CS Major Minor FORMAT
CS Major Minor FORMAT
Submitted by
1. StudentName (Enroll. No.)
2. StudentName (Enroll. No.)
3. StudentName (Enroll. No.)
4. StudentName (Enroll. No.)
DECLARATION
Date
Indore Institute of Science and Technology, Indore (M.P.)
RECOMMENDATION
This is to certify that the work embodied in this project work entitled “Project Title”, being
submitted by Student Name (Enrollment No.) in partial fulfillment of the requirement for the
award of Bachelor of Technology in Computer Science & Engineering discipline, to Rajiv
Gandhi Proudyogiki Vishwavidyalaya, Bhopal (M.P.) during the academic year 2022-23 is a
record of bonafide piece of work, carried out by his/her under my supervision and guidance.
Forwarded by:
CERTIFICATE
The Project entitled “Project Title” being submitted by Students Name (Enrollment No.) has
been examined by us and is hereby approved for the award of degree Bachelor of Technology in
Computer Science & Engineering discipline, for which it has been submitted. It is understood
that by this approval the undersigned do not necessarily endorse or approve any statement made,
opinion expressed or conclusion drawn therein, but approve the dissertation only for the purpose
for which it has been submitted.
After the completion of this project, words are not enough to express my feelings about all
those who helped me to reach my goal; feeling above this is my indebtedness to the Almighty
for providing me this moment in life.
In this project we have received constant support from Dean Academics & Head of Department
Dr. Richa Gupta . Also, I am heartily indebted to the constant support and guidance of Mr./Ms.
Name of Guide. Without his/her guidance and scholarly suggestion an urge to bring out the best
would not have been possible. I hope to propagate his scientific, industrial, and professional
fervors to the best of my abilities. His/her clear view and knowledge provided help during every
phase of Project Development. His perpetual motivation, patience, and excellent expertise in
discussion during progress of the project work have benefited us to an extent, which is beyond
expression. His/her in-depth and breadth of knowledge of Computer Engineering field made me
realize that theoretical knowledge always helps to develop efficient operational software, which
is a blend of all core subjects of the field. He/she was major support to me throughout my
project, being available with his/her odd ideas, inspiration, and encouragement. It is a through his
masterful guidance that I have been able to complete my Project.
I am also thankful to all the teaching and non-teaching staff from Department of Computer
Science and Engineering and friends and people who helped me directly or indirectly for the
completion of this project, with success.
Date:
1. Student Name (Enroll. No.)
2. Student Name (Enroll. No.)
3. Student Name (Enroll. No.)
4. Student Name (Enroll. No.)
ABSTRACT (In single page-Demo is given)
In this era of computer the most important thing is to make safe our information from
malicious users. Cryptography is a science which secure information by different type of
principle like encryption algorithm, authentication and authorization technique. Encryption
techniques are widely used for information hiding. It has also different techniques of encryption
and substitution technique is one of them.
Substitution technique has its long history. Caesar cipher, hill cipher, mono alphabetic
cipher, poly alphabetic cipher, play fair cipher etc. are type of substitution cipher. Substitution
cipher was limited only with text that’s why it was easy to make its combination and break. Now
we are working on substitution with color. Color has its long range nearly 18 decillion color. So
if we use this technique of substitution then it works better than text substitution.
In the whole world different types of language are used and if we want to make any
algorithm for all language then we need to use Unicode because it cover approximate all text.
Our algorithm Play Color Cipher is based on Play Fair Cipher. In Play Color Cipher we are
encoding special symbol, number and text. We first decide a key by which we select color for
substitution and then we put at that place the color. In this algorithm we follow approach of
matrix creation of text and color but its value vary according to key. It is hard to break it,
because if malicious user tries combination of keys then it gives a long range of different shade
of color which is really far from original text. Wrong key will produce wrong text.
This algorithm is secured form brute force attack, birthday attack and meet in the middle
attack. It also gives security for avalanche effect. In this we change the position of the particular
character that’s why it is tough to find out combination. It is new way of substitution and it takes
less memory also. It is better than all previous substitution algorithms. It uses RSA algorithm for
transfer of key which is more secured algorithm then other algorithm. We have done our work on
Unicode for securing information. We can use any language in this formula which can secure our
information easily and it gives output in block of color. It is not readable and understandable that
what is behind this block of color. It is new approaches of substitution cipher. It is more secure
than other substitution cipher technique because of long range of color is preset in the world.
TABLE OF CONTENTS
Recommendation I
Certificate II
Declaration IV
Acknowledgement V
Abstract VI
List of Figures IX
List of Tables X
List of Graphs XI
1. INTRODUCTION 1
1.1 Introduction 1
1.2 Motivation 16
1.3 Organization of Project Work 18
1.4 Summary 19
2. LITERATURE SURVEY 22
3. PROPOSED METHODOLOGY
3.3 Summary 28
6. RESULTS 59
7.1 Conclusion 64
7.2 Limitation 65
7.3 Future Work 66
REFERENCES 66
APPENDIX 67
67
FIGURE NO.
PAGE NO.
4.15 Screen Snapshot for Apply All Metrics And Weighted Output 39
4.16 Screen Snapshot for Display of Weighted Metrics Values 40
4.18 Screen Snapshot for Display Total Classes, List of Class, Interface Name 41
4.19 Screen Snapshot for Apply All Metrics And Calculate Metrics Values 41
4.20 Screen Snapshot for Display Calculate Total Sum of Metrics Values 42
4.21 Screen Snapshot for Display Comparison of Total Metrics Weighted Values 43
LIST OF TABLES
TABLE NO.
PAGE NO.
Table 5.1 Calculated TCC and LCC Values for Both the Inputted Source Code 48
for Cohesion Measurement
Table 5.2 Calculated Total Metrics Weighted Values on Both Inputted Source 49
Code for Coupling Measurement
LIST OF GRAPH
GRAPH NO.
PAGE NO.
Please find the attachment for the guidelines and format of the Minor Project Report.
No. of Copies required N (For ex. If there is a group of 4 members, then 4 copies will have
to be submitted.)
Note: -
Margins given must be the same as the given format
Places with underlines should be replaced with main content like name, roll number title, branch, etc.
Headings(12 Bold)
The numeric Page number should be started from the Chapter 1 before those Roman numbers are used
The number of chapter & their names can be varied as per the instruction of the guide
[1] Author Name 1, Author Name 2 & Author Name 3, “Paper Or Article or Book or Content full
title here” in Conference Name (Or Journal name or proceedings name or Book Name), ISSN
Num:____-____, Vol No,_, Issue No._, pp;__,__, Month Year.
Note:-The format is made by only analyzing various reports & is not an authorized one by the
institution. Changes can be made as suggested after consulting with the guide, department heads &
institution heads.
This file is only generated for the help of students & had nothing related or instructed by any dignitary
of the institution.
The given format includes a few names which belong to CS/IT departments which can be changed as
per the instruction of the In-charge & institution heads & guide.