Jobin
Jobin
1. ABSTRACT
1.1 ABSTRACT
The changes represent the hidden message, but result if successful in no discernible
change to the carrier. The information may be nothing to do with the carrier sound or image or it
might be information about the carrier such as the author or a digital watermarking or finger
print. In steganography information can be hidden in carriers such as images, audio files, text
files, and video and data transmissions. When message is hidden in the carrier a stego carrier is
formed for example a stego-image. Hopefully it will be perceived to be as close as possible to
the original carrier or cover image by the human senses.
Images are the most widespread carrier medium. The are used for steganography in the
following way. The message may firstly be encrypted. They are used for steganography in the
following way. The message may firstly be encrypted. The sender embeds the secret message to
be sent into a graphic file. This results in the production of what is called stego-image. Additional
secret data may be needed in the hiding process e.g. a stegokey etc. This stego-image is then
transmitted to the recipient. The recipient extractor extracts the message from the carrier image.
The message can only be extracted if there is a shared secret between the sender and the recipient.
This could be the algorithm for extraction or a special parameter such as stegokey. A stegoanalyst
or attacker may try to intercept the stego-image.
2. INTROCUCTION
3. SYSTEM STUDY
➢ Government and law enforcement agencies can communicate secretly with the
help of steganography corporations.
➢ It is used in the way of hiding not the information but the password to reach
that information
4. SYSTEM ANALYSIS
The system analysts play the role of an interrogator and dwells deep in the working of
the present system. System analyst makes investigation and possible changes to the existing
system. At the conclusion of the system analysis there is a system description and the requirement
for a new system. If there is no existing system, the analysis defines the requirements. Decide,
which follows, purpose a new system that meets its needs. This new system may be built a fresh
or by changing the existing system Developments begin by defining a model of new system and
convert this model to a working system. Finally, the data models are converted to a database and
a processed to user procedures and computer programmers
Feasibility is conducted to identify the best system that meets all requirements. It is
both necessary and important to evaluate the feasibility of a project at the earliest possible time.
Feasibility study includes an identification description, an evaluation of proposed system and
selection of the best system for the job. During the system is to be carried out. This is to ensure
that the proposed system is not a burden to the shop. The feasibility studyshould be relatively
cheap and quick.
The results should inform the decision of whether to go ahead with a more detailed
analysis, some understanding of the major requirements for the system is essential. Four key
considerations involved in the feasibility analysis are as given below;
➢ Operational Feasibility
➢ Technical Feasibility
➢ Economic Feasibility
➢ Behavioral Feasibility
The purpose of the operational feasibility is to determine whether the new system will
be used if it is developed and implemented and whether there will be resistance from users that
will undermine the possible application benefits. The aspect of study is to check the level of
acceptance of the system by the user. This includes the process of training the user to use the
system efficiently. The user must not feel threatened by the system, instead must accept it as a
necessity.
The level of acceptance by the user solely depends on the methods that are employed
to educate the user about the system and to make him familiar with it. His level of confidence
must be raised so that he is also able to make some constructive. The proposed system is an
upgrade version of the current systems new fields have been implemented according to the user
need, hence it ensures all the aspects. The proposed system is very much user-friendly and the
system is easily understood by simple training and it is operationally feasible to use by any users.
The result was found to be true. This feasibility is carried out to check the technical
requirements of the system. The developed system must have a modest requirement; as only
minimal or null changes are required for implementing this system. this is related to the
technicality of the project. This evaluation determines whether the technology needed for
proposed system is available or not. It deals with hardware as well as software requirements. that
is, type of hardware, software and the methods required for running the system are analyzed .so
it can be used in any windows OS computer. This system requires very low system resources and
it will work in almost all configurations. In the existing system all functions are doing manually.
So, if they get this designed software, the problems can be avoided and thus the system will run
smoothly.
Economic feasibility is the most frequently used method for evaluating the
effectiveness of the candidate system. It is very essential because the main goal of the proposed
system is to have economically better result along with increased efficiency. A cost evaluation is
weighed against the ultimate income or product. Economic justification is generally the bottom-
line consideration that includes cost benefit analysis, long term corporate income strategies, and
cost of resources needed for development and potential market growth. When compared to the
advantage obtained from implementing the system its cost is affordable. Proposed system was
developed with available resources. Since cost input for the software is almost nil the output of
the software is always a profit. Hence software is economically feasible.
People are inherently resistant to change and computer is known for facilitating the
changes .an estimate should be made of how strongly the user. In the existing system more
manpower is required and time factor is more. The more manpower for managing many files for
dynamic data replication and more time for search through these files is needed. but in the
proposed system, both manpower and time factors are reduced and unnecessary burden is
reduced. Thus, the remaining people are made to engage in some other important work
5.1SYSTEM SPECIFICATION
5.1.1.3 JavaScript
5.1.2.1 PHP
PHP is a server-side scripting language designed for Web development but also used
as a general purpose programming language. PHP is now installed on more than 20 million Web
sites and 1 million Web servers. . While PHP originally stood for Personal Home Page, it is now
said to stand for PHP: Hypertext Pre-processor, a recursive acronym.
PHP code is interpreted by a Web server with a PHP processor module which generates the
resulting Web page: PHP commands can be embedded directly into an HTML source document
rather than calling an external file to process data. PHP includes free and open source libraries
with the core build. PHP is a fundamentally Internet-aware system with modules built in for
accessing File Transfer Protocol (FTP) servers, many database servers, embedded SQL libraries
such as embedded PostgreSQL, MySQL, Microsoft SQL Server and SQLite, LDAP servers, and
others. PHP is commonly used as the P in this bundle alongside Linux, Apache and MySQL,
although the P may also refer to Python, Perl, or some mix of the three. Similar packages are also
available for Windows and OS X, then called WAMP and MAMP, with the first letter standing
for the respective operating system. PHP is a server-side scripting language designed specifically
for the Web. Within an HTML page, you can embed PHP code that will be executed each time
the page is visited. Your PHP code is interpreted at the web server and generates HTML or other
output that the visitor will see. PHP was conceived in 1994 and was originally the work of one
man, RasmusLerdorf. It was adopted by other talented people and has gone through four major
rewrites to bring us the broad, mature product we see today. PHP is an Open Source project,
which means you have access to the source code and can use, alter, and redistribute it all without
charge. PHP originally stood for Personal Home Page but was changed in line with the GNU
recursive naming convention (GNU = Gnu’s Not Unix) and now stands for PHP Hypertext Pre-
processor.
organize data into columns (called fields) and rows (called records). A common field relates two
tables so that MySQL Server can bring together the data from the two tables for viewing, editing,
or printing. In table Design view one can create an entire table from scratch or add, delete or
customize the fields in an existing table. The user can also display records from tables that are
related to the current table by displaying sub data-sheets within the main data-sheet. With some
restrictions, the user can work with the data in sub data-sheets in many of the same ways that
they work with data in the main data-sheet. To store data, create one table for each type of
information that is to be tracked. To bring the data from multiple tables together in a query, form,
report, or data MySQL Server page, define relationships between the tables.
5.1.3.1 WINDOWS OS
The hall mark software of Microsoft, which had created a new wave of graphical user
interface in the industry, WINDOWS XP stands in the top of its popularity. The advent of
Microsoft plus has cured whatever faults were there in the original WINDOWS XP version and
made it and useful tool to work with the memory resident programs of it, make the reloading of
WINDOWS XP easier, it plug and play connectivity for input output devices makes a new
dimension towards the use of computer system. Connectivity to the information network slice
Internet through modems makes it overstate software. Almost all new software has their windows
version also. The programmer and file manager facilities of it had made a leap way towards
giving a new dimension towards the operation of computer systems.
6. HARDWARE SPECIFICATION
Selection of hardware configuration is very important task related task related to the
software development. The processor should be powerful to handle all the operations. Latest
7. SYSTEM DESIGN
Input design is the link that ties the information system into the world of its users. The
input design involves determining what the input is, how the data should be performed, how to
validate data, how to minimize data entry and how to provide a multi user facility, inaccurate
input data are the most common cause of errors in data processing. Errors entered by data entry
operator can be controlled by input design. Input design is the process of converting user
originated input to a computer-based format. Input data are collected and organized into groups
of similar data. Once identified, appropriate input media are selected for processing.
All the input data are validated in the order and if any data violates any conditions,
the user is wanted by a message. If the data satisfies all he conditions, then it is transferred to the
appropriate table in the database. A form is designed to enter the details about the user. And once
the user enters the details the email id that he entered will be validated and if no email with the
same email-id is present only then he will be able to register the account. After the registration
the user will be directly taken to the user’s page where he can select any user and start chatting.
From the second time the user can directly login from the login page itself.
Output design is very important concept in the computerized system, without reliable
output the user may feel the entire system unnecessary and avoids using it. The proper output
design is important in any system and facilitates effective decision making. The output design of
this system includes various reports. Output requirements are designed during system analysis.
An application is successful only when it can provide efficient and effective reports. The goal of
the output design is to capture the output and get the data into a format suitable for the computer.
It is very helpful to produce the clear, accurate, and speedy information for end users. A major
form of the output is the harder copy from the pointer and screen reports. Printouts are designed
around the output requirements of the user. Allowing the user to view the sample screen is
important because the user is the ultimate judge of the quality of output. Output of this project is
provided in the form of reports created using crystal report tool.
Process design represents the structure of data and program components that are
required to build a computer-based system. It considered the architectural style that the system
will take, the structure and properties of the components constitute the system, and the
interrelationships that occur among all architectural components of a system. Although a
software engineer can design both and architecture, the job is often allocated to specialist when
large, complex system are to be built. A database or data warehouse designer creates data
architecture for a system. Architectural design begins with data design and proceeds to the
derivation of one or more representations of the architectural structure of the system. An
architecture model encompassing data architecture and program structure is created during
architectural design.
MODULES
1. ADMIN;
• User confirmation
• View feedbacks
• View user
2. USER;
• Text input
• Image upload
• Encryption/Decryption
• Output
• View Encryption history
• View Decryption history
• feedback
DFD SYMBOLS
The DFD’s are constructed from four basic symbols. They are,
CONSTRUCTING A DFD
Several rules of thump are used in drawing DFDs:
Relationships are
Relationship
Relationship
associations between or
among entities.
ERD attributes are characteristics of the entity that help users to better understand the
database. Attributes are included to include details of the various entities that are highlighted in
a conceptual ER diagram.
Relationships are
ER DIAGRAM
Table 1: Admin
Primary Key : Admin_id
Table 2: User
Primary Key : User_id
Table 3: File
Primary Key : File_id
Table 4: Feedback
Primary Key : Feedback_id
11. CODING
<?php
session_start();
if(isset($_SESSION['enuser']))
{
header("location:.../index.php");
}
else
{
?>
<!DOCTYPE html>
<html lang="zxx">
crossorigin="anonymous" referrerpolicy="no-referrer">
<link rel="stylesheet" href="../../cdnjs.cloudflare.com/ajax/libs/font-
awesome/6.1.1/css/all.min.css">
<link rel="stylesheet" href="../../cdnjs.cloudflare.com/ajax/libs/font-
awesome/6.1.2/css/all.min.css">
<link href="../../unpkg.com/aos%402.3.1/dist/aos.css" rel="stylesheet">
<link rel="stylesheet" href="assets/css/owl.carousel.min.css">
<link rel="stylesheet" href="assets/css/owl.theme.default.min.css">
</head>
<body>
<!-- HEADER-SECTION -->
<div class="home-header-section">
<figure class="banner-right-img left_icon img">
<img src="assets/images/header-right-img.png" alt="" class="star">
</figure>
<header class="header">
<div class="main-header">
<div class="container-fluid">
<nav class="navbar navbar-expand-lg navbar-light p-0">
<a class="navbar-brand pt-0" href="index-2.html"><img
src="assets/images/logo.svg" alt="" class="img-fluid diverge-logo"></a>
<button class="navbar-toggler collapsed" type="button" data-
toggle="collapse"
data-target="#navbarSupportedContent" aria-
controls="navbarSupportedContent"
aria-expanded="false" aria-label="Toggle navigation">
<span class="navbar-toggler-icon"></span>
<span class="navbar-toggler-icon"></span>
<span class="navbar-toggler-icon"></span>
</button>
</div>
</nav>
</div>
</div>
</header>
<!-- BANNER-SECTION -->
<div class="home-banner-section overflow-hidden position-relative">
<div class="banner-container-box">
<div class="container-fluid">
<div class="row">
<div class="col-xl-6 col-lg-7 col-md-12 col-sm-12 mb-md-0 mb-4 text-md-left
text-center order-lg-1 order-2">
<div class="social-icons position-absolute">
<ul class="list-unstyled">
<li><a class="text-decoration-none"><i class="fa-brands fa-facebook-f
social-networks"></i></a></li>
<li><a class="text-decoration-none"><i class="fa-brands fa-twitter
social-networks"></i></a></li>
<li><a class="text-decoration-none"><i class="fa-brands fa-instagram
social-networks"></i></a></li>
</ul>
</div>
<div class="home-banner-text" data-aos="fade-up" id="myContentDIV">
<h1>We Provide <span class="h1-text">Encryption </span> For Your
Data</h1>
</div>
<script src="../../code.jquery.com/jquery-1.12.1.min.js"></script>
<script src="assets/js/animations.js"></script>
<script src="assets/js/bootstrap.min.js"></script>
<script src="assets/js/jquery-3.6.0.min.js"></script>
<script src="assets/js/popper.min.js"></script>
<script src="assets/js/owl.carousel.js"></script>
<script src="../../unpkg.com/aos%402.3.1/dist/aos.js"></script>
<script src="assets/js/text-animations.js"></script>
<script src="assets/js/carousel.js"></script>
<script src="assets/js/showhide.html"></script>
<script src="../../cdnjs.cloudflare.com/ajax/libs/magnific-popup.js/1.1.0/jquery.magnific-
popup.js"></script>
<script src="https://unpkg.com/[email protected]"></script>
<script src="assets/js/type.js"></script>
<script src="assets/js/custom-script.js"></script>
</body>
<?php
session_start();
include "dbcon.php";
if(isset($_POST['login']))
{
$email = $_POST['email'];
$pass=$_POST['pass'];
$sql = "SELECT * FROM `tbl_admin` WHERE `user` LIKE '$email' AND `pass` LIKE
'$pass' AND `sts` = 1";
$cnt=dbset($sql,1);
if($cnt!=0)
{
$rlt=dbset($sql,3);
$_SESSION['enadmin']=$rlt[0];
header("Location:index.php");
}
else
{
}
}
?>
<!DOCTYPE html>
<html lang="en">
<head>
</div>
<!-- content-wrapper ends -->
</div>
<!-- page-body-wrapper ends -->
</div>
<!-- container-scroller -->
<!-- plugins:js -->
<script src="assets/vendors/js/vendor.bundle.base.js"></script>
<!-- endinject -->
<!-- Plugin js for this page -->
<!-- End plugin js for this page -->
<!-- inject:js -->
<script src="assets/js/off-canvas.js"></script>
<script src="assets/js/hoverable-collapse.js"></script>
<script src="assets/js/misc.js"></script>
<!-- endinject -->
</body>
</html>
Access the operational reliability of the system. Test the performance of the system. The
performance of the system. Reflects the frequencies of actual user inputs. Find the fault which
caused the output anomaly. Detect flaws and deficiencies in requirements. Exercise the program
using data like the real data processed by the program. Test the sycapabilities. Judges whether
the program is usable in practice.Testing objectives There are several rules that can serve as
testing objectives.
Testing is a process of executing a program with the intent of finding error. A good test
case is one that has high probability of finding an undiscovered error. A successful test is one
that uncovers an undiscovered error. If testing is conducted successfully according to the
objectives as stated above, it would uncover errors in the software. Also testing demonstrates
that software functions appear to the working according to the specifications, that performance
requirement appear to have been met. These are three ways to test a program for correctness for
implementation efficiency for computational complexity.
Test for correctness is supported to verify that a program does exactly what it was designed
to do. This is much difficult that it may at first appear especially for large programs. Tests for
implementation efficiency attempt to find ways to make a correct program faster or use less
storage. It is a code-refining process, which reexamines the implementation phase algorithm
development. Tests for computational complexity amount to an experiment analysis of the
complexity of an algorithm or an experiment comparison of two or more algorithms, which solve
the same problem.
In this step each module is found to be working satisfactory as regard to the expected out from
module. The unit testing was done for every module in the software for various inputs, such they
each line of code is at least once executed. This testing was carried out during the unit to a large
system.
Integration testing is a systematic technique for constructing the program structure while
at the same time conducting test to uncover errors associated with interfacing .
Program testing checks for two types of errors; syntax and logic. A syntax error is a
program statement that violates one or more rules of the language in which it is written. A logic
error deals with incorrect data fields. When a program is tested, the actual output is compared
with the expected output. All the modules are combined and tested as a whole. Here correction
is difficult because the vast expenses of all errors uncovered are correct for the next testing steps.
We follow bottom-up integration. Bottom-up integration testing as its name implies begin
construction and sling with atomic modules.
Sequential or series testing is checking the logic of one or more programs in the candidate
system, where the output of one program will affect the processing done by another program.
Here system is tested with all verifiable combination of input. User may type data in situations
like entering password, numerical details etc. The system is tested with all the causes and it
responded with appropriate error message.
Here the output is tested to view where the screen is what which is desired. It is also checked
whether it is to the satisfaction of the user. Changes that need to be done can be done after the
result is seen.
The system implementation will take place through various stages as follows,
o Implementation planning
o Education and training
o System testing
o System implementation
o Change over
The implementation plan includes a description of all the activities that must occur to implement
the new system and to put it into operation. To achieve the objectives and benefits from
computer-based system, it is essential for the people who will be confident of their role in the
new jobs. After software is developed to meet user’s requirements, users test it for acceptance.
The changes over phase are used to provide adaptability for the new system.
Maintenance means restoring something to do its original condition. Unlike hardware, software
does not wear out; it is corrected.in contrast, enhancement means adding, modifying, or
redeveloping the code to support changes in the specifications.it is necessary to keep up with
changing user needs the operational environment. Maintenance means repairing processing or
performance failures or making changes because of previously uncorrected problems or false
assumptions. adaptive maintenance means changing the program function.
Perfective maintenance means enhancing the performance or modifying the program to respond
to the user’s additional or changing needs. Of these types, more time and money are spending on
perfective than on corrective and adaptive maintenance together.
• Adaptive maintenance.
• Perceptive maintenance
Corrective maintenance removes software faults. Perfective maintenance improves the system
without changing its functionality. The objective of perfective maintenance should be to prevent
failures and optimize the software.
Adaptive maintenance modifies the software to keep it up to date with its operative environment
.it may be needed because of changes in the user requirements, changes in target platform, or
changes in external interfaces. Minor adaptive changes should be handled by normal
maintenance process. Major adaptive changes should be carried out as, a separate development
project.
If you want to changes the software to improve future maintainability or reliability or to provide
better basis for future enhancement, then perceptive maintenance is performed.
Almost every project is subjected to change on depending on the client requirements. Since this
system is subjected to change for each client, there is always a scope for further enhancement.
The system and the architecture of the assessment system is a compatible one, so addition of new
modules can be done without much difficulty. In future it will use video,audio,text,etc for Text
Steganography.It provide you to use different type of files for Text Steganography.
The software is developed in Php which makes the system more reliable and compatible with
other environments. The application proves better extensibility and flexibility for future
enhancements. Any further requirement application is possible with the same feature guaranteed.
It is a user –friendly system, which is very easy and convenient to use. The system is complete
in the sense that it is operational and it is tested by entering data and getting reports in proper
order. During the development of this project coding standards are followed for easy
maintainability and extensibility. Though the new system provides a base for improving the
efficiency of operations, there are lots of further enhancement that can be added to this project.
Keeping this in view, provision has been made in the system to facilitate easy modification
updating in future. Any modification will not affect the normal working of the system. The
developed system is very interactive, coded in such a way to ensure maximum user friendliness
and allows flexibility for future. The system developed automates most needed activities in an
organization. The new system can be combined with an existing system as well. More and better
advanced separation system can be built on top of the proposed system as and when the need
arises. This is one of the main special features of the proposed system.
17. CONCLUSION
CONCLUSION
The system that we developed was implemented and tested with real data and were found to be
error free. Also, it is found the system will work successfully. I tried to make the system
maximum user friendly. It is the writing script but now it is computerized. Its be proposed as a
solution to the problem of being out dated with fast present technology I have successfully
completed my project “CONNECT PLUS”. In the time span allotted and put together to form
the main system. The modules were tested separately. Testing of whole system has been done
with simple data and output obtained according to the requirements. The system is implemented
using PHP, HTML, CSS, JAVASCRIPT as front end, MYSQL as back end, and MYSQL as
database. It is user friendly and it is interactive. The system has been tested with real data and
the results are found to be satisfactory. The project meets all the requirements as described in the
proposed system and satisfies user requirements to a great extent. The website thus developed is
easy to maintain and its quite user friendly. FINDINGS the system is very simple in design and
to implement. The system requires very low system resources and system will work in almost all
configurations.
18. BIBLIOGRAPHY
19. WEBLIOGRAPHY
• W3Schools: https://www.w3schools.com/css/
• Wikipedia: https://www.wikipedia.org
• GeeksforGeeks: https://www.geeksforgeeks.org/
• YouTube: https://www.youtube.com/