0% found this document useful (0 votes)
50 views18 pages

CS Major Minor FORMAT

This document appears to be a project report submitted by multiple students towards a Bachelor of Technology degree. It includes standard elements of a project report such as a title page, declaration by students, recommendation and certification by faculty, an abstract, table of contents, and introduction and literature review sections. The students developed a project on securing information using color-based substitution cipher and Unicode encoding. Their proposed Play Color Cipher algorithm uses a key to map text to color codes for encryption.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views18 pages

CS Major Minor FORMAT

This document appears to be a project report submitted by multiple students towards a Bachelor of Technology degree. It includes standard elements of a project report such as a title page, declaration by students, recommendation and certification by faculty, an abstract, table of contents, and introduction and literature review sections. The students developed a project on securing information using color-based substitution cipher and Unicode encoding. Their proposed Play Color Cipher algorithm uses a key to map text to color codes for encryption.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 18

Project Title

A Minor Project Report Submitted to

Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal


Towards partial fulfillment for the award of
Bachelor of Technology
Computer Science & Engineering

Submitted by
1. StudentName (Enroll. No.)
2. StudentName (Enroll. No.)
3. StudentName (Enroll. No.)
4. StudentName (Enroll. No.)

Under the supervision of


Guide Name
Assistant Professor

Department of Computer Science & Engineering


Indore Institute of Science and Technology, Indore
Session 2023-2024
Indore Institute of Science and Technology, Indore (M.P.)

Department of Computer Science & Engineering

DECLARATION

I, Students Name (Enrollment No.), student of Bachelor of Technology in Computer Science


& Engineering discipline, Indore Institute of Science and Technology, Indore (M.P.), hereby
declare that the work presented in this project entitled “Project Title” is the outcome of my own
work, is bonafide and correct to the best of my knowledge and this work has been carried out
taking care of Engineering Ethics. The work presented here does not infringe any patented work
and has not been submitted to any other university or anywhere else for the award of any degree
or any professional diploma.

1. Student Name (Enroll. No.) *Name Should be in Enrollment wise

2. Student Name (Enroll. No.)

3. Student Name (Enroll. No.)

4. Student Name (Enroll. No.)

Date
Indore Institute of Science and Technology, Indore (M.P.)

Department of Computer Science & Engineering

RECOMMENDATION

This is to certify that the work embodied in this project work entitled “Project Title”, being
submitted by Student Name (Enrollment No.) in partial fulfillment of the requirement for the
award of Bachelor of Technology in Computer Science & Engineering discipline, to Rajiv
Gandhi Proudyogiki Vishwavidyalaya, Bhopal (M.P.) during the academic year 2022-23 is a
record of bonafide piece of work, carried out by his/her under my supervision and guidance.

Guide Name HOD CSE


(Assistant Professor)
Project Guide

Forwarded by:

Dr. Keshav Patidar


Principal, IIST, Indore
Indore Institute of Science and Technology, Indore (M.P.)

Department of Computer Science & Engineering

CERTIFICATE

The Project entitled “Project Title” being submitted by Students Name (Enrollment No.) has
been examined by us and is hereby approved for the award of degree Bachelor of Technology in
Computer Science & Engineering discipline, for which it has been submitted. It is understood
that by this approval the undersigned do not necessarily endorse or approve any statement made,
opinion expressed or conclusion drawn therein, but approve the dissertation only for the purpose
for which it has been submitted.

(Internal Examiner) (External Examiner)


Date: Date:
ACKNOWLEDGEMENT

After the completion of this project, words are not enough to express my feelings about all
those who helped me to reach my goal; feeling above this is my indebtedness to the Almighty
for providing me this moment in life.
In this project we have received constant support from Dean Academics & Head of Department
Dr. Richa Gupta . Also, I am heartily indebted to the constant support and guidance of Mr./Ms.
Name of Guide. Without his/her guidance and scholarly suggestion an urge to bring out the best
would not have been possible. I hope to propagate his scientific, industrial, and professional
fervors to the best of my abilities. His/her clear view and knowledge provided help during every
phase of Project Development. His perpetual motivation, patience, and excellent expertise in
discussion during progress of the project work have benefited us to an extent, which is beyond
expression. His/her in-depth and breadth of knowledge of Computer Engineering field made me
realize that theoretical knowledge always helps to develop efficient operational software, which
is a blend of all core subjects of the field. He/she was major support to me throughout my
project, being available with his/her odd ideas, inspiration, and encouragement. It is a through his
masterful guidance that I have been able to complete my Project.

I am also thankful to all the teaching and non-teaching staff from Department of Computer
Science and Engineering and friends and people who helped me directly or indirectly for the
completion of this project, with success.

The successful completion of a project is generally not an individual effort. It is an outcome of


the cumulative effort of many people, each having their own importance to the objective. This
section is a vote of thanks and gratitude towards all those persons who have directly or indirectly
contributed in their own special way towards the completion of this project.

Date:
1. Student Name (Enroll. No.)
2. Student Name (Enroll. No.)
3. Student Name (Enroll. No.)
4. Student Name (Enroll. No.)
ABSTRACT (In single page-Demo is given)

In this era of computer the most important thing is to make safe our information from
malicious users. Cryptography is a science which secure information by different type of
principle like encryption algorithm, authentication and authorization technique. Encryption
techniques are widely used for information hiding. It has also different techniques of encryption
and substitution technique is one of them.
Substitution technique has its long history. Caesar cipher, hill cipher, mono alphabetic
cipher, poly alphabetic cipher, play fair cipher etc. are type of substitution cipher. Substitution
cipher was limited only with text that’s why it was easy to make its combination and break. Now
we are working on substitution with color. Color has its long range nearly 18 decillion color. So
if we use this technique of substitution then it works better than text substitution.
In the whole world different types of language are used and if we want to make any
algorithm for all language then we need to use Unicode because it cover approximate all text.
Our algorithm Play Color Cipher is based on Play Fair Cipher. In Play Color Cipher we are
encoding special symbol, number and text. We first decide a key by which we select color for
substitution and then we put at that place the color. In this algorithm we follow approach of
matrix creation of text and color but its value vary according to key. It is hard to break it,
because if malicious user tries combination of keys then it gives a long range of different shade
of color which is really far from original text. Wrong key will produce wrong text.
This algorithm is secured form brute force attack, birthday attack and meet in the middle
attack. It also gives security for avalanche effect. In this we change the position of the particular
character that’s why it is tough to find out combination. It is new way of substitution and it takes
less memory also. It is better than all previous substitution algorithms. It uses RSA algorithm for
transfer of key which is more secured algorithm then other algorithm. We have done our work on
Unicode for securing information. We can use any language in this formula which can secure our
information easily and it gives output in block of color. It is not readable and understandable that
what is behind this block of color. It is new approaches of substitution cipher. It is more secure
than other substitution cipher technique because of long range of color is preset in the world.
TABLE OF CONTENTS

TITLE PAGE NO.

Recommendation I

Certificate II

Project Approval Sheet III

Declaration IV

Acknowledgement V

Abstract VI

Table of Contents VII

List of Figures IX

List of Tables X

List of Graphs XI

List of Acronyms XII

1. INTRODUCTION 1

1.1 Introduction 1

1.1.1 XYZ (If any) 1

1.1.2 XYZ (If any) 4

1.1.3 XYZ (If any) 5

1.1.4 XYZ (If any) 7

1.2 Motivation 16
1.3 Organization of Project Work 18

1.4 Summary 19

2. LITERATURE SURVEY 22

2.1 Background and Related Work

2.2 Survey Extraction

2.3 Problem Statement

2.4 Objective of Research Work

2.5 Solution Approach

2.6 Chapter Summary

3. PROPOSED METHODOLOGY

3.1 Proposed Method

3.2 Proposed Methodology Flow Chart

3.3 Summary 28

4. SYSTEM REQUIREMENT SPECIFICATIONS 28

4.1 Identification of Specifications 29

4.2 Hardware Requirements 29

4.3 Software Requirements 32

4.4 Tools/API/Any other specification (If any) 32

5. SYSTEM ANALYSIS, DESIGN AND IMPLEMENTATION 36

5.1 System Analysis 43

5.1.1 Identification of System Requirements 44


5.1.2 Functional Requirements 46

5.1.3 Non-Functional Requirements 46

5.1.4 Feasibility Analysis and Summary 47

5.2 System Design 48

5.2.1 Architecture/Component Diagram 48

5.2.2 Data Flow Diagrams (DFD) 49

5.2.2.1 Level 0 DFD 50

5.2.2.2 Level 1 DFD 51-52

5.2.3 UML Diagrams 53-54

5.2.3.1 Use-Case Diagram 55

5.2.3.2 Sequence Diagram 56

5.2.3.3 Activity diagram 57

5.2.3.4 Class Diagram 57

5.2.3.5 Deployment Diagram 58

6. RESULTS 59

6.1 Experimental Setup 60

6.2 Data Set (If any) 61

6.3 Results (Charts/Graphs/Tables) 62

6.4 Chapter Summary 62

7. CONCLUSION AND FUTURE WORK 63

7.1 Conclusion 64

7.2 Limitation 65
7.3 Future Work 66

REFERENCES 66

APPENDIX 67

67

PUBLICATIONS (If any)


LIST OF FIGURES

FIGURE NO.
PAGE NO.

1.1 Inheritance relationship 12

3.1 Methodology Flow Chart 30

4.1 Screen Snapshot for Choice of the Measurement 32

4.2 Screen Snapshot for Cohesion Measurement 32

4.3 Screen Snapshot for Uploading the Source Code 33

4.4 Screen Snapshot for Upload Input C# Inheritance Source Code 33

4.5 Screen Snapshot for Upload Input C# Interface Source Code 34

4.6 Screen Snapshot for Applying Scanning on Both Source Code 34

4.7 Screen Snapshot for Calculation 35

4.8 Screen Snapshot of Calculate Total No of TCC LCC Value 36

4.9 Screen Snapshot for Choice of the Measurement 36

4.10 Screen Snapshot for Input C# Inheritance Source Code 37

4.11 Screen Snapshot for First Input Source Code Load 37

4.12 Screen Snapshot for Display of Calculate Total No of Classes 38

4.13 Screen Snapshot for Display List of All Class Names 38

4.14 Screen Snapshot for Display Total No of Inherited Classes 39

4.15 Screen Snapshot for Apply All Metrics And Weighted Output 39
4.16 Screen Snapshot for Display of Weighted Metrics Values 40

4.17 Screen Snapshot for Load Second Input Source Code 40

4.18 Screen Snapshot for Display Total Classes, List of Class, Interface Name 41

4.19 Screen Snapshot for Apply All Metrics And Calculate Metrics Values 41

4.20 Screen Snapshot for Display Calculate Total Sum of Metrics Values 42

4.21 Screen Snapshot for Display Comparison of Total Metrics Weighted Values 43

LIST OF TABLES
TABLE NO.
PAGE NO.

Table 5.1 Calculated TCC and LCC Values for Both the Inputted Source Code 48
for Cohesion Measurement

Table 5.2 Calculated Total Metrics Weighted Values on Both Inputted Source 49
Code for Coupling Measurement
LIST OF GRAPH

GRAPH NO.

PAGE NO.

Graph 5.1 The comparison between inheritance and interface based on 49


calculated data of TCC and LCC

Graph 5.2 The comparison between inheritance and interface based on 50


calculated data of Coupling metrics
LIST OF ACRONYMS

OOP Object Oriented Programming

TCC Tight Class Cohesion

LCC Loose Class Cohesion

CK Chidamber and Kemerer

CBO Coupling Between Object

NOC Number of Children’s

DIT Depth of Inheritance Tree

NOASSocC Number of Association per Class

NDepIN Number of Dependencies In Metric

NDepOUT Number of Dependencies Out Metric

NP(C) Number of Total Pair of Method in a Class


NDC Number of Direct Method in a Class

NIC Number of Indirect Method in a Class


Dear Students,

Please find the attachment for the guidelines and format of the Minor Project Report.

No. of Copies required N (For ex. If there is a group of 4 members, then 4 copies will have
to be submitted.)

Color of Report(Only Spiral binding is required.)

Note: -
Margins given must be the same as the given format

Authority Names could be changed

Places with underlines should be replaced with main content like name, roll number title, branch, etc.

Font size should be proper(12)

Headings(12 Bold)

Indentation should be proper

The numeric Page number should be started from the Chapter 1 before those Roman numbers are used

The number of chapter & their names can be varied as per the instruction of the guide

Referencing must be of the form

[1] Author Name 1, Author Name 2 & Author Name 3, “Paper Or Article or Book or Content full
title here” in Conference Name (Or Journal name or proceedings name or Book Name), ISSN
Num:____-____, Vol No,_, Issue No._, pp;__,__, Month Year.

Other changes should be suggested as per your guide

Note:-The format is made by only analyzing various reports & is not an authorized one by the
institution. Changes can be made as suggested after consulting with the guide, department heads &
institution heads.

This file is only generated for the help of students & had nothing related or instructed by any dignitary
of the institution.

Suggestions are always welcomed for further improvements.

The given format includes a few names which belong to CS/IT departments which can be changed as
per the instruction of the In-charge & institution heads & guide.

You might also like