Email Encryption & Decryption
Email Encryption & Decryption
NITHEESHKUMAR S (20BIT4065)
PREMKUMAR P (20BIT4068)
RAJALINGAM V (20BIT4305)
VYSHAKH S (20BIT4308)
BACHELOR OF TECHNOLOGY
in
KARUR – 639113.
NOVEMBER 2022
EMAIL ENCRYPTION AND DECRYPTION
A MINOR PROJECT REPORT
Submitted by
NITHEESHKUMAR S (20BIT4065)
PREMKUMAR P (20BIT4068)
RAJALINGAM V (20BIT4305)
VYSHAKH S (20BIT4308)
BACHELOR OF TECHNOLOGY
in
KARUR – 639113.
NOVEMBER, 2022.
i
M.KUMARASAMY COLLEGE OF ENGINEERING VISION
MISSION
Produce smart technocrats with empirical knowledge who can surmount the
global challenges.
MISSION
ii
PROGRAM EDUCATIONAL OBJECTIVES
PEO1: Graduates will be able to solve real world problems using learned
concepts Pertaining to Information Technology domain.
PEO2: Encompass the ability to examine, plan and build innovative software
products and become a successful entrepreneur.
PEO3: Graduates will be able to carry out the profession with ethics, integrity,
leadership and social responsibility.
PEO4: Graduates will practice ethics and have habit of continuous learning for
their success in the chosen career.
PROGRAM SPECIFIC OUTCOMES
PSO1: Professional Skills: Comprehend the technological advancements and
practice professional ethics and the concerns for societal and environmental
well-being.
PROGRAM OUTCOMES
iii
knowledge and research methods including design of experiments, analysis and
interpretation of data, and synthesis of the information to provide valid
conclusions.
PO5: Modern tool usage: Create, select, and apply appropriate techniques,
resources, and modern engineering and IT tools including prediction and
modelling to complex engineering activities with an understanding of the
limitations.
PO6: The engineer and society: Apply reasoning informed by the contextual
knowledge to assess societal, health, safety, legal and cultural issues and the
consequent responsibilities relevant to the professional engineering practice.
PO8: Ethics: Apply ethical principles and commit to professional ethics and
responsibilities and norms of the engineering practice.
iv
M.KUMARASAMY COLLEGE OF ENGINEERING
(Autonomous Institution affiliated to Anna University, Chennai)
BONAFIDE CERTIFICATE
Signature Signature
v
ABSTRACT
vi
TABLE OF CONTENTS
CHAPTER CONTENTS PAGE
Abstract vi
List Of Figures viii
1 Introduction 1
1.1.1 General 1
1.1.2 Scope 2
1.2 Existing System 4
1.2.1 Disadvantages 5
1.3 Proposed System 5
1.3.1 Advantages 6
1.4 Literature Survey 6
2 System Design And Implementation 13
2.1 System Specification 13
2.1.1 Hardware Requirement 13
2.1.2 Software Requirement 13
2.1.3 Software Description 13
2.2 System Design 15
2.3 System Testing And Implementation 24
2.4 Module Description & Implementation 26
2.5 Sample Coding 29
2.6 Screenshots 36
3 Conclusion And Future Work 43
3.1 Conclusion 43
3.2 Future Work 43
3.3 Reference 44
vii
LIST OF FIGURES
FIGURE NO. NAME PAGE NO.
2.2 Block Diagram 15
2.2.2 Use Case Diagram 17
2.2.3 Class Diagram 18
2.2.4 Sequence Diagram 19
2.2.5 Deployment Diagram 20
2.2.6 DFD Level 0 22
2.2.6.1 DFD Level 1 22
2.2.6.2 DFD Level 2 23
2.2.6.3 DFD Level 3 23
2.6.1 Home Page 36
2.6.2 Sign Up Page 36
2.6.3 Sign In Page 37
2.6.4 User Profile 37
2.6.5 Compose Page 38
2.6.6 Mail Sent Page 38
2.6.7 Outbox Page 39
2.6.8 Inbox Page 39
2.6.9 Key Approval Sent 40
2.6.10 Read Mail 40
2.6.11 Download Message 41
2.6.12 Admin Sign In Page 41
2.6.13 Admin Page 42
viii
CHAPTER - 1
INTRODUCTION
CHAPTER 1
1.1 INTRODUCTION
1.1.1 GENERAL
Electronic mail (Email) is a method in transmitting digital messages
between senders and recipients by telecommunication, namely Internet. Most
email programs such as Gmail, Yahoo, Hotmail etc have make it easy in sending
file attachments. The file attachments can be documents, photos, music and
videos. Email can be easily accessed using digital devices such as computer,
notebook, smartphone or I-pad.These software or tools are used by attackers on
a network to obtain confidential data and attachment. Thus, the confidentiality,
integrity, and authentication of that information can be abused. Security in
Information and Communication Technology is defined as adequate protection
of information against unauthorized disclosure, unauthorized modification and
unauthorized withholding. It has a close relationship with privacy as insecure
information cannot ensure users privacy. In E-mail messaging, security can be
defined as the ability of the system to provide i) privacy, ii) sender authentication,
iii) message integrity, iv) non-repudiation, and v) consistency. Email
authentication is a technical solution to proving that an email is not forged. In
other words, it provides a way to verify that an email comes from who it claims
to be from. Email authentication is most often used to block harmful or fraudulent
uses of email such as phishing and spam.
1
1.1.2 SCOPE
Email Services have been started to emerge as a result of the contrary
advancements within the Internet applications technologies, as well as the novel
infrastructures and platforms which are dominating today’s WWW. Cloud email
services have been recently introduced to the public since less than a decade. This
evolution started when the first cloud based application “Send mail” was
introduced. To make e-mail communication secure and private, e-mail servers
incorporate one or more security features using add-on security protocols. The
add-on security protocols provide a reasonable security but have several
limitations. This project discusses limitations of e-mail security protocols,
analyses and evaluates their effectiveness in e-mail servers. It also proposes
methods to improve efficiency of e-mail servers in detecting spoofed e-mails
from domains that do not follow any standard anti-spoofing protocol. Further, it
presents results of studies carried out to appraise e-mail user practice; knowledge
of security protocols and their confidence in e-mail system.
2
FEASIBILITY STUDY
The feasibility of the project is analyzed in this phase and business proposal
is put forth with a very general plan for the project and some cost estimates.
During system analysis the feasibility study of the proposed system is to be
carried out. This is to ensure that the proposed system is not a burden to the
company. For feasibility analysis, some understanding of the major requirements
for the system is essential. Three key considerations involved in the feasibility
analysis are
1. Economical Feasibility
2. Technical Feasibility
3. Social Feasibility
a) Economical Feasibility This study is carried out to check the economic impact
that the system will have on the organization. The amount of fund that the
company can pour into the research and development of the system is limited.
The expenditures must be justified. Thus the developed system as well within the
budget and this was achieved because most of the technologies used are freely
available. Only the customized products had to be purchased.
b) Technical Feasibility This study is carried out to check the technical
feasibility, that is, the technical requirements of the system. Any system
developed must not have a high demand on the available technical resources. This
will lead to high demands on the available technical resources. This will lead to
high demands being placed on the client. The developed system must have a
modest requirement, as only minimal or null changes are required for
implementing this system.
c) Social Feasibility The aspect of study is to check the level of acceptance of
the system by the user. This includes the process of training the user to use the
system efficiently. The user must not feel threatened by the system, instead must
accept it as a necessity. The level of acceptance by the users solely depends on
the methods that are employed to educate the user about the system and to make
him familiar with it. His level of confidence must be raised so that he is also able
3
to make some constructive criticism, which is welcomed, as he is the final user
of the system.
1.2 EXISTING SYSTEM
An email server, or simply mail server, is an application or computer in a
network whose sole purpose is to act as a virtual post office. The server stores
incoming mail for distribution to local users and sends out outgoing messages.
To support access control for secure data sharing in the encrypted cloud media
centre, basically there are two widely popular approaches in the literature. The
first kind of approach is based on attribute-based encryption (ABE) where a
content provider can specify an associated access structure over attributes, and
thus the cipher text stored in the cloud can only be decrypted by users whose
attributes satisfy that access structure. The latter kind is based on proxy re-
encryption (PRE) where the cloud acts as a proxy to help delegate the decryption
rights to authorized users in a controllable manner. Compared with ABE, PRE
could be more advantageous in the sense that, in ABE the content provider needs
to download, decrypt, and re-encrypt data when access policies change
frequently. This work focuses on PRE for secure media sharing in the encrypted
cloud media centre. Digital watermarking is a kind of technique that provides
viable solutions to the problem of tracing illegal content redistribution. Typically,
it works by first imperceptibly embedding a unique watermark in each copy of
the plain media content, and later detecting the existence of the unique watermark
from a suspicious copy for traitor tracing. Earlier watermarking schemes had a
limitation though: a malicious content provider could frame a user by unfairly
accusing him of leaking a media object. To solve this problem, a user should be
able to argue against that during a dispute. While ensuring traceability, fair
watermarking further provides fairness to prevent the content provider from
framing users. However, for secure cloud-based media sharing, how to properly
apply fair watermarking to enable fair traitor tracing is not yet clear and remains
to be fully explored.
4
1.2.1 DISADVANTAGES
• There is no security in email data sharing
not verify or validate the senders e-mail address or other header fields. As such
senders can lie about their true identities, date and time of creation of message,
return address and other details which result in security challenges of different
types. In this project, developer can implement the framework to authenticate the
users and also provide the security based on geofense framework. This
5
framework include the watermarking, encryption and machine learning
techniques. Sender can send the file and watermarked by discrete wavelet
transform algorithm and also encrypted using AES algorithm. Then send the file
to appropriate uses from the specific groups. And also send notification about
unauthorized access.
1.3.1 ADVANTAGES
• It avoids the illegal distribution of shared data in storage.
• All the private data are well protected against the cloud and the goal of data
confidentiality is achieved.
• The Content Provider should be endowed with the capability to trace illegal
content redistribution.
6
secure communication. However, authentication methods utilized in these
systems can become costly with the growing burden of certificate management
and pre-enrolment as the number of users increases. In this paper, a secure email
framework while taking into account Identity-Based Encryption without pairing
is considered.
DISADVANTAGES
• Space-efficiency is low.
7
SMTP protocol is still having security weaknesses as the studies that have
been done to improve this protocol which only addresses security in Application
level. The model that proposed improves security in core SMTP. In this model
developer introduce authentication, authorization, confidentiality and integrity
into Email system. By having these security considerations, it can improve the
security in message transfer. As future works, developer need to design a proper
revocation policy to maintain a valid list of Email servers. By having such policy
it can maintain a good valid PAD. In future planning to embed public key of CCS
with Email server installation software.
DISADVANTAGES
• Only addresses security in Application level.
8
• Sometimes attacks may be occurred.
DISADVANTAGES
• Need large number of parameters for security.
9
email system based on IBC avoids information disclosure during email
transmission and dramatically improves the safety of enterprise and personal
sensitive information. In the solution of Email Server Encrypting, the email
system need to be upgraded, including the set-up of SM9 Platform, and the
implementation of interfaces between email server and SM9 Platform.
DISADVANTAGES:
• Personal sensitive information can be leaked.
10
increasing message’s size after the encryption process, but the change in the
addition of bytes is not significant. So based on the results of tests, email users
are recommended to use AES encryption.
DISADVANTAGES
• Message size is increased.
DISADVANTAGES
• Embedding capacity is low.
11
TITLE: SECURE EMAIL GATEWAY
AUTHOR: Purevjav, Saranzaya, TaeYang Kim, 2017
Email spams are the mails send in bulk to many people with a malicious
intent from unknown address. It is a growing concern for organization because it
tricks users to click on the URLs, open attachment which contain virus.
Spammers also use a technique called “snowshoe spam” to send large volumes
of spam to wide range of IP addresses clogging the network bandwidth. The
paper present a gateway level email security solution comprising of content
filtering, URL verification and filtering to address the pressing issues from an
organization perspective, the challenge of controlling email borne security
threats. The encryption of mails was not viable since the receiver’s system should
support the decryption of the mails, which most of the most of the email recipients
does not have. Therefore, access rights management of the email content and
attachment was implemented to secure financial transactions correspondence,
board meetings minutes of meetings and confidential documents.
DISADVANTAGES
• Need to protect sensitive information leaving from organization through
emails.
12
CHAPTER - 2
SYSTEM DESIGN AND
IMPLEMENTATION
CHAPTER 2
SYSYTEM DESIGN AND IMPLEMENTATION
2.1 SYSTEM SPECIFICATION
2.1.1 HARDWARE REQUIREMENT
Processor : Intel core processor 2.6.0 GHZ
RAM : 2 GB
Hard disk : 160 GB
Compact Disk : 650 Mb
Keyboard : Standard keyboard
Monitor : 15 inch color monitor
13
Application).The SPA model is quite similar to PHP and Classic ASP. ASP.NET
is a free web framework for building great websites and web applications using
HTML, CSS, and JavaScript. You can also create Web APIs and use real-time
technologies like Web Sockets. ASP.NET Core is an alternative to ASP.NET.
Visual Studio is an IDE made by Microsoft and used for different types of
software development such as computer programs, websites, web apps, web
services, and mobile apps. It contains completion tools, compilers, and other
features to facilitate the software development process.
14
2.2 SYSTEM DESIGN
2.2 BLOCK DIAGRAM
A system architecture or systems architecture is the conceptual
model that defines the structure, behavior, and more views of a system. In this it
can have sender, receiver flow as shown in the Figure 4.1.1. In this the
architecture of the system is explained.
15
2.2.1 UML DIAGRAMS
INTRODUCTION
UML stands for Unified Modelling Language. UML is a standardized
general-purpose modelling language in the field of object-oriented software
engineering. The standard is managed, and was created by, the Object
Management Group.
The goal is for UML to become a common language for creating models
of object oriented computer software. In its current form UML is comprised of
two major components: a Meta-model and a notation. In the future, some form of
method or process may also be added to; or associated with, UML.
The Unified Modelling Language is a standard language for specifying,
Visualization, Constructing and documenting the artifacts of software system, as
well as for business modelling and other non-software systems.
The UML represents a collection of best engineering practices that have
proven successful in the modelling of large and complex systems.
The UML is a very important part of developing objects oriented software
and the software development process. The UML uses mostly graphical notations
to express the design of software projects.
GOALS
The Primary goals in the design of the UML are as follows
1. Provide users a ready-to-use, expressive visual modelling Language so that
they can develop and exchange meaningful models.
2. Provide extendibility and specialization mechanisms to extend the core
concepts.
3. Be independent of particular programming languages and development
process.
4. Provide a formal basis for understanding the modelling language.
16
2.2.2 USE CASE DIAGRAM
A use case diagram in the Unified Modelling Language (UML) is a type of
behavioural diagram defined by and created from a Use-case analysis. Its purpose
is to present a graphical overview of the functionality provided by a system in
terms of actors, their goals (represented as use cases), and any dependencies
between those use cases.
Each use case should provide some observable and valuable result to the
actors or other stakeholders of the system. The use case diagram shows the
internal and external needs of the enterprise email system where the two models
are sender, and receiver and they both has the email server, Mainframe
construction, Compress the data, encrypt the data, receiver selection as given in
the diagram Figure. 7.3.1.
Mail
Framework
Watermarking
the data
Encrypt the
data
SENDER
RECEIVER Decode the
data
Self-
acknowledgement
17
2.2.3 CLASS DIAGRAM
In software engineering, a class diagram in the Unified Modelling
Language (UML) is a type of static structure diagram that describes the structure
of a system by showing the system's classes, their attributes, operations (or
methods), and the relationships among the classes. It explains which class
contains information.
The purpose of class diagram is to model the static view of an application.
Class diagrams are the only diagrams which can be directly mapped with object-
oriented languages and thus widely used at the time of construction.
The class diagram is used to represent a static view of the system. It plays
an essential role in the establishment of the component and deployment diagrams.
It helps to construct an executable code to perform forward and backward
engineering for any system. It represents the mapping with object-oriented
languages that are C++, Java, etc.
The class diagram shows the relationship between the sender login and the
user login contains file details, receiver details, key details with sender and
request keys, decrypt keys, self acknowledge with user login as given in the
Figure 7.4.1.
18
2.2.4 SEQUENCE DIAGRAM
A sequence diagram in Unified Modelling Language (UML) is a kind of
interaction diagram that shows how processes operate with one another and in
what order. It is a construct of a Message Sequence Chart. Sequence diagrams are
sometimes called event diagrams, event scenarios, and timing diagrams.
Professionals, in developing a project, often use system sequence diagrams
to illustrate how certain tasks are done between users and the system. These tasks
may include repetitive, simple, or complex tasks. The purpose is to illustrate the
use case in a visual format. In order to construct a system sequence diagram, you
need to be familiar with the Unified Modeling Language (UML). It incorporates
the iteration as well sender, database, receiver in the email server system as given
in Figure.7.5.1.
6.Receiver selection()
7.Decode the data()
8.Self-Acknowledgement()
19
environments, and the middleware connecting them. Deployment diagrams are
typically used to visualize the physical hardware and software of a system. Using
it you can understand how the system will be physically deployed on the
hardware. Deployment diagrams help model the hardware topology of a system
compared to other UML diagram types which mostly outline the logical
components of a system. It incorporates server page, receiver page, sender page
as shown in Figure.7.6.1.
Server Page
20
although they could in theory be applied to business process modeling.
Entity names should be comprehensible without further comments. DFD
is a system created by analysts based on interviews with system users. It is
determined for system developers, on one hand, project contractor on the other,
so the entity names should be adapted for model domain or amateur users or
professionals.
The DFD is also called as bubble chart. It is a simple graphical formalism
that can be used to represent a system in terms of input data to the system, various
processing carried out on this data, and the output data is generated by this system.
Two-dimensional diagram explains how data is processed and transferred in a
system. The graphical depiction identifies each source of data and how it interacts
with other data sources to reach a common output. Individuals seeking to draft a
data flow diagram must identify external inputs and outputs, determine how the
inputs and outputs relate to each other, and explain with graphics how these
connections relate and what they result in. This type of diagram helps business
development and design teams visualize how data is processed and identify or
improve certain aspects The following observations about DFDs are essential.
1. All names should be unique. This makes it easier to refer to elements in the
DFD.
2. Remember that DFD is not a flow chart. Arrows is a flow chart that
represents the order of events; arrows in DFD represents flowing data. A
DFD does not involve any order of events.
It consist of three levels in email server of admin, sender, receiver, inbox, outbox,
compose as shown in Figure 7.7.1.
21
LEVEL 0
Compose
LEVEL 1
22
LEVEL 2
Location or
group selection
Send mail
LEVEL 3
Receiver Self-
acknowledgement Server database
Key request
23
2.3 SYSTEM TESTING AND IMPLEMENTATION
2.3.1 SYSTEM TESTING
Software testing is a method of assessing the functionality of a software
program. There are many different types of software testing but the two main
categories are dynamic testing and static testing. Dynamic testing is an
assessment that is conducted while the program is executed; static testing, on the
other hand, is an examination of the program's code and associated
documentation. Dynamic and static methods are often used together.Testing is a
set activity that can be planned and conducted systematically. Testing begins at
the module level and work towards the integration of entire computers based
system. Nothing is complete without testing, as it is vital success of the system.
Testing Objectives:
There are several rules that can serve as testing objectives, they are
1. Testing is a process of executing a program with the intent of
finding an error.
2. A good test case is one that has high probability of finding an
undiscovered error.
3. A successful test is one that uncovers an undiscovered error.
Tests for correctness are supposed to verify that a program does exactly
what it was designed to do. This is much more difficult than it may at first appear,
especially for large programs. Tests used for implementation efficiency attempt
to find ways to make a correct program faster or use less storage. It is a code-
refining process, which reexamines the implementation phase of algorithm
development. Tests for computational complexity amount to an experimental
analysis of the complexity of an algorithm or an experimental comparison of
two or more algorithms, which solve the same problem.
24
There are three ways to test a program
1. For Correctness
2. For Implementation efficiency
3. For Computational Complexity
Tests for correctness are supposed to verify that a program does exactly what it
was designed to do. This is much more difficult than it may at first appear,
especially for large programs.
The data is entered in all forms separately and whenever an error occurred, it is
corrected immediately. A quality team deputed by the management verified all
the necessary documents and tested the Software while entering the data at all
levels. The development process involves various types of testing. Each test
type addresses a specific testing requirement. The most common types of testing
involved in the development process are:
• Unit Test
• Functional Test
• Integration Test
Unit Testing
The first test in the development process is the unit test. The source code
is normally divided into modules, which in turn are divided into smaller units
called units. These units have specific behavior. The test done on these units of
code is called unit test. Unit test depends upon the language on which the project
is developed. Unit tests ensure that each unique path of the project performs
accurately to the documented specifications and contains clearly defined inputs
and expected results.
Functional Testing
Functional test can be defined as testing two or more modules together
with the intent of finding defects, demonstrating that defects are not present,
verifying that the module performs its intended functions as stated in the
specification and establishing confidence that a program does what it is supposed
to do.
25
Integration Testing
In integration testing modules are combined and tested as a group. Modules
are typically code modules, individual applications, source and destination
applications on a network, etc. Integration Testing follows unit testing and
precedes system testing. Testing after the product is code complete. Betas are
often widely distributed or even distributed to the public at large in hopes that
they will buy the final product when it is released.
26
the conversation or large number of messages sent. Messages do not block e-mail
and file management is easier and centralized. Conversations and files can be
stored as long as required. In this module can upload the data in various form.
The proliferation of digital media over the internet has been raised in last few
years. The enhancing usage of digitization has given a great lead to copyright
issues. To tackle with copyright issues, digital watermarking comes out as
suitable solution. Digital watermarking is process of inserting watermark
information into host data. In this module can implement discrete wavelet
transform algorithm to watermark the content. Discrete Wavelet Transform is a
transform that is used in numerical as well as functional analysis. In this
transform, the wavelets are sampled with the discrete values. The main advantage
of this transform over Fourier Transform is that it captures both frequency and
location information. In Discrete Wavelet Transform, signal energy concentrates
to specific wavelet coefficients. After watermark the content, implement AES
algorithm encrypt the data. AES encryption, or advanced encryption standard,
is a type of cipher that protects the transfer of data. Advanced Encryption
Standard (AES) algorithm is measured as a secured procedure. Still, some
security questions lie in the S-Box and the key used. AES (Advanced Encryption
Standard) algorithm is founded on substitution and permutation principles. It
takes the input text chunk of size 128 bit and a variable key size of 128, 192 or
256 bits for 10, 12 or 14 rounds respectively. Each round contains of numerous
processing steps, including the encryption step itself. Similarly, set of reverse
sequences are achieved to transform cipher text back into plaintext.
2.4.4 MODULE 3: GROUP SELECTION
In this module it can select the groups to send the mail by using machine
learning algorithm and Geo fencing. In a decision tree, for predicting the class of
the given dataset, the algorithm starts from the root node of the tree. This
algorithm compares the values of root attribute with the record (real dataset)
attribute and, based on the comparison, follows the branch and jumps to the next
27
node. For the next node, the algorithm again compares the attribute value with
the other sub-nodes and move further. It continues the process until it reaches the
leaf node of the tree. It is a user-created virtual boundary which can trigger and
select the users from appropriate the groups.
28
2.5 SAMPLE CODING
SOURCE CODE
<%@ Page Language="C#" AutoEventWireup="true"
CodeFile="Home.aspx.cs" Inherits="Home" %>
<html xmlns="http://www.w3.org/1999/xhtml">
<head runat="server">
<!-- Required meta tags -->
<meta charset="utf-8">
<meta name="viewport" content="width=device-width, initial-scale=1,
shrink-to-fit=no">
<title>Email Server</title>
<!-- google-fonts -->
<link
href="//fonts.googleapis.com/css2?family=Montserrat:wght@100;200;300;400;
500;600;700;800;900&display=swap"
rel="stylesheet">
<!-- //google-fonts -->
<!-- Template CSS Style link -->
<link rel="stylesheet" href="css/style-starter.css">
</head>
<body>
<!--header-->
<header id="site-header" class="fixed-top">
<div class="container">
<nav class="navbar navbar-expand-lg stroke">
<h1>
<a class="navbar-brand" href="index.html"><i class="fa fa-
headphones mr-1"
aria-hidden="true"></i>Email Server</a>
</h1>
29
<span class="navbar-toggler-icon fa icon-close fa-times"></span>
</button>
30
<div>
</div>
</form>
</div>
<!-- footer -->
</div>
</div>
</div>
</div>
</section>
<!-- //copyright -->
31
// When the user scrolls down 20px from the top of the document, show the
button
window.onscroll = function () {
scrollFunction()
};
function scrollFunction() {
if (document.body.scrollTop > 20 ||
document.documentElement.scrollTop > 20) {
document.getElementById("movetop").style.display = "block";
} else {
document.getElementById("movetop").style.display = "none";
}
}
// When the user clicks on the button, scroll to the top of the document
function topFunction() {
document.body.scrollTop = 0;
document.documentElement.scrollTop = 0;
}
</script>
<!-- //move top -->
32
thhis.prev().removeAttr("style");
thhis.text("");
for (var i = 0; i < amntOfChars; i++) {
(function (i, char) {
setTimeout(function () {
newString += char;
thhis.text(newString);
}, i * typingSpeed);
})(i + 1, text[i]);
}
}, 1500);
}
$(document).ready(function () {
// Now to start autoTyping just call the autoType function with the
// class of outer div
// The second paramter is the speed between each letter is typed.
autoType(".type-js", 200);
});
</script>
<!-- //theme switch js (light and dark)-->
fixedContentPos: false,
fixedBgPos: true,
overflowY: 'auto',
closeBtnInside: true,
preloader: false,
midClick: true,
removalDelay: 300,
mainClass: 'my-mfp-zoom-in'
});
$('.popup-with-move-anim').magnificPopup({
type: 'inline',
33
fixedContentPos: false,
fixedBgPos: true,
overflowY: 'auto',
closeBtnInside: true,
preloader: false,
midClick: true,
removalDelay: 300,
mainClass: 'my-mfp-slide-bottom'
});
});
</script>
<!-- //magnific popup -->
34
<!-- //MENU-JS -->
<!--bootstrap-->
<script src="js/bootstrap.min.js"></script>
<!-- //bootstrap-->
<!-- //Js scripts -->
</body>
</html>
35
2.6 SCREENSHOTS
36
Fig 2.6.3 Sign In Page
37
Fig 2.6.5 Compose Page
38
Fig 2.6.7 Outbox Page
39
Fig 2.6.9 Key Approval Sent
40
Fig 2.6.11 Download Message
41
Fig 2.6.13 Admin Page
42
CHAPTER - 3
CONCLUSION AND
FUTURE WORK
CHAPTER-3
CONCLUSION AND FUTURE WORK
3.1 CONCLUSION
Propose a combined cryptography and watermarking techniques for secure
transmission of information through E- Mail server. Discrete Wavelet technique
is used for watermarking and AES cryptography is used for encryption purposes.
The proposed technique is not only designed to provide copyright protection;
however, it is proposed to provide integrity and authentication services for the
media data based on Geofense framework. It includes the Machine learning
algorithm to choose group data sharing based on location of group. Therefore, its
target is not to be robust against modification attacks, but its target is to detect
any illegal activities on the watermarked information. The ability of this
technique is identified to check if the integrity and authentication of the shared
information are corrupted at the receiver end. At the receiver side the proposed
technique detected this modification and sent a message to the content provider
regarding illegal distribution. And also provide mail delivery system to know
about status of mail at recipient side.
43
3.3 REFERENCES
[1] Abdelsatir, Eltigani B., and Mohammad H. Alrashdan. "On the
Implementation of a Secure Email System with ID-based
Encryption." 2019 International Conference on Advances in the Emerging
Computing Technologies (AECT). IEEE, 2020.
[2] Abbas, A. H., et al. "GPS based location monitoring system with geo-
fencing capabilities." AIP Conference Proceedings. Vol. 2173. No. 1. AIP
Publishing LLC, 2019.
[3] Al-Asady, Heba Abdul-Jaleel, Osama Qasim Jumah Al-Thahab, and Saad
S. Hreshee. "Robust encryption system based watermarking theory by
using chaotic algorithms: A reviewer paper." Journal of Physics:
Conference Series. Vol. 1818. No. 1. IOP Publishing, 2021.
[4] Bagdasaryan, Eugene, et al. "Ancile: Enhancing privacy for ubiquitous
computing with use-based privacy." Proceedings of the 18th ACM
Workshop on Privacy in the Electronic Society. 2019.
[5] Barapatre, Minal, and C. N. Deshmukh. "Design & Development of
Network Geo-Fencing Model for User Monitoring and it’s Alertness in a
Security Applications.
[6] Gautam, Aakanksha, and Vipin Vats. "Digital Data Security using Audio
Watermarking & Cryptography Concepts.“ 2019.
[7] Huo, Bo, Yihong Long, and Jinglin Wu. "A Secure Web Email System
Based on IBC." 2017 13th International Conference on Computational
Intelligence and Security (CIS). IEEE, 2017.
[8] Indrayani, Rini, Pramudita Ferdiansyah, and Dhimas Adi Satria.
"Effectiveness comparison of the AES and 3DES cryptography methods
on email text messages." 2019 International Conference on Information
and Communications Technology (ICOIACT). IEEE, 2019.
44