0% found this document useful (0 votes)
42 views67 pages

Jobin

User for projects

Uploaded by

Rohit VR
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views67 pages

Jobin

User for projects

Uploaded by

Rohit VR
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 67

SMART DRIVE

1. ABSTRACT

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


1
SMART DRIVE

1.1 ABSTRACT

The word steganography means” covered in hidden writing”. The object of


steganography is to send a message through some innocuous carrier (to a receiver while
preventing anyone else from knowing that a message is being sent to all. Computer based
steganography allows changes to be made to what are known as digital carriers such as images
or sounds.

The changes represent the hidden message, but result if successful in no discernible
change to the carrier. The information may be nothing to do with the carrier sound or image or it
might be information about the carrier such as the author or a digital watermarking or finger
print. In steganography information can be hidden in carriers such as images, audio files, text
files, and video and data transmissions. When message is hidden in the carrier a stego carrier is
formed for example a stego-image. Hopefully it will be perceived to be as close as possible to
the original carrier or cover image by the human senses.

Images are the most widespread carrier medium. The are used for steganography in the
following way. The message may firstly be encrypted. They are used for steganography in the
following way. The message may firstly be encrypted. The sender embeds the secret message to
be sent into a graphic file. This results in the production of what is called stego-image. Additional
secret data may be needed in the hiding process e.g. a stegokey etc. This stego-image is then
transmitted to the recipient. The recipient extractor extracts the message from the carrier image.
The message can only be extracted if there is a shared secret between the sender and the recipient.
This could be the algorithm for extraction or a special parameter such as stegokey. A stegoanalyst
or attacker may try to intercept the stego-image.

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


2
SMART DRIVE

2. INTROCUCTION

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


3
SMART DRIVE

2.1 AIM AND OBJECTIVE OF PROJECT


➢ Legitimate purposes can include things like watermarking images for reasons such
as copyright protection. Digital watermarks (also known as fingerprinting,
significant especially in copyrighting material) are similar to steganography in that
they are overlaid in files, which appear to be part of the original file and are thus not
easily detectable by the average person
➢ Steganography can be used to maintain the confidentiality of valuable information,
to protect the data from possible sabotage, theft, or unauthorized viewing.
➢ Steganography can also be used as a way to make a substitute for a one-way hash
value (where you take a variable length input and create a static length output string
to verify that no changes have been made to the original variable length input).
➢ Desing and implement a distributed approach to steganography.
➢ If someone was trying to steal data, they could conceal it in another file or files and
send it out in an innocent looking email or file transfer.
➢ If someone was trying to steal data, they could conceal it in another file or files and
send it out in an innocent looking email or file transfer.
➢ To product security tool based on steganography.
➢ To explore techniques of hiding data using encryption module of this project.
➢ To extract techniques of getting secret data using decryption modules.
Steganography can also be used for illegitimate reasons.

2.2 SCOPE OF THE PROJECT


This project is developed for hiding information in image file. This approach of
information hiding technique has recently become important in a number of application areas.
The scope of the project is to limit unauthorized access and provide better security during
message transmission. The goal of the project is to bulid and analyze a distributed steganography
system. The idea of using steganography in data transportation can be applied to just about any
data transportation method, from E-Mail to images on Internet websites. other hand, hide the
message so there is no knowledge of the existence of the message.

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


4
SMART DRIVE

3. SYSTEM STUDY

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


5
SMART DRIVE

3.1 SYSTEM STUDY


System study involves study for the current system in detail and to find out how it works
and where the improvements have to be made. It also involves the detailed study of the various
operations performed by the system and their relationship within and the outside the system the
analyst and the user work in close associations during the complete analysis phase. This is a
phase that determines what is to be done for software development.

3.2 EXISTING SYSTEM


The existing systems that are currently being used will provide only some services that
are useful to its users. There are many services available right now but most of them will only
provide some features in them but not all of them are providing all the requirements that a user
need in one site. So, the users have to login in to multiple sites for fulfilling their different needs.
This is time consuming and more difficult to the users. Most users prefer to get all basic
requirements done at a single place without having to login to multiple sites. This is also hard to
keep track and maintain from the user’s end. The application is platform independent also support
any one either command mode or graphical mode.

3.3 DRAWBACKS OF THE EXISTING SYSTEM


➢ A limited amount of data can be a big problem. It can put a limit on image

Classifications and segmentation.

➢ It need a lot of overhead to hide associatively few of information


➢ Susceptibility to Data Loss: The hidden message may be lost or distorted
during the transmission or processing of the image, resulting in a loss of
data.

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


6
SMART DRIVE

3.4 PROPOSED SYSTEM


The proposed system showed high hiding rate with reasonable imperceptiblity
Compared to other steganographic system.To solve the above mentioned problem our
application uses steganography which is both secured and reliable.By using our system the
user is no longer needed to use the desktop for performing transaction.after the user get
logged in,he will have an easily understandable interface where he can have two options to
use i.e..,account details and money transfer.The transaction is sent to receiver in the form of
steganoimage ,by which he can withdraw the amount.

3.5 ADVANTAGES OF PROPOSED SYSTEM

➢ Unlike other methods, steganography has the added benefit of hiding


communications so well that they receive no attention. However, in countries
where encryption is illegal, sending an encrypted message that you can easily
decipher will raise suspicion and may be risky.

➢ Steganography is a form of encryption that protects the information within a


message and the connections between sender and receiver.

➢ The three essential elements of steganography security, capacity, and


robustness make it worthwhile to covert information transfer via text files and
develop covert communication channels.

➢ You can store an encrypted copy of a file containing sensitive information on


the server without fear of unauthorized parties gaining access to the data.

➢ Government and law enforcement agencies can communicate secretly with the
help of steganography corporations.

➢ It is used in the way of hiding not the information but the password to reach
that information

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


7
SMART DRIVE

4. SYSTEM ANALYSIS

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


8
SMART DRIVE

4.1 INTROUDCTION TO SYSTEM ANALYSIS


System analysis works with users to identify goals and build systems to achieve them.
System analysis is an important phase of any system development process. The system is studied
to the minute details and analyzed. Analysis is a detailed study of various operations performed
by a system and their relationships within and outside the system. During analysis data are
collected on the available files, decision points and transaction handles by the print System,
Interviews, on site observation and questionnaire are the main tools used for system analysis.

The system analysts play the role of an interrogator and dwells deep in the working of
the present system. System analyst makes investigation and possible changes to the existing
system. At the conclusion of the system analysis there is a system description and the requirement
for a new system. If there is no existing system, the analysis defines the requirements. Decide,
which follows, purpose a new system that meets its needs. This new system may be built a fresh
or by changing the existing system Developments begin by defining a model of new system and
convert this model to a working system. Finally, the data models are converted to a database and
a processed to user procedures and computer programmers

4.2 FEASIBILITY STUDY

Feasibility is conducted to identify the best system that meets all requirements. It is
both necessary and important to evaluate the feasibility of a project at the earliest possible time.
Feasibility study includes an identification description, an evaluation of proposed system and
selection of the best system for the job. During the system is to be carried out. This is to ensure
that the proposed system is not a burden to the shop. The feasibility studyshould be relatively
cheap and quick.

The results should inform the decision of whether to go ahead with a more detailed
analysis, some understanding of the major requirements for the system is essential. Four key
considerations involved in the feasibility analysis are as given below;

➢ Operational Feasibility

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


9
SMART DRIVE

➢ Technical Feasibility

➢ Economic Feasibility

➢ Behavioral Feasibility

4.2.1 Operational Feasibility

The purpose of the operational feasibility is to determine whether the new system will
be used if it is developed and implemented and whether there will be resistance from users that
will undermine the possible application benefits. The aspect of study is to check the level of
acceptance of the system by the user. This includes the process of training the user to use the
system efficiently. The user must not feel threatened by the system, instead must accept it as a
necessity.

The level of acceptance by the user solely depends on the methods that are employed
to educate the user about the system and to make him familiar with it. His level of confidence
must be raised so that he is also able to make some constructive. The proposed system is an
upgrade version of the current systems new fields have been implemented according to the user
need, hence it ensures all the aspects. The proposed system is very much user-friendly and the
system is easily understood by simple training and it is operationally feasible to use by any users.

4.2.2 Technical Feasibility


A study of function, performance and constraints may improve the ability to create an
acceptable system, technical feasibility is frequently the most difficult area to achieve at the stage
of product. Engineering process. technical feasibility is deals with the hardware as well as
software requirements. the scope was whether the work for the project is done with the current
equipment’s and the existing system technology has to be examined in the feasibility study.

The result was found to be true. This feasibility is carried out to check the technical
requirements of the system. The developed system must have a modest requirement; as only
minimal or null changes are required for implementing this system. this is related to the
technicality of the project. This evaluation determines whether the technology needed for

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


10
SMART DRIVE

proposed system is available or not. It deals with hardware as well as software requirements. that
is, type of hardware, software and the methods required for running the system are analyzed .so
it can be used in any windows OS computer. This system requires very low system resources and
it will work in almost all configurations. In the existing system all functions are doing manually.
So, if they get this designed software, the problems can be avoided and thus the system will run
smoothly.

4.2.2 Economic Feasibility

Economic feasibility is the most frequently used method for evaluating the
effectiveness of the candidate system. It is very essential because the main goal of the proposed
system is to have economically better result along with increased efficiency. A cost evaluation is
weighed against the ultimate income or product. Economic justification is generally the bottom-
line consideration that includes cost benefit analysis, long term corporate income strategies, and
cost of resources needed for development and potential market growth. When compared to the
advantage obtained from implementing the system its cost is affordable. Proposed system was
developed with available resources. Since cost input for the software is almost nil the output of
the software is always a profit. Hence software is economically feasible.

4.2.3 Behavioral Feasibility

People are inherently resistant to change and computer is known for facilitating the
changes .an estimate should be made of how strongly the user. In the existing system more
manpower is required and time factor is more. The more manpower for managing many files for
dynamic data replication and more time for search through these files is needed. but in the
proposed system, both manpower and time factors are reduced and unnecessary burden is
reduced. Thus, the remaining people are made to engage in some other important work

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


11
SMART DRIVE

5. SYSTEM REQUIRMENT SPECIFICATION

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


12
SMART DRIVE

5.1SYSTEM SPECIFICATION

5.1.1 ABOUT THE FRONT END


5.1.1.1 HTML (Hyper-text Markup Language)
HTML is a MARKUP LANGUAGE that defines the structure of your content..HTML
consists of a series of elements, which you use to enclose, or wrap, different parts of the content
to make it appear a certain way, or act a certain way. The enclosing tags can make a word or
image hyperlink to somewhere else, can italicize words, can make the font bigger or smaller, and
so on.

5.1.1.2 CSS (Cascading Stylesheet)


CSS (Cascading Style Sheets) allows you to create great-looking web pages, but how
does it work under the hood? This article explains what CSS is, with a simple syntax example,
and also covers some key terms about the language.

5.1.1.3 JavaScript

JavaScript is a scripting or programming language that allows you to implement


complex features on web pages - every time a web page does more than just sit there and display
static information for you to look at - displaying timely content updates, interactive maps,
animated 2D/3D graphics, scrolling video jukeboxes, etc. - you can bet that JavaScript is
probably involved. It is the third layer of the layer cake of standard web technologies, two of
which (HTML and CSS) we have covered in much more detail in other parts of the Learning
Area.

5.1.2 ABOUT THE BACK END

5.1.2.1 PHP

PHP is a server-side scripting language designed for Web development but also used
as a general purpose programming language. PHP is now installed on more than 20 million Web
sites and 1 million Web servers. . While PHP originally stood for Personal Home Page, it is now
said to stand for PHP: Hypertext Pre-processor, a recursive acronym.

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


13
SMART DRIVE

PHP code is interpreted by a Web server with a PHP processor module which generates the
resulting Web page: PHP commands can be embedded directly into an HTML source document
rather than calling an external file to process data. PHP includes free and open source libraries
with the core build. PHP is a fundamentally Internet-aware system with modules built in for
accessing File Transfer Protocol (FTP) servers, many database servers, embedded SQL libraries
such as embedded PostgreSQL, MySQL, Microsoft SQL Server and SQLite, LDAP servers, and
others. PHP is commonly used as the P in this bundle alongside Linux, Apache and MySQL,
although the P may also refer to Python, Perl, or some mix of the three. Similar packages are also
available for Windows and OS X, then called WAMP and MAMP, with the first letter standing
for the respective operating system. PHP is a server-side scripting language designed specifically
for the Web. Within an HTML page, you can embed PHP code that will be executed each time
the page is visited. Your PHP code is interpreted at the web server and generates HTML or other
output that the visitor will see. PHP was conceived in 1994 and was originally the work of one
man, RasmusLerdorf. It was adopted by other talented people and has gone through four major
rewrites to bring us the broad, mature product we see today. PHP is an Open Source project,
which means you have access to the source code and can use, alter, and redistribute it all without
charge. PHP originally stood for Personal Home Page but was changed in line with the GNU
recursive naming convention (GNU = Gnu’s Not Unix) and now stands for PHP Hypertext Pre-
processor.

5.1.2.2 MySQL Database

A database is a collection of information that’s related to a particular subject or


purpose, such as tracking client orders or maintaining a list of project details. If the database isn’t
stored on a computer, or only part of it are one may be tracking information from a variety of
sources that one is having to co-ordinate and organize himself using MySQL Server, one can
manage all information from a single database file. Within the file, data is divided into separate
storage containers called tables; view, add and update data by using online forms; find and
retrieve just the data wanted for reports. MySQL Server allows the user to view, update or analyse
the database from the Internet of an intranet by creating data access pages. MySQL Server as a
relational database stores data in many related tables. A table is a collection of data about a
specific topic such as projects or clients. Using a separate table for each topic means that, store
that data only once. This makes the database more efficient and reduces data-entry errors.Tables

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


14
SMART DRIVE

organize data into columns (called fields) and rows (called records). A common field relates two
tables so that MySQL Server can bring together the data from the two tables for viewing, editing,
or printing. In table Design view one can create an entire table from scratch or add, delete or
customize the fields in an existing table. The user can also display records from tables that are
related to the current table by displaying sub data-sheets within the main data-sheet. With some
restrictions, the user can work with the data in sub data-sheets in many of the same ways that
they work with data in the main data-sheet. To store data, create one table for each type of
information that is to be tracked. To bring the data from multiple tables together in a query, form,
report, or data MySQL Server page, define relationships between the tables.

5.1.3 ABOUT THE OPERATING SYSTEM

The OS used is Windows.

5.1.3.1 WINDOWS OS

The hall mark software of Microsoft, which had created a new wave of graphical user
interface in the industry, WINDOWS XP stands in the top of its popularity. The advent of
Microsoft plus has cured whatever faults were there in the original WINDOWS XP version and
made it and useful tool to work with the memory resident programs of it, make the reloading of
WINDOWS XP easier, it plug and play connectivity for input output devices makes a new
dimension towards the use of computer system. Connectivity to the information network slice
Internet through modems makes it overstate software. Almost all new software has their windows
version also. The programmer and file manager facilities of it had made a leap way towards
giving a new dimension towards the operation of computer systems.

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


15
SMART DRIVE

6. HARDWARE AND SOFTWARE SPECIFICATION

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


16
SMART DRIVE

6. HARDWARE SPECIFICATION
Selection of hardware configuration is very important task related task related to the
software development. The processor should be powerful to handle all the operations. Latest

version of any browser is must. Stable internet connection is required.

6.1 SYSTEM CONFIGURATION

6.1.1 Hardware System Configuration

➢ Processor- Intel core i3 and above


➢ Memory - Minimum 1 GB RAM
➢ Hardrive - 100 GB
➢ RAM - 2 GB (min)

6.1.2 Software System Configuration

➢ Operating System -Windows 7 and above


➢ Front End -HTML, CSS, JAVASCRIPT
➢ Server-side Script -PHP
➢ Database -MySQL
➢ Database Connectivity -PHPMyAdmin

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


17
SMART DRIVE

7. SYSTEM DESIGN

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


18
SMART DRIVE

7.1 SYSTEM DESIGN


The term design describes the final system and the way in which it is developed. The
system design is a solution, how to approach to the new system. This important phase is
composed of several steps. An emphasis is on translating the performance requirements of our
proposed system into design specification. Design goes through logical and physical stage of
development. In the design phase the physical design producing the working system by defining
a particular specification that helps to knowing exactly what the new system must do. The logical
design determines the information flow into and of the system and require database. Design is a
multistep process that focuses on data structure, software, architecture, procedural details, and
interface between modules. The design process translates the requirements into the
representation of the software. Computer software design changes continually because new
methods, better analysis and broader understanding evolved. It provides the understanding and
procedure details necessary for implementing the proposed system .an emphasis is on translating
the performance requirement of our proposed system into design specification. Design goes
through logical and physical stage. The system design is the last phase that indicate the final
system and process of design phase. In the designed phase of maintenance management system,
the database tables, input screens and output reports are designed. In table designing, redundancy
is avoided. Design is the only way that we can accurately translate a system requirement into a
software product. In our production management system, the all-input screens are designed as
user friendly and understandable.

7.2 INPUT DESIGN

Input design is the link that ties the information system into the world of its users. The
input design involves determining what the input is, how the data should be performed, how to
validate data, how to minimize data entry and how to provide a multi user facility, inaccurate
input data are the most common cause of errors in data processing. Errors entered by data entry
operator can be controlled by input design. Input design is the process of converting user
originated input to a computer-based format. Input data are collected and organized into groups
of similar data. Once identified, appropriate input media are selected for processing.

All the input data are validated in the order and if any data violates any conditions,
the user is wanted by a message. If the data satisfies all he conditions, then it is transferred to the

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


19
SMART DRIVE

appropriate table in the database. A form is designed to enter the details about the user. And once
the user enters the details the email id that he entered will be validated and if no email with the
same email-id is present only then he will be able to register the account. After the registration
the user will be directly taken to the user’s page where he can select any user and start chatting.
From the second time the user can directly login from the login page itself.

7.3 OUTPUT DESIGN

Output design is very important concept in the computerized system, without reliable
output the user may feel the entire system unnecessary and avoids using it. The proper output
design is important in any system and facilitates effective decision making. The output design of
this system includes various reports. Output requirements are designed during system analysis.
An application is successful only when it can provide efficient and effective reports. The goal of
the output design is to capture the output and get the data into a format suitable for the computer.

It is very helpful to produce the clear, accurate, and speedy information for end users. A major
form of the output is the harder copy from the pointer and screen reports. Printouts are designed
around the output requirements of the user. Allowing the user to view the sample screen is
important because the user is the ultimate judge of the quality of output. Output of this project is
provided in the form of reports created using crystal report tool.

7.4 DATABASE DESIGN


Database is a collection of interrelated data stores with minimum the overall objective
in the development of the database technology has been to treat data as an organizational resource
and has an integrated whole. Database management system allows data to be protected and
organized separately from other resources. Database is an integrated collection of data. This is
the difference between logical and physical data.

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


20
SMART DRIVE

7.5 PROCESS DESIGN

Process design represents the structure of data and program components that are
required to build a computer-based system. It considered the architectural style that the system
will take, the structure and properties of the components constitute the system, and the
interrelationships that occur among all architectural components of a system. Although a
software engineer can design both and architecture, the job is often allocated to specialist when
large, complex system are to be built. A database or data warehouse designer creates data
architecture for a system. Architectural design begins with data design and proceeds to the
derivation of one or more representations of the architectural structure of the system. An
architecture model encompassing data architecture and program structure is created during
architectural design.

7.6 PROCESS DESCRIPTION

MODULES

1. ADMIN;

• User confirmation
• View feedbacks
• View user

2. USER;

• Text input
• Image upload
• Encryption/Decryption
• Output
• View Encryption history
• View Decryption history
• feedback

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


21
SMART DRIVE

8. DATA FLOW DIAGRAM


The data flow diagram (DFD) was first developed by Larry Constantine as a way of expressing
system requirements in graphical from, this leads to modular design. A DFD, is also known as a
single ‘Bubble Chart’, has the purpose of clarifying system requirements and identify major
transformation that will become programs in system design. A DFD consist of a series of bubbles
joined by lines. The bubbles represent the data transformation and the line represents data flow
in the system.

DFD SYMBOLS

The DFD’s are constructed from four basic symbols. They are,

• A SQUARE defines a source of destination of system data.

• An ARROW identifies the flow of data

• A CIRCLE or a BUBBLE represents a process that transforms incoming data-flow into


outgoing flows.

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


22
SMART DRIVE

• An OPEN-ENDED RECTANGLE is a data source- a temporary repository of data.

CONSTRUCTING A DFD
Several rules of thump are used in drawing DFDs:

1. Process should be named and numbered. Each should be representative of the


process.
2. .The direction of flow is from top to bottom and from left to right.
3. When a process is exploded into lower-level details, they are numbered.
4. The name of data stores, sources and destination are written in capital letters. Process
and data flow names have the first letter of each work capitalized.

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


23
SMART DRIVE

DATA FLOW DIAGRAM

ZERO LEVEL DFD FOR CONNECT PLUS

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


24
SMART DRIVE

FIRST LEVEL DFD OF CONNECT PLUS

SECOND LEVEL DFD FOR REGISTRATION

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


25
SMART DRIVE

SECOND LEVEL DFD FOR LOGIN

SECOND LEVEL DFD FOR ADMIN

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


26
SMART DRIVE

SECOND LEVEL DFD FOR USER

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


27
SMART DRIVE

9. ENTITY RELATIONSHIP DIAGRAM


Entity-relationship diagrams (ERD) are essential to modelling anything from simple to
complex databases, but the shapes and notations used can be very confusing. This guide will help
you to understand the ER Diagram notation, and you will be well on your way to model your
won database. ERD entity symbols.
Entities are objects or concepts that represent important data. Entities are typically nouns
such as product, customer, location, or promotion. There are three types of entities commonly
used in entity relationship diagrams.

Entity Symbol Name Description

These shapes are independent


from other entities, and are often
called parent entities, since they
will often have weak entities that
Strong Entity
depend on them. They will also
Entity have a primary key,
distinguishing each occurrence of
the entity.

Weak entities depend on some


Weak Entity other entity type. Theydon’t have
Weak primary keys, andhave no
meaning in the diagram.

Associative entities relate the


instances of several types.
Associative They also contain attributes
specific to the relationship
between theseentity instances.

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


28
SMART DRIVE

ERD relationship symbols


Within entity-relationship diagrams, relationships are used to document the interaction
between two entities. Relationships are usually verbs such as assign, associate, or track and
provide useful information that could not be discerned with just the entity types.

Relationship Symbol Name Description

Relationships are
Relationship
Relationship
associations between or
among entities.

Weak relationships are


Relationship Weak Relationship connections between a
weakentity and its
owner.

ERD attribute symbols

ERD attributes are characteristics of the entity that help users to better understand the
database. Attributes are included to include details of the various entities that are highlighted in
a conceptual ER diagram.

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


29
SMART DRIVE

Attribute Symbol Name Description

Attributes are characteristics


of an entity, a many-to-many
Attribute
Attribute relationship, or a one-to-one
relationship.

Multivalued attributes are


Multivalued Multivalued Attributes
those attribute that can take
Attributes
one or more than one value.

Derived attributes are


Derived attributes whose value can be
Derived
Attributes calculated from related
Attribute
attribute values.

Relationships are

Relationship Relationship associations between or


among entities.

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


30
SMART DRIVE

ER DIAGRAM

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


31
SMART DRIVE

10. TABLE DESIGN

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


32
SMART DRIVE

TABLES AND DESCRIPTION

Table 1: Admin
Primary Key : Admin_id

No. Name Datatype Constraints Description

1. Admin_id int Primary_key Login _id of the admin

2. Password Varchar(10) NOT_NULL Password of Admin

3. Status int NOT_NULL Status

Table 2: User
Primary Key : User_id

No. Name Datatype Constraints Description

1. User_id int Primary_key Login_id of the user

2. Password Varchar(10) NOT_NULL Password of user

3. Email Varchar(100) NOT_NULL User email

4. Name Varchar(100) NOT_NULL Name of the user

5. Phone no. int NOT_NULL Phone number

6. User confirmation Boolean NOT_NULL User confirmation for


login
7. Status int NOT_NULL Status

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


33
SMART DRIVE

Table 3: File
Primary Key : File_id

No. Name Datatype Constraints Description

1. File_id int Primary_key File id of the user

2. User_id int Foreing_key User id

3. Content varchar NOT_NULL Content (text)

4. File blob NOT_NULL Upload file(image)

5. Password Varchar NOT_NULL Password for the file upload

6. Status int NOT_NULL Status

Table 4: Feedback
Primary Key : Feedback_id

No. Name Datatype Constraints Description

1. Feedback_id int Primary_key feedback from the user

2. User_id int Foreing key User id

3. date int NOT_NULL date

4. time int NOT_NULL time

5 content Varchar(100) NOT_NULL content

6. Status int NOT_NULL Status

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


34
SMART DRIVE

Table 5:Encryption History


Primary Key : Encryption _id

No. Name Datatype Constraints Description

1 Encryption_id int Primary key Encryption history

2 File_id int Foreing key File Uploaded

3 Enryption history Varchar NOT_NULL Encrypted file

4 Status int NOT_NULL Status

Table 5:Decryption History


Primary Key :Decryption _id

No. Name Datatype Constraints Description

1 Decryption_id int Primary key Decryption history


2 File_id int Foreing key File Uploaded

3 Decryption history Varchar NOT_NULL Encrypted file

4 Status int NOT_NULL Status

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


35
SMART DRIVE

11. CODING

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


36
SMART DRIVE

<?php
session_start();
if(isset($_SESSION['enuser']))
{
header("location:.../index.php");
}
else
{

?>

<!DOCTYPE html>
<html lang="zxx">

<!-- Mirrored from html.designingmedia.com/whizcyber/ by HTTrack Website Copier/3.x


[XR&CO'2014], Fri, 23 Jun 2023 19:03:18 GMT -->
<head>
<meta charset="UTF-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>Home | WhizCyber</title>
<link rel="apple-touch-icon" sizes="57x57" href="assets/images/favicons/apple-icon-
57x57.png">
<link rel="apple-touch-icon" sizes="60x60" href="assets/images/favicons/apple-icon-
60x60.png">
<link rel="apple-touch-icon" sizes="72x72" href="assets/images/favicons/apple-icon-
72x72.png">

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


37
SMART DRIVE

<link rel="apple-touch-icon" sizes="76x76" href="assets/images/favicons/apple-icon-


76x76.png">
<link rel="apple-touch-icon" sizes="114x114" href="assets/images/favicons/apple-icon-
114x114.png">
<link rel="apple-touch-icon" sizes="120x120" href="assets/images/favicons/apple-icon-
120x120.png">
<link rel="apple-touch-icon" sizes="144x144" href="assets/images/favicons/apple-icon-
144x144.png">
<link rel="apple-touch-icon" sizes="152x152" href="assets/images/favicons/apple-icon-
152x152.png">
<link rel="apple-touch-icon" sizes="180x180" href="assets/images/favicons/apple-icon-
180x180.png">
<link rel="icon" type="image/png" sizes="192x192" href="assets/images/favicons/android-
icon-192x192.png">
<link rel="icon" type="image/png" sizes="32x32" href="assets/images/favicons/favicon-
32x32.png">
<link rel="icon" type="image/png" sizes="96x96" href="assets/images/favicons/favicon-
96x96.html">
<link rel="icon" type="image/png" sizes="16x16" href="assets/images/favicons/favicon-
16x16.png">
<link rel="manifest" href="assets/images/favicons/manifest.json">
<meta name="msapplication-TileColor" content="#ffffff">
<meta name="msapplication-TileImage" content="assets/images/favicons/ms-icon-
144x144.png">
<meta name="theme-color" content="#ffffff">
<link rel="stylesheet" href="assets/css/bootstrap.min.css">
<link rel="stylesheet" href="assets/css/style.css">
<link rel="stylesheet" href="assets/css/mobile.css">
<link rel="stylesheet" href="../../cdnjs.cloudflare.com/ajax/libs/font-
awesome/5.9.0/css/all.min.css"
integrity="sha512-
q3eWabyZPc1XTCmF+8/LuE1ozpg5xxn7iO89yfSOd5/oKvyqLngoNGsx8jq92Y8eXJ/IRxQb
EC+FGSYxtk2oiw=="

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


38
SMART DRIVE

crossorigin="anonymous" referrerpolicy="no-referrer">
<link rel="stylesheet" href="../../cdnjs.cloudflare.com/ajax/libs/font-
awesome/6.1.1/css/all.min.css">
<link rel="stylesheet" href="../../cdnjs.cloudflare.com/ajax/libs/font-
awesome/6.1.2/css/all.min.css">
<link href="../../unpkg.com/aos%402.3.1/dist/aos.css" rel="stylesheet">
<link rel="stylesheet" href="assets/css/owl.carousel.min.css">
<link rel="stylesheet" href="assets/css/owl.theme.default.min.css">
</head>
<body>
<!-- HEADER-SECTION -->
<div class="home-header-section">
<figure class="banner-right-img left_icon img">
<img src="assets/images/header-right-img.png" alt="" class="star">
</figure>
<header class="header">
<div class="main-header">
<div class="container-fluid">
<nav class="navbar navbar-expand-lg navbar-light p-0">
<a class="navbar-brand pt-0" href="index-2.html"><img
src="assets/images/logo.svg" alt="" class="img-fluid diverge-logo"></a>
<button class="navbar-toggler collapsed" type="button" data-
toggle="collapse"
data-target="#navbarSupportedContent" aria-
controls="navbarSupportedContent"
aria-expanded="false" aria-label="Toggle navigation">
<span class="navbar-toggler-icon"></span>
<span class="navbar-toggler-icon"></span>
<span class="navbar-toggler-icon"></span>
</button>

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


39
SMART DRIVE

<div class="collapse navbar-collapse" id="navbarSupportedContent">

</div>
</nav>
</div>
</div>
</header>
<!-- BANNER-SECTION -->
<div class="home-banner-section overflow-hidden position-relative">
<div class="banner-container-box">
<div class="container-fluid">
<div class="row">
<div class="col-xl-6 col-lg-7 col-md-12 col-sm-12 mb-md-0 mb-4 text-md-left
text-center order-lg-1 order-2">
<div class="social-icons position-absolute">
<ul class="list-unstyled">
<li><a class="text-decoration-none"><i class="fa-brands fa-facebook-f
social-networks"></i></a></li>
<li><a class="text-decoration-none"><i class="fa-brands fa-twitter
social-networks"></i></a></li>
<li><a class="text-decoration-none"><i class="fa-brands fa-instagram
social-networks"></i></a></li>
</ul>
</div>
<div class="home-banner-text" data-aos="fade-up" id="myContentDIV">
<h1>We Provide <span class="h1-text">Encryption </span> For Your
Data</h1>

<div class="banner-btn discover-btn-banner">

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


40
SMART DRIVE

<a href="../login.php" class="text-decoration-none">Login</a>


<a href="../register.php" class="text-decoration-none play-
button">Register</a>
</div>
</div>
</div>
<div class="col-xl-6 col-lg-5 col-md-12 col-sm-12 order-lg-2 order-1">
<div class="banner-img-content position-relative">

<figure class="banner-img mb-0">


<img class="img-fluid banner-img-width" src="assets/images/whiz-
cyber-banner.png" alt="">
</figure>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<!-- OUR-Services-SECTION -->

</div>
<script src="../../code.jquery.com/jquery-1.12.1.min.js"></script>
<script src="assets/js/animations.js"></script>
<script src="assets/js/bootstrap.min.js"></script>
<script src="assets/js/jquery-3.6.0.min.js"></script>
<script src="assets/js/popper.min.js"></script>
<script src="assets/js/owl.carousel.js"></script>

<script src="../../unpkg.com/aos%402.3.1/dist/aos.js"></script>

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


41
SMART DRIVE

<script src="assets/js/text-animations.js"></script>
<script src="assets/js/carousel.js"></script>
<script src="assets/js/showhide.html"></script>
<script src="../../cdnjs.cloudflare.com/ajax/libs/magnific-popup.js/1.1.0/jquery.magnific-
popup.js"></script>
<script src="https://unpkg.com/[email protected]"></script>
<script src="assets/js/type.js"></script>
<script src="assets/js/custom-script.js"></script>
</body>

<!-- Mirrored from html.designingmedia.com/whizcyber/ by HTTrack Website Copier/3.x


[XR&CO'2014], Fri, 23 Jun 2023 19:03:48 GMT -->
</html>

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


42
SMART DRIVE

<?php
session_start();
include "dbcon.php";
if(isset($_POST['login']))
{
$email = $_POST['email'];
$pass=$_POST['pass'];
$sql = "SELECT * FROM `tbl_admin` WHERE `user` LIKE '$email' AND `pass` LIKE
'$pass' AND `sts` = 1";
$cnt=dbset($sql,1);
if($cnt!=0)
{
$rlt=dbset($sql,3);
$_SESSION['enadmin']=$rlt[0];
header("Location:index.php");
}
else
{

}
}

?>

<!DOCTYPE html>
<html lang="en">
<head>

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


43
SMART DRIVE

<!-- Required meta tags -->


<meta charset="utf-8">
<meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
<title>Connect Plus</title>
<!-- plugins:css -->
<link rel="stylesheet" href="assets/vendors/mdi/css/materialdesignicons.min.css">
<link rel="stylesheet" href="assets/vendors/flag-icon-css/css/flag-icon.min.css">
<link rel="stylesheet" href="assets/vendors/css/vendor.bundle.base.css">
<!-- endinject -->
<!-- Plugin css for this page -->
<!-- End plugin css for this page -->
<!-- inject:css -->
<!-- endinject -->
<!-- Layout styles -->
<link rel="stylesheet" href="assets/css/style.css">
<!-- End layout styles -->
<link rel="shortcut icon" href="assets/images/favicon.png" />
</head>
<body>
<div class="container-scroller">
<div class="container-fluid page-body-wrapper full-page-wrapper">
<div class="content-wrapper d-flex align-items-center auth">
<div class="row flex-grow">
<div class="col-lg-4 mx-auto">
<div class="auth-form-light text-left p-5">
<div class="brand-logo">
<img src="assets/images/logo-dark.svg">
</div>

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


44
SMART DRIVE

<h4>Hello! let's get started</h4>


<h6 class="font-weight-light">Sign in to continue.</h6>
<form class="pt-3" action="?" method="post">
<div class="form-group">
<input type="email" name="email" class="form-control form-control-lg"
id="exampleInputEmail1" placeholder="Email">
</div>
<div class="form-group">
<input type="password" name="pass" class="form-control form-control-lg"
id="exampleInputPassword1" placeholder="Password">
</div>
<div class="mt-3">
<button name="login" class="btn btn-block btn-primary btn-lg font-weight-
medium auth-form-btn" h>SIGN IN</button>
</div>
<div class="my-2 d-flex justify-content-between align-items-center">
<div class="form-check">
<label class="form-check-label text-muted">
<input type="checkbox" class="form-check-input"> Keep me signed in </label>
</div>
<a href="#" class="auth-link text-black">Forgot password?</a>
</div>

<div class="text-center mt-4 font-weight-light"> Don't have an account? <a


href="register.php" class="text-primary">Create</a>
</div>
</form>
</div>
</div>
</div>

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


45
SMART DRIVE

</div>
<!-- content-wrapper ends -->
</div>
<!-- page-body-wrapper ends -->
</div>
<!-- container-scroller -->
<!-- plugins:js -->
<script src="assets/vendors/js/vendor.bundle.base.js"></script>
<!-- endinject -->
<!-- Plugin js for this page -->
<!-- End plugin js for this page -->
<!-- inject:js -->
<script src="assets/js/off-canvas.js"></script>
<script src="assets/js/hoverable-collapse.js"></script>
<script src="assets/js/misc.js"></script>
<!-- endinject -->
</body>
</html>

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


46
SMART DRIVE

12. SYSTEM TESTING

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


47
SMART DRIVE

12.1 SYSTEM TESTING


Testing is an important phase in software development. After completion, the system
may work without any problem. But there should be several unknown or hidden errors in the
system still remaining. The error chances may have injected into the system at any stage of the
development. Even if there are techniques to detect and eliminate the errors, some errors may
retain in the system. So, after the completion of coding, the system is to be executed with the
only purpose of detecting maximum number of errors. The tester executes the system, and inputs
different types of values those may cause error or some exceptional situation in the system. The
error locations detected through the testing are to be corrected in the system then. So, the
important and the only aim of testing is to detect and cure even a less possible of an error that
may face in the future executions of the system. Testing begins at the module level and work
towards the integration of entire computers-based system. Nothing is completed without testing,
as it is vital to the success of the system. System testing makes a logical assumption that if all
parts of the system are corrected, the goal will be successfully achieved. Inadequate testing or
non-testing may lead to errors that may not appear until months later.

12.2 PURPOSE OF TESTING


Testing is the success of the system. System testing makes a logical assumption that if all
part of the system is correct, the goal will be successfully achieved. The following points shows
how testing is essential. Existence of program defects of inadequacies is inferred. Verifies
whether the software behave as intended by its designer. Checks conformance with requirements
specification or user need.

Access the operational reliability of the system. Test the performance of the system. The
performance of the system. Reflects the frequencies of actual user inputs. Find the fault which
caused the output anomaly. Detect flaws and deficiencies in requirements. Exercise the program
using data like the real data processed by the program. Test the sycapabilities. Judges whether
the program is usable in practice.Testing objectives There are several rules that can serve as
testing objectives.

Testing is a process of executing a program with the intent of finding error. A good test
case is one that has high probability of finding an undiscovered error. A successful test is one
that uncovers an undiscovered error. If testing is conducted successfully according to the

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


48
SMART DRIVE

objectives as stated above, it would uncover errors in the software. Also testing demonstrates
that software functions appear to the working according to the specifications, that performance
requirement appear to have been met. These are three ways to test a program for correctness for
implementation efficiency for computational complexity.

Test for correctness is supported to verify that a program does exactly what it was designed
to do. This is much difficult that it may at first appear especially for large programs. Tests for
implementation efficiency attempt to find ways to make a correct program faster or use less
storage. It is a code-refining process, which reexamines the implementation phase algorithm
development. Tests for computational complexity amount to an experiment analysis of the
complexity of an algorithm or an experiment comparison of two or more algorithms, which solve
the same problem.

12.3 TYPES OF TESTING


System testing is the stage of implementation, which is aimed at ensuring that the system works
accurately and efficiently before live operation commences. Testing is vital to the success of the
system. System testing makes a logical assumption that if all the parts of the system are correct.
The goal will be successfully achieving. The candidate system is subject to a variety of tests. A
series of tests are performed for the proposed system is ready for system acceptance testing.

The various levels at which testing are conducted are ;


• Unit testing
• Integration testing
• Sequential testing
• System testing
• Validation testing unit testing

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


49
SMART DRIVE

12.3.1 UNIT TESTING


In unit testing each program unit is tested individually.so any errors in a unit are debugged.
Sample data is given for unit testing. The unit test results are recorded for future references. Unit
testing focus verification efforts on the smallest unit of software design, the module. This is
known as “module testing.” It comprises of the set test performed by an individual programmer
prior to the integration of unit into the large system. The modules are tested separately, this testing
is carried out programming stage itself.

In this step each module is found to be working satisfactory as regard to the expected out from
module. The unit testing was done for every module in the software for various inputs, such they
each line of code is at least once executed. This testing was carried out during the unit to a large
system.

12.3.2 INTEGRATION TESTING

Integration testing is a systematic technique for constructing the program structure while
at the same time conducting test to uncover errors associated with interfacing .

12.3.3 PROGRAM TESTING

Program testing checks for two types of errors; syntax and logic. A syntax error is a
program statement that violates one or more rules of the language in which it is written. A logic
error deals with incorrect data fields. When a program is tested, the actual output is compared
with the expected output. All the modules are combined and tested as a whole. Here correction
is difficult because the vast expenses of all errors uncovered are correct for the next testing steps.
We follow bottom-up integration. Bottom-up integration testing as its name implies begin
construction and sling with atomic modules.

12.3.4 SEQUENTIAL TESTING

Sequential or series testing is checking the logic of one or more programs in the candidate
system, where the output of one program will affect the processing done by another program.

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


50
SMART DRIVE

12.3.5 SYSTEM TESTING


System testing executing a program to check logic changes made in it and with the intension of
finding errors-making the program fails. Effective testing does not guaranty reliability is a design
consideration. This testing consists of a series of different test whose primary purpose is to fully
exercise the computer based system.it begins where integration testing is completed and finally
software is completely assembled as package, interfacing errors are uncovered and corrected.

12.3.6 ACCEPTANCE TESTING


Acceptance testing is running the system with live data by the actual user. An acceptance test has
the objective of selling the user in the validity and reliability of the system. A comprehensive test
report is prepared. The report indicates the system’s tolerance, performance range, error rate and
accuracy. It verifies the system procedures operate to system specification and the integrity of
important data is maintained, performance of an acceptance test is the users show. User
motivation is very important for the successful performance of the system. After that a
comprehensive test report is prepared. This report shows the systems tolerance, performance
range, error rate and accuracy.

12.3.7 INPUT TESTING

Here system is tested with all verifiable combination of input. User may type data in situations
like entering password, numerical details etc. The system is tested with all the causes and it
responded with appropriate error message.

12.3.8 OUTPUT TESTING

Here the output is tested to view where the screen is what which is desired. It is also checked
whether it is to the satisfaction of the user. Changes that need to be done can be done after the
result is seen.

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


51
SMART DRIVE

13. SYSTEM IMPLIMENTATION

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


52
SMART DRIVE

13.1 SYSTEM IMPLEMENTATION


A crucial phase in the system life cycle is the successful implementation of the new system
design. Implementation involves creating computer compatible files, training the users, installing
hardware, terminals. In the system implementation, user training us crucial for minimizing
resistance to change and giving the new system chance to prove its worth. The objectives of the
system implementation are to put the system into operation while holding costs, risks, and
personal irritation to minimum. Once the physical system has been designed in details, the next
stage is to run the design into a working system and then to monitor the operation of the system
to ensure that continue to work efficiently and the operation of the system to ensure that is
continues or work efficiently and effectively. The implementation stage is often very complex
and time consuming because many more people are involved than in the earlier stages.

The system implementation will take place through various stages as follows,

o Implementation planning
o Education and training
o System testing
o System implementation
o Change over

The implementation plan includes a description of all the activities that must occur to implement
the new system and to put it into operation. To achieve the objectives and benefits from
computer-based system, it is essential for the people who will be confident of their role in the
new jobs. After software is developed to meet user’s requirements, users test it for acceptance.
The changes over phase are used to provide adaptability for the new system.

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


53
SMART DRIVE

14. SYSTEM MAINTENANCE

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


54
SMART DRIVE

14.1 SYSTEM MAINTENANCE


Software maintenance is the process of modifying a software system or component after its
delivery in order to correct faults, improve the performance and other attributes, or to adapt to
the changed environment. maintenance covers a wide range of activities including correcting the
error and design coding, updating the documentation and test data, and upgrading the user
hardware and software. maintenance is always necessary to keep the software usable and useful.
Hardware also requires periodic maintenance to keep the system into its standards. After
installation is completed and user start is adjusting to the changes created by the candidate
system. evaluation and maintenance begin. If new information is consistent with design
specification the changes must be made. Hardware also requires periodic maintenance to keep
in tune with design specifications. User priorities changes in organizational requirements or
environmental factors also called for system enhancements

Maintenance means restoring something to do its original condition. Unlike hardware, software
does not wear out; it is corrected.in contrast, enhancement means adding, modifying, or
redeveloping the code to support changes in the specifications.it is necessary to keep up with
changing user needs the operational environment. Maintenance means repairing processing or
performance failures or making changes because of previously uncorrected problems or false
assumptions. adaptive maintenance means changing the program function.

Perfective maintenance means enhancing the performance or modifying the program to respond
to the user’s additional or changing needs. Of these types, more time and money are spending on
perfective than on corrective and adaptive maintenance together.

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


55
SMART DRIVE

SOFTWARE MAINTENANCE CAN BE CLASSIFIED INTO:


• Corrective maintenance.

• Adaptive maintenance.

• Perceptive maintenance

Corrective maintenance removes software faults. Perfective maintenance improves the system
without changing its functionality. The objective of perfective maintenance should be to prevent
failures and optimize the software.

Adaptive maintenance modifies the software to keep it up to date with its operative environment
.it may be needed because of changes in the user requirements, changes in target platform, or
changes in external interfaces. Minor adaptive changes should be handled by normal
maintenance process. Major adaptive changes should be carried out as, a separate development
project.

If you want to changes the software to improve future maintainability or reliability or to provide
better basis for future enhancement, then perceptive maintenance is performed.

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


56
SMART DRIVE

15. FUTURE ENHANCEMENT

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


57
SMART DRIVE

15.1 FUTURE ENHANCEMENT

Almost every project is subjected to change on depending on the client requirements. Since this
system is subjected to change for each client, there is always a scope for further enhancement.
The system and the architecture of the assessment system is a compatible one, so addition of new
modules can be done without much difficulty. In future it will use video,audio,text,etc for Text
Steganography.It provide you to use different type of files for Text Steganography.

The software is developed in Php which makes the system more reliable and compatible with
other environments. The application proves better extensibility and flexibility for future
enhancements. Any further requirement application is possible with the same feature guaranteed.
It is a user –friendly system, which is very easy and convenient to use. The system is complete
in the sense that it is operational and it is tested by entering data and getting reports in proper
order. During the development of this project coding standards are followed for easy
maintainability and extensibility. Though the new system provides a base for improving the
efficiency of operations, there are lots of further enhancement that can be added to this project.
Keeping this in view, provision has been made in the system to facilitate easy modification
updating in future. Any modification will not affect the normal working of the system. The
developed system is very interactive, coded in such a way to ensure maximum user friendliness
and allows flexibility for future. The system developed automates most needed activities in an
organization. The new system can be combined with an existing system as well. More and better
advanced separation system can be built on top of the proposed system as and when the need
arises. This is one of the main special features of the proposed system.

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


58
SMART DRIVE

16. SCREEN SHOTS

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


59
SMART DRIVE

SCREEN SHOT OF HOME PAGE

SCREEN SHOT OF LOGIN PAGE

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


60
SMART DRIVE

SCREEN SHOT OF ADMIN PAGE

SCREEN SHOT OF ENCRYPTION PAGE

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


61
SMART DRIVE

SCREEN SHOT OF DECRYPTION PAGE

SCREEN SHOT OF ENCRYPTION HISTORY PAGE

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


62
SMART DRIVE

SCREEN SHOT OF DECRYPTION HISTORY PAGE

SCREEN SHOT OF FEEDBACK PAGE

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


63
SMART DRIVE

17. CONCLUSION

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


64
SMART DRIVE

CONCLUSION

The system that we developed was implemented and tested with real data and were found to be
error free. Also, it is found the system will work successfully. I tried to make the system
maximum user friendly. It is the writing script but now it is computerized. Its be proposed as a
solution to the problem of being out dated with fast present technology I have successfully
completed my project “CONNECT PLUS”. In the time span allotted and put together to form
the main system. The modules were tested separately. Testing of whole system has been done
with simple data and output obtained according to the requirements. The system is implemented
using PHP, HTML, CSS, JAVASCRIPT as front end, MYSQL as back end, and MYSQL as
database. It is user friendly and it is interactive. The system has been tested with real data and
the results are found to be satisfactory. The project meets all the requirements as described in the
proposed system and satisfies user requirements to a great extent. The website thus developed is
easy to maintain and its quite user friendly. FINDINGS the system is very simple in design and
to implement. The system requires very low system resources and system will work in almost all
configurations.

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


65
SMART DRIVE

18. BIBLIOGRAPHY

• Steganography in digital media -Jessica Friedrich

• Digital watermarking and steganography- freank y. shih

• Steganography -shrikant Tiwari

• Integrated research in steganography-Andrey coon

• HTML and CSS: Design and build websites, by Jon Duckett


• javaScript and jQuery: Interactive Front-End Web Development, by Jon Duckett

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


66
SMART DRIVE

19. WEBLIOGRAPHY

• W3Schools: https://www.w3schools.com/css/

• Wikipedia: https://www.wikipedia.org

• GeeksforGeeks: https://www.geeksforgeeks.org/

• YouTube: https://www.youtube.com/

MAR SLEEVA COLLEGE OF ARTS AND SCIENCE, MURICKASSERY


67

You might also like