
functionalities like picture validation, pressure by lossless pressure calculation
and encryption utilizing AES, DES with one time cushion which can be better
answer for give security and it can evade different assaults over email. It may be
different calculations for securing recreating the data from the target picture yet
the greater part of them continue from some measure of disappointment of emit
information while remaking it. The proposed technique may be utilized to attain
to all the principle objectives of cryptography by a solitary mean. IA-COTPC
comprises of extremely straightforward steps with no rounds when contrasted
with the standard hash and MAC calculations. It would doubtlessly have low
overhead, so the target of accessibility would be attained to. Encryption is
finished with the most recent secure encryption standard AES, so Confidentiality
is guaranteed.
DISADVANTGES
• Computational overhead can be occurred.

TITLE: A COMPREHENSIVE SECURE EMAIL TRANSFER MODEL


AUTHOR: Liyanage, Geethapriya, 2017

7
SMTP protocol is still having security weaknesses as the studies that have
been done to improve this protocol which only addresses security in Application
level. The model that proposed improves security in core SMTP. In this model
developer introduce authentication, authorization, confidentiality and integrity
into Email system. By having these security considerations, it can improve the
security in message transfer. As future works, developer need to design a proper
revocation policy to maintain a valid list of Email servers. By having such policy
it can maintain a good valid PAD. In future planning to embed public key of CCS
with Email server installation software.
DISADVANTAGES
• Only addresses security in Application level.

TITLE: S3EMAIL: A METHOD FOR SECURING EMAILS FROM


SERVICE PROVIDERS
AUTHOR: Singh, Priyanka 2017
Email is regularly used as a primary form of communication and as such,
email messages might contain highly sensitive information such as social security
numbers, passport credentials, credit card information, etcThis has lead to
concerns over email confidentiality. Emails are stored on infrastructure belonging
to email service providers (ESPs). They are generally not read by the service
providers, but there exists a potential threat from these ESPs as they can have
access to users’ email messages. ESPs may not be able to guarantee users privacy
in all scenarios due to the possibilities of various security breaches across the
network. Threats from malicious external adversaries obtaining unauthorized
access to these email servers and subsequently to users’ emails may cause a huge
loss in privacy. With growing concern over mass surveillance, privacy
infringement and online attacks leading to unauthorized access and data theft,
there have been various attempts to add security to email communication with
varying degrees of success.
DISADVANTAGES

8
• Sometimes attacks may be occurred.

TITLE: A SECURE WEB EMAIL SYSTEM BASED ON IBC


AUTHOR: 2017
The secure web email system based on IBC is barely in the marketplace.
The IBC cryptography technology based on pseudo-RSA is adopted to embed
IBC cryptography in the original PKI/CA system, which enables the system to
communicate with mail software that supports SMIME formats. The non-plugin
technology is applicable to different types of different versions of the browser.
The local agent module is proposed to communicate with the browser to achieve
the security of the mail processing, with universal. The browser can send
messages encrypted or signature by IBC by interacting with the local proxy
module so that the message always exists in cipher text during the transmission
process and is also stored in cipher text in the mail server. The user’s password
stored in the database is a summary of the information processed by the SHA1,
which can ensure the user's password is safe and prevent the user's password from
being leaked to a certain extent.

DISADVANTAGES
• Need large number of parameters for security.

TITLE: DESIGN OF SECURE AND INDEPENDENT CONTROLLABLE


EMAIL SYSTEM BASED ON IDENTITY-BASED CRYPTOGRAPHY
AUTHOR: Xuan, Jiaxing, 2016
IBC, is challenging the status of PKI for its security and efficiency, and
enormous progress has been made in fields where PKI has limitation, especially
secure email. The analysis of traditional email system and data flow when sending
and receiving emails, indicates the inherent vulnerability of transmitting emails
using SMTP protocol. This paper proposes the architecture of secure and
independent controllable email system based on Identity Based Cryptography,
and three concrete solutions suitable for different scenarios are provided. Secure

9
email system based on IBC avoids information disclosure during email
transmission and dramatically improves the safety of enterprise and personal
sensitive information. In the solution of Email Server Encrypting, the email
system need to be upgraded, including the set-up of SM9 Platform, and the
implementation of interfaces between email server and SM9 Platform.

DISADVANTAGES:
• Personal sensitive information can be leaked.

TITLE: EFFECTIVENESS COMPARISON OF THE AES AND 3DES


CRYPTOGRAPHY METHODS ON EMAIL TEXT MESSAGES
AUTHOR: Soualmi, Abdallah, Adel Alti, 2019
AES and 3DES cryptography method successfully implemented on the
email text message in order to have a better security level. The recovery process
after the sending process also was successfully done. Evaluation’s results show
that AES is better in terms of compile time, while 3DES is better in terms of
increasing message’s size after the encryption process. But because the change in
the addition of bytes is not significant, it does not have an impact on the duration
of sending messages through ESP. Based on some of the results of these tests,
email users are recommended to use AES encryption. Electronic mail or email is
among the most popular data or message carrier. One of its powerful features is
the sent message history records which have a long lifetime without big memory
devices. However, with those technology advancements, the security aspects
have become a serious concern. The ease of access to the networks has made an
exposed leakage for some irresponsible parties who have the competencies to
steal the information while the delivery streams take place. In this paper AES and
3DES cryptography method successfully implemented to securing email text
messages. Email message being encrypted first using both algorithms, and then
being evaluated and analysed from various aspects. Evaluation’s results shows
that AES is better in terms of compile time, while 3DES is better in terms of

10
increasing message’s size after the encryption process, but the change in the
addition of bytes is not significant. So based on the results of tests, email users
are recommended to use AES encryption.

DISADVANTAGES
• Message size is increased.

TITLE: A BLIND IMAGE WATERMARKING METHOD FOR


PERSONAL MEDICAL DATA SECURITY
AUTHOR: Abdallah Soualmi , 2019
In this paper, presented a novel blind watermarking method to protect the
sensitive medical data transmitted over the Internet. It benefits from the
combination of DWT and Schur decomposition for embedding watermark bits.
The choice of DWT and Schur decomposition is justified by the high
imperceptibility rate, and by the good robustness. The experimental results
obtained are very promising; with a significantly improved imperceptibility and
robustness against most attacks used in experimentations. In the future, developer
interested to enhance this method in terms of execution time, embedding capacity
and robustness against other geometric and signal processing attacks. The rapid
development of Information Technology has led to the emergence of advanced e-
health applications. These applications are playing a crucial role in decreasing the
execution time and coordinating the distributed healthcare resources. It enables
on-demand access to a shared pool of resources that users can exploit for creating
and managing their internally infrastructures. The primary goal is to reduce the
operating cost and maintenance.

DISADVANTAGES
• Embedding capacity is low.

11
TITLE: SECURE EMAIL GATEWAY
AUTHOR: Purevjav, Saranzaya, TaeYang Kim, 2017
Email spams are the mails send in bulk to many people with a malicious
intent from unknown address. It is a growing concern for organization because it
tricks users to click on the URLs, open attachment which contain virus.
Spammers also use a technique called “snowshoe spam” to send large volumes
of spam to wide range of IP addresses clogging the network bandwidth. The
paper present a gateway level email security solution comprising of content
filtering, URL verification and filtering to address the pressing issues from an
organization perspective, the challenge of controlling email borne security
threats. The encryption of mails was not viable since the receiver’s system should
support the decryption of the mails, which most of the most of the email recipients
does not have. Therefore, access rights management of the email content and
attachment was implemented to secure financial transactions correspondence,
board meetings minutes of meetings and confidential documents.

DISADVANTAGES
• Need to protect sensitive information leaving from organization through
emails.

12
CHAPTER - 2
SYSTEM DESIGN AND
IMPLEMENTATION
CHAPTER 2
SYSYTEM DESIGN AND IMPLEMENTATION
2.1 SYSTEM SPECIFICATION
2.1.1 HARDWARE REQUIREMENT
 Processor : Intel core processor 2.6.0 GHZ
 RAM : 2 GB
 Hard disk : 160 GB
 Compact Disk : 650 Mb
 Keyboard : Standard keyboard
 Monitor : 15 inch color monitor

2.1.2 SOFTWARE REQUIREMENT


 Operating System : Windows OS
 Front End : ASP.NET (C#)
 IDE : VISUAL STUDIO
 Back End : SQL SERVER
 Application : WEB APPLICATION

2.1.3 SOFTWARE DESCRIPTION


2.1.3.1 ASP.NET

ASP.NET is a web application framework developed and marketed by


Microsoft to allow programmers to build dynamic web sites. It allows you to use
a full featured programming language such as C# or VB.NET to build web
applications easily.ASP and ASP.NET are server side technologies.Both
technologies enable computer code to be executed by an Internet server.When a
browser requests an ASP or ASP.NET file, the ASP engine reads the file,
executes any code in the file, and returns the result to the browser.ASP (aka
Classic ASP) was introduced in 1998 as Microsoft's first server side scripting
language.Classic ASP pages have the file extension .asp and are normally written
in VBScript.ASP.NET Web Pages is an SPA application model (Single Page

13
Application).The SPA model is quite similar to PHP and Classic ASP. ASP.NET
is a free web framework for building great websites and web applications using
HTML, CSS, and JavaScript. You can also create Web APIs and use real-time
technologies like Web Sockets. ASP.NET Core is an alternative to ASP.NET.

2.1.3.2 VISUAL STUDIO

Visual Studio is an IDE made by Microsoft and used for different types of
software development such as computer programs, websites, web apps, web
services, and mobile apps. It contains completion tools, compilers, and other
features to facilitate the software development process.

 Flexibility. Professional developer tools for building any application type.


 Productivity. Powerful features such as CodeLens improve your team's
productivity.
 Collaboration. Agile project planning tools, charts, and more.
 Subscriber benefits.
2.1.3.3 SQL SERVER
The SQL Server is a relational database management system from
Microsoft. The system is designed and built is to manage and store information.
The system supports various business intelligence operations, analytics
operations, and transaction processing. SQL Server is a relational database
management system, or RDBMS, developed and marketed by Microsoft.Similar
to other RDBMS software, SQL Server is built on top of SQL, a standard
programming language for interacting with relational databases. SQL Server is
tied to Transact-SQL, or T-SQL, the Microsoft’s implementation of SQL that
adds a set of proprietary programming constructs.SQL Server works exclusively
on the Windows environment for more than 20 years. In 2016, Microsoft made it
available on Linux. SQL Server 2017 became generally available in October 2016
that ran on both Windows and Linux.

14
2.2 SYSTEM DESIGN
2.2 BLOCK DIAGRAM
A system architecture or systems architecture is the conceptual
model that defines the structure, behavior, and more views of a system. In this it
can have sender, receiver flow as shown in the Figure 4.1.1. In this the
architecture of the system is explained.

Fig 2.2.1 Block Diagram

15
2.2.1 UML DIAGRAMS

INTRODUCTION
UML stands for Unified Modelling Language. UML is a standardized
general-purpose modelling language in the field of object-oriented software
engineering. The standard is managed, and was created by, the Object
Management Group.
The goal is for UML to become a common language for creating models
of object oriented computer software. In its current form UML is comprised of
two major components: a Meta-model and a notation. In the future, some form of
method or process may also be added to; or associated with, UML.
The Unified Modelling Language is a standard language for specifying,
Visualization, Constructing and documenting the artifacts of software system, as
well as for business modelling and other non-software systems.
The UML represents a collection of best engineering practices that have
proven successful in the modelling of large and complex systems.
The UML is a very important part of developing objects oriented software
and the software development process. The UML uses mostly graphical notations
to express the design of software projects.
GOALS
The Primary goals in the design of the UML are as follows
1. Provide users a ready-to-use, expressive visual modelling Language so that
they can develop and exchange meaningful models.
2. Provide extendibility and specialization mechanisms to extend the core
concepts.
3. Be independent of particular programming languages and development
process.
4. Provide a formal basis for understanding the modelling language.

16
2.2.2 USE CASE DIAGRAM
A use case diagram in the Unified Modelling Language (UML) is a type of
behavioural diagram defined by and created from a Use-case analysis. Its purpose
is to present a graphical overview of the functionality provided by a system in
terms of actors, their goals (represented as use cases), and any dependencies
between those use cases.
Each use case should provide some observable and valuable result to the
actors or other stakeholders of the system. The use case diagram shows the
internal and external needs of the enterprise email system where the two models
are sender, and receiver and they both has the email server, Mainframe
construction, Compress the data, encrypt the data, receiver selection as given in
the diagram Figure. 7.3.1.

Mail
Framework

Watermarking
the data

Encrypt the
data
SENDER
RECEIVER Decode the
data

Self-
acknowledgement

Fig 2.2.2 Use Case Diagram

17
2.2.3 CLASS DIAGRAM
In software engineering, a class diagram in the Unified Modelling
Language (UML) is a type of static structure diagram that describes the structure
of a system by showing the system's classes, their attributes, operations (or
methods), and the relationships among the classes. It explains which class
contains information.
The purpose of class diagram is to model the static view of an application.
Class diagrams are the only diagrams which can be directly mapped with object-
oriented languages and thus widely used at the time of construction.
The class diagram is used to represent a static view of the system. It plays
an essential role in the establishment of the component and deployment diagrams.
It helps to construct an executable code to perform forward and backward
engineering for any system. It represents the mapping with object-oriented
languages that are C++, Java, etc.
The class diagram shows the relationship between the sender login and the
user login contains file details, receiver details, key details with sender and
request keys, decrypt keys, self acknowledge with user login as given in the
Figure 7.4.1.

Sender_ login User_ login


+File details +Sender details
+Receiver details +File details
+Key details +Key details
+Compose data() +Request the keys()
+Watermark the contents() +Decrypt the data()
+Encrypt the files() +Self-acknowledgement()
+Decision tree algorithm()

Fig 2.2.3 Class Diagram

18
2.2.4 SEQUENCE DIAGRAM
A sequence diagram in Unified Modelling Language (UML) is a kind of
interaction diagram that shows how processes operate with one another and in
what order. It is a construct of a Message Sequence Chart. Sequence diagrams are
sometimes called event diagrams, event scenarios, and timing diagrams.
Professionals, in developing a project, often use system sequence diagrams
to illustrate how certain tasks are done between users and the system. These tasks
may include repetitive, simple, or complex tasks. The purpose is to illustrate the
use case in a visual format. In order to construct a system sequence diagram, you
need to be familiar with the Unified Modeling Language (UML). It incorporates
the iteration as well sender, database, receiver in the email server system as given
in Figure.7.5.1.

Sender Database Receiver


1. Mail Server()
2. Mail Server()

3. Compose the data()


4. Watermark the data()

5.Encrypt the files()

6.Receiver selection()
7.Decode the data()
8.Self-Acknowledgement()

Fig 2.2.4 Sequence Diagram

2.2.5 DEPLOYMENT DIAGRAM


Component diagrams are used to describe the components and deployment
diagrams shows how they are deployed in hardware. UML is mainly designed to
focus on the software artifacts of a system. However, these two diagrams are
special diagrams used to focus on software and hardware components.
A deployment diagram is a UML diagram type that shows the execution
architecture of a system, including nodes such as hardware or software execution

19
environments, and the middleware connecting them. Deployment diagrams are
typically used to visualize the physical hardware and software of a system. Using
it you can understand how the system will be physically deployed on the
hardware. Deployment diagrams help model the hardware topology of a system
compared to other UML diagram types which mostly outline the logical
components of a system. It incorporates server page, receiver page, sender page
as shown in Figure.7.6.1.

Server Page

Sender Page Receiver Page

Fig 2.2.5 Deployment Diagram

2.2.6 DATA FLOW DIAGRAM


A Data Flow Diagram (DFD) is a traditional visual representation of the
information flows within a system. A neat and clear DFD can depict the right
amount of the system requirement graphically. It can be manual, automated, or a
combination of both.
It shows how data enters and leaves the system, what changes the
information, and where data is stored. Data-flow diagrams (DFD) quickly became
a popular way to visualize the major steps and data involved in software-system
processes. DFDs were usually used to show data flow in a computer system,

20
although they could in theory be applied to business process modeling.
Entity names should be comprehensible without further comments. DFD
is a system created by analysts based on interviews with system users. It is
determined for system developers, on one hand, project contractor on the other,
so the entity names should be adapted for model domain or amateur users or
professionals.
The DFD is also called as bubble chart. It is a simple graphical formalism
that can be used to represent a system in terms of input data to the system, various
processing carried out on this data, and the output data is generated by this system.
Two-dimensional diagram explains how data is processed and transferred in a
system. The graphical depiction identifies each source of data and how it interacts
with other data sources to reach a common output. Individuals seeking to draft a
data flow diagram must identify external inputs and outputs, determine how the
inputs and outputs relate to each other, and explain with graphics how these
connections relate and what they result in. This type of diagram helps business
development and design teams visualize how data is processed and identify or
improve certain aspects The following observations about DFDs are essential.
1. All names should be unique. This makes it easier to refer to elements in the
DFD.
2. Remember that DFD is not a flow chart. Arrows is a flow chart that
represents the order of events; arrows in DFD represents flowing data. A
DFD does not involve any order of events.
It consist of three levels in email server of admin, sender, receiver, inbox, outbox,
compose as shown in Figure 7.7.1.

21
LEVEL 0

Mail Server framework


Inbox

Admin User Sent mail

Compose

Fig 2.2.6 DFD Level 0

LEVEL 1

Compose mail Watermarking


the content

Encrypt the files

Encrypted form of mail


data

Fig 2.2.6.1 DFD Level 1

22
LEVEL 2

Encrypted form Decision tree


Company
of mail data algorithm
database

Location or
group selection

Send mail

Fig 2.2.6.2 DFD Level 2

LEVEL 3

Receiver Self-
acknowledgement Server database

Key request

Extract the Email


contents

Fig 2.2.6.3 DFD Level 3

23
2.3 SYSTEM TESTING AND IMPLEMENTATION
2.3.1 SYSTEM TESTING
Software testing is a method of assessing the functionality of a software
program. There are many different types of software testing but the two main
categories are dynamic testing and static testing. Dynamic testing is an
assessment that is conducted while the program is executed; static testing, on the
other hand, is an examination of the program's code and associated
documentation. Dynamic and static methods are often used together.Testing is a
set activity that can be planned and conducted systematically. Testing begins at
the module level and work towards the integration of entire computers based
system. Nothing is complete without testing, as it is vital success of the system.
Testing Objectives:

There are several rules that can serve as testing objectives, they are
1. Testing is a process of executing a program with the intent of
finding an error.
2. A good test case is one that has high probability of finding an
undiscovered error.
3. A successful test is one that uncovers an undiscovered error.

Tests for correctness are supposed to verify that a program does exactly
what it was designed to do. This is much more difficult than it may at first appear,
especially for large programs. Tests used for implementation efficiency attempt
to find ways to make a correct program faster or use less storage. It is a code-
refining process, which reexamines the implementation phase of algorithm
development. Tests for computational complexity amount to an experimental
analysis of the complexity of an algorithm or an experimental comparison of
two or more algorithms, which solve the same problem.

24
There are three ways to test a program
1. For Correctness
2. For Implementation efficiency
3. For Computational Complexity

Tests for correctness are supposed to verify that a program does exactly what it
was designed to do. This is much more difficult than it may at first appear,
especially for large programs.
The data is entered in all forms separately and whenever an error occurred, it is
corrected immediately. A quality team deputed by the management verified all
the necessary documents and tested the Software while entering the data at all
levels. The development process involves various types of testing. Each test
type addresses a specific testing requirement. The most common types of testing
involved in the development process are:
• Unit Test
• Functional Test
• Integration Test
Unit Testing
The first test in the development process is the unit test. The source code
is normally divided into modules, which in turn are divided into smaller units
called units. These units have specific behavior. The test done on these units of
code is called unit test. Unit test depends upon the language on which the project
is developed. Unit tests ensure that each unique path of the project performs
accurately to the documented specifications and contains clearly defined inputs
and expected results.
Functional Testing
Functional test can be defined as testing two or more modules together
with the intent of finding defects, demonstrating that defects are not present,
verifying that the module performs its intended functions as stated in the
specification and establishing confidence that a program does what it is supposed
to do.

25
Integration Testing
In integration testing modules are combined and tested as a group. Modules
are typically code modules, individual applications, source and destination
applications on a network, etc. Integration Testing follows unit testing and
precedes system testing. Testing after the product is code complete. Betas are
often widely distributed or even distributed to the public at large in hopes that
they will buy the final product when it is released.

2.4 MODULES DESCRIPTION AND IMPLEMENTATION


2.4.1 LIST OF MODULES
Module 1: Email Server Framework
Module 2: Data Shielding
Module 3: Group selection
Module 4: Notification with acknowledgement

2.4.2 MODULE 1: EMAIL SERVER FRAMEWORK


A mail server (also known as a mail transfer agent or MTA, a mail transport
agent, a mail router or an Internet mailer) is an application that receives incoming e-
mail from local users (people within the same domain) and remote senders and
forwards outgoing e-mail for delivery. A computer dedicated to running such
applications is also called a mail server. In this module developer can create the
framework like as mail server. This framework contains server and multiple
users. Server can maintain all user details. Users easily upload the files in inbox
and also share the data anywhere and anytime.
2.4.3 MODULE 2: DATA SHIELDING
Data can be distributed electronically in countless ways. The most common
of these are e-mail and various data sharing services. By e-mail, an attachment
can be quickly delivered to a recipient. E-mail messages function best when the
number of messages and people in the conversation is small. Data sharing
services function better than e-mail in situations where there are many people in

26
the conversation or large number of messages sent. Messages do not block e-mail
and file management is easier and centralized. Conversations and files can be
stored as long as required. In this module can upload the data in various form.
The proliferation of digital media over the internet has been raised in last few
years. The enhancing usage of digitization has given a great lead to copyright
issues. To tackle with copyright issues, digital watermarking comes out as
suitable solution. Digital watermarking is process of inserting watermark
information into host data. In this module can implement discrete wavelet
transform algorithm to watermark the content. Discrete Wavelet Transform is a
transform that is used in numerical as well as functional analysis. In this
transform, the wavelets are sampled with the discrete values. The main advantage
of this transform over Fourier Transform is that it captures both frequency and
location information. In Discrete Wavelet Transform, signal energy concentrates
to specific wavelet coefficients. After watermark the content, implement AES
algorithm encrypt the data. AES encryption, or advanced encryption standard,
is a type of cipher that protects the transfer of data. Advanced Encryption
Standard (AES) algorithm is measured as a secured procedure. Still, some
security questions lie in the S-Box and the key used. AES (Advanced Encryption
Standard) algorithm is founded on substitution and permutation principles. It
takes the input text chunk of size 128 bit and a variable key size of 128, 192 or
256 bits for 10, 12 or 14 rounds respectively. Each round contains of numerous
processing steps, including the encryption step itself. Similarly, set of reverse
sequences are achieved to transform cipher text back into plaintext.
2.4.4 MODULE 3: GROUP SELECTION

In this module it can select the groups to send the mail by using machine
learning algorithm and Geo fencing. In a decision tree, for predicting the class of
the given dataset, the algorithm starts from the root node of the tree. This
algorithm compares the values of root attribute with the record (real dataset)
attribute and, based on the comparison, follows the branch and jumps to the next

27
node. For the next node, the algorithm again compares the attribute value with
the other sub-nodes and move further. It continues the process until it reaches the
leaf node of the tree. It is a user-created virtual boundary which can trigger and
select the users from appropriate the groups.

2.4.5 MODULE 4: NOTIFICATION AND ACKNOWLEDGEMENT


In this module, file can be send to authorized recipients. If the receiver
wants to download the data means, key request can be sent to original sender.
After the key invokes, receiver download the data in watermarked format by
using AES decryption. This file can’t use by other users. Finally send the
acknowledgement to sender about the status of email based on receiver.

28
2.5 SAMPLE CODING
SOURCE CODE
<%@ Page Language="C#" AutoEventWireup="true"
CodeFile="Home.aspx.cs" Inherits="Home" %>

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"


"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">
<head runat="server">
<!-- Required meta tags -->
<meta charset="utf-8">
<meta name="viewport" content="width=device-width, initial-scale=1,
shrink-to-fit=no">
<title>Email Server</title>
<!-- google-fonts -->
<link

href="//fonts.googleapis.com/css2?family=Montserrat:wght@100;200;300;400;
500;600;700;800;900&display=swap"
rel="stylesheet">
<!-- //google-fonts -->
<!-- Template CSS Style link -->
<link rel="stylesheet" href="css/style-starter.css">
</head>
<body>

<!--header-->
<header id="site-header" class="fixed-top">
<div class="container">
<nav class="navbar navbar-expand-lg stroke">
<h1>
<a class="navbar-brand" href="index.html"><i class="fa fa-
headphones mr-1"
aria-hidden="true"></i>Email Server</a>
</h1>

<button class="navbar-toggler collapsed bg-gradient" type="button"


data-toggle="collapse"
data-target="#navbarTogglerDemo02" aria-
controls="navbarTogglerDemo02" aria-expanded="false"
aria-label="Toggle navigation">
<span class="navbar-toggler-icon fa icon-expand fa-bars"></span>

29
<span class="navbar-toggler-icon fa icon-close fa-times"></span>
</button>

<div class="collapse navbar-collapse" id="navbarTogglerDemo02">


<ul class="navbar-nav ml-lg-auto">
<li class="nav-item" > <a class="nav-link"
href="Home.aspx">Home <span class="sr-only">(current)</span></a> </li>
<li class="nav-item"><a class="nav-link"
href="AdminLogin.aspx">Admin login</a></li>
<li class="nav-item"><a class="nav-link"
href="UserLogin.aspx">SignIn</a> </li>
<li class="nav-item"> <a class="nav-link"
href="NewUser.aspx">SignUp</a></li>
</ul>
</div>
<!-- toggle switch for light and dark theme -->

<!-- //toggle switch for light and dark theme -->


</nav>
</div>
</header>
<!--//header-->

<!-- banner section -->


<section class="w3l-banner pt-5">
<div class="container">
<div class="row">
<div class="col-xl-6 banner-left">
<h3 class="text-white mb-3 title">We Offer Best Quality<br>
Email <span class="type-js"><span class="text-js"> Service!
</span></span></h3>
<p class="lead text-white">
</p>
<div class="mt-5">
<a class="btn btn-style-white" href="about.html">View Our
Works</a>
</div>
</div>
</div>
</div>
</section>
<!-- //banner section -->
<div class="contact-form py-5">
<form id="form1" runat="server">

30
<div>

</div>
</form>

</div>
<!-- footer -->

<!-- //footer -->


<!-- copyright -->
<section class="w3l-copyright">
<div class="container">
<div class="row bottom-copies">
<p class="col-lg-8 copy-footer-29">©Email Server. All rights
reserved.<a
href="https://www.mkce.ac.in/" target="_blank">
MKCE</a></p>
<div class="col-lg-4 text-right">
<div class="main-social-footer-29">
<a href="#facebook" class="facebook"><span class="fa fa-
facebook"></span></a>
<a href="#twitter" class="twitter"><span class="fa fa-
twitter"></span></a>
<a href="#google"><span class="fa fa-google-plus" aria-
hidden="true"></span></a>
<a href="#instagram" class="instagram"><span class="fa fa-
instagram"></span></a>
<a href="#linkedin" class="linkedin"><span class="fa fa-
linkedin"></span></a>

</div>
</div>
</div>
</div>
</section>
<!-- //copyright -->

<!-- Js scripts -->


<!-- move top -->
<button onclick="topFunction()" id="movetop" title="Go to top">
<span class="fa fa-level-up" aria-hidden="true"></span>
</button>
<script>

31
// When the user scrolls down 20px from the top of the document, show the
button
window.onscroll = function () {
scrollFunction()
};

function scrollFunction() {
if (document.body.scrollTop > 20 ||
document.documentElement.scrollTop > 20) {
document.getElementById("movetop").style.display = "block";
} else {
document.getElementById("movetop").style.display = "none";
}
}

// When the user clicks on the button, scroll to the top of the document
function topFunction() {
document.body.scrollTop = 0;
document.documentElement.scrollTop = 0;
}
</script>
<!-- //move top -->

<!-- common jquery plugin -->


<script src="js/jquery-3.3.1.min.js"></script>
<!-- //common jquery plugin -->

<!-- theme switch js (light and dark)-->


<script src="js/theme-change.js"></script>
<script>
function autoType(elementClass, typingSpeed) {
var thhis = $(elementClass);
thhis.css({
"position": "relative",
"display": "inline-block"
});
thhis.prepend('<div class="cursor" style="right: initial; left:0;"></div>');
thhis = thhis.find(".text-js");
var text = thhis.text().trim().split('');
var amntOfChars = text.length;
var newString = "";
thhis.text("|");
setTimeout(function () {
thhis.css("opacity", 1);

32
thhis.prev().removeAttr("style");
thhis.text("");
for (var i = 0; i < amntOfChars; i++) {
(function (i, char) {
setTimeout(function () {
newString += char;
thhis.text(newString);
}, i * typingSpeed);
})(i + 1, text[i]);
}
}, 1500);
}

$(document).ready(function () {
// Now to start autoTyping just call the autoType function with the
// class of outer div
// The second paramter is the speed between each letter is typed.
autoType(".type-js", 200);
});
</script>
<!-- //theme switch js (light and dark)-->

<!-- magnific popup -->


<script src="js/jquery.magnific-popup.min.js"></script>
<script>
$(document).ready(function () {
$('.popup-with-zoom-anim').magnificPopup({
type: 'inline',

fixedContentPos: false,
fixedBgPos: true,

overflowY: 'auto',

closeBtnInside: true,
preloader: false,

midClick: true,
removalDelay: 300,
mainClass: 'my-mfp-zoom-in'
});

$('.popup-with-move-anim').magnificPopup({
type: 'inline',

33
fixedContentPos: false,
fixedBgPos: true,

overflowY: 'auto',

closeBtnInside: true,
preloader: false,

midClick: true,
removalDelay: 300,
mainClass: 'my-mfp-slide-bottom'
});
});
</script>
<!-- //magnific popup -->

<!-- MENU-JS -->


<script>
$(window).on("scroll", function () {
var scroll = $(window).scrollTop();

if (scroll >= 80) {


$("#site-header").addClass("nav-fixed");
} else {
$("#site-header").removeClass("nav-fixed");
}
});

//Main navigation Active Class Add Remove


$(".navbar-toggler").on("click", function () {
$("header").toggleClass("active");
});
$(document).on("ready", function () {
if ($(window).width() > 991) {
$("header").removeClass("active");
}
$(window).on("resize", function () {
if ($(window).width() > 991) {
$("header").removeClass("active");
}
});
});
</script>

34
<!-- //MENU-JS -->

<!-- counter for stats -->


<script src="js/counter.js"></script>
<!-- //counter for stats -->

<!-- disable body scroll which navbar is in active -->


<script>
$(function () {
$('.navbar-toggler').click(function () {
$('body').toggleClass('noscroll');
})
});
</script>
<!-- //disable body scroll which navbar is in active -->

<!--bootstrap-->
<script src="js/bootstrap.min.js"></script>
<!-- //bootstrap-->
<!-- //Js scripts -->
</body>
</html>

35
2.6 SCREENSHOTS

Fig 2.6.1 Home Page

Fig 2.6.2 Sign Up Page

36
Fig 2.6.3 Sign In Page

Fig 2.6.4 User Profile

37
Fig 2.6.5 Compose Page

Fig 2.6.6 Mail Sent Page

38
Fig 2.6.7 Outbox Page

Fig 2.6.8 Inbox Page

39
Fig 2.6.9 Key Approval Sent

Fig 2.6.10 Read Mail

40
Fig 2.6.11 Download Message

Fig 2.6.12 Admin Sign In Page

41
Fig 2.6.13 Admin Page

42
CHAPTER - 3
CONCLUSION AND
FUTURE WORK
CHAPTER-3
CONCLUSION AND FUTURE WORK
3.1 CONCLUSION
Propose a combined cryptography and watermarking techniques for secure
transmission of information through E- Mail server. Discrete Wavelet technique
is used for watermarking and AES cryptography is used for encryption purposes.
The proposed technique is not only designed to provide copyright protection;
however, it is proposed to provide integrity and authentication services for the
media data based on Geofense framework. It includes the Machine learning
algorithm to choose group data sharing based on location of group. Therefore, its
target is not to be robust against modification attacks, but its target is to detect
any illegal activities on the watermarked information. The ability of this
technique is identified to check if the integrity and authentication of the shared
information are corrupted at the receiver end. At the receiver side the proposed
technique detected this modification and sent a message to the content provider
regarding illegal distribution. And also provide mail delivery system to know
about status of mail at recipient side.

3.2 FUTURE WORK


In future, developer can extend the framework to implement in various
cryptography algorithms and implemented in various applications.

43
3.3 REFERENCES
[1] Abdelsatir, Eltigani B., and Mohammad H. Alrashdan. "On the
Implementation of a Secure Email System with ID-based
Encryption." 2019 International Conference on Advances in the Emerging
Computing Technologies (AECT). IEEE, 2020.
[2] Abbas, A. H., et al. "GPS based location monitoring system with geo-
fencing capabilities." AIP Conference Proceedings. Vol. 2173. No. 1. AIP
Publishing LLC, 2019.
[3] Al-Asady, Heba Abdul-Jaleel, Osama Qasim Jumah Al-Thahab, and Saad
S. Hreshee. "Robust encryption system based watermarking theory by
using chaotic algorithms: A reviewer paper." Journal of Physics:
Conference Series. Vol. 1818. No. 1. IOP Publishing, 2021.
[4] Bagdasaryan, Eugene, et al. "Ancile: Enhancing privacy for ubiquitous
computing with use-based privacy." Proceedings of the 18th ACM
Workshop on Privacy in the Electronic Society. 2019.
[5] Barapatre, Minal, and C. N. Deshmukh. "Design & Development of
Network Geo-Fencing Model for User Monitoring and it’s Alertness in a
Security Applications.
[6] Gautam, Aakanksha, and Vipin Vats. "Digital Data Security using Audio
Watermarking & Cryptography Concepts.“ 2019.
[7] Huo, Bo, Yihong Long, and Jinglin Wu. "A Secure Web Email System
Based on IBC." 2017 13th International Conference on Computational
Intelligence and Security (CIS). IEEE, 2017.
[8] Indrayani, Rini, Pramudita Ferdiansyah, and Dhimas Adi Satria.
"Effectiveness comparison of the AES and 3DES cryptography methods
on email text messages." 2019 International Conference on Information
and Communications Technology (ICOIACT). IEEE, 2019.

44

You might also like