0% found this document useful (0 votes)
103 views

INTRODUCTION To DFD

This document describes an application for securely transmitting text by encrypting it onto an image. The main objective is to provide a secure transmission of text that can only be decrypted by an authenticated receiver using the same key. The application allows the user to select text, choose an image to encrypt the text onto, and send the encrypted image to the receiver. The receiver then decrypts the image using the key to retrieve the hidden text. The document discusses the software and hardware requirements, as well as an overview of the encryption and decryption process.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
103 views

INTRODUCTION To DFD

This document describes an application for securely transmitting text by encrypting it onto an image. The main objective is to provide a secure transmission of text that can only be decrypted by an authenticated receiver using the same key. The application allows the user to select text, choose an image to encrypt the text onto, and send the encrypted image to the receiver. The receiver then decrypts the image using the key to retrieve the hidden text. The document discusses the software and hardware requirements, as well as an overview of the encryption and decryption process.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 19

INTRODUCTION

Encryption of data on images provides a safe and secure transmission of data


between the sending and receiving party.

The data/text which the sender wants to transmit is selected first and then an
image is chosen from the current mobile device.

The chosen text is then encrypted in the image such that the data is not visible to
any third party.

After encryption is performed, the image is sent to receiving party and the receiver
decrypts the data using the key given by the sender.

This decryption process can only be performed by an authenticated receiver using


this application.

OBJECTIVE
Main objective of this application is to provide a secure and secret
transmission of text by encrypting it on an image using a key and which can
only be decrypted by by an authenticated receiver using the same key on the
same application.

KEY FUNCTIONALITY
 Start
 Chosen text/retrieve data from current device
 Browse an image from the device

ENCRYPTION AND DECRYPTION OF DATA ON IMAGES Page 9


 Encrypt the chosen text onto the image
 This image is sent to the receiver
 Receiver now decrypts the data
.
SOFTWARE AND HARDWARE REQUIREMENTS:
Java, JDK, Android SDK, My Eclipse

Android Mobile Device

1. INTRODUCTION

1.1. Existing system with limitations

The perspective of data security, which has always been an important aspect of
quality of service, Cloud Computing inevitably, poses new challenging security threats
fornumber of reasons.
Encryption of data/text was previously done using hash and cryptographic algorithms,
which is written in binary form. Such encryption techniques are visible in a specific
form and the intruder who is aware of binary text formats can easily read the text.
In those times it provided a lot of security but as technology progressed many
hackers also came into existence and it could not provide security upto that extent.

1.2. Proposed system with features:

In this project we used many techniques to encrypt and make the data in-visible to
any one(not even to the receiver). We used LSB (Least Significant Bit) format,
stenography and cryptographic techniques to encrypt the data and the data/text
being encrypted on an image will not be visible.

ENCRYPTION AND DECRYPTION OF DATA ON IMAGES Page 10


The sender will use a key for security reasons and the same key should be used by
receiving party to decrypt the image and obtain the text written on it.
The image on which data encryption is being performed can be chosen from the
existing device and after all the process completes, that image can be sent through
Bluetooth or mail or google drive e.t.c.,

2. FEASIBILITY STUDY
Feasibility study is an important phase in the software development process. It
enables the developer to have an assessment of the product being developed. It
refers to thefeasibility study of the product in terms of outcomes of the product,
operational use andtechnical support required for implementing it.
Feasibility study should be performed on the basis of various criteria and
parameters. Thevarious feasibility studies are:

Economic feasibility
Operational feasibility
Technical feasibility

2.1. Economic feasibility:


An economic feasibility test focuses on returns and costs of a proposed plan in
boththe short and long-term. An economic feasibility study (EFS) should consider
investment andoperating costs, the time value of money, risk and uncertainty, quality
of available data, andthe sensitivity of assumptions. An economic feasibility study
should demonstrate the netbenefit of the proposed course of action in the context of
direct and indirect benefits and coststo the organization and to the general public as
a whole

Our project reduces the expenses in the manual system because Our project is
applicable for only internet. So, it is economically feasible

ENCRYPTION AND DECRYPTION OF DATA ON IMAGES Page 11


2.2. Operational feasibility:
Issues that appear to be relatively minor in the beginning have ways of
growing into
major problems after implementation. Therefore, all operational aspects must be
considered
carefully. Operational feasibility means the project should be supported by users.
It should
not cause any problems to users after implementation.
Our project can be implemented and executed in any type of networking
environment.
So, it is operational feasible.

2.3. Technical feasibility:


Technical feasibility is nothing but implementing the project with existing
technology.
In the technical feasibility the following issues are taken into consideration
1. Whether the required technology available or not
2. Whether the required resources are available
3. Software and hardware.
Inour project supports technical feasibility because we implemented our
projectusing Microsoft.Net3.5 technology which is platform independent and all
the resources thatare required for project are easily available.

ENCRYPTION AND DECRYPTION OF DATA ON IMAGES Page 12


4. BEHAVIORAL DESCRIPTION
4.1. Data flow:
Data flow diagram indicates the flow of data based on source code. Data flow diagram shows
entire functionality of the system.
There are two basic versions for dataflow diagrams.
Data flow diagram for current system.
Data flow diagram for new or proposed logical system.

Data flow diagram is a well known approach to visualize the data processing in
business analysis field. A data flow diagram is strong in illustrating the relationship of
processes, data stores and external entities in business information system.

1. A data-flow diagram (DFD) is a graphical representation of the "flow" of data through an


information system. It differs from the flow chart as it shows the data flow instead of the
control flow of the program. A data-flow diagram can also be used for the visualization of
data processing (structured design).

2. It is common practice to draw a context level data flow diagram first which shows the
interaction between the system and outside entities. The DFD is designed to show how a
system is divided into smaller portions and to highlight the flow of data between those parts.
This context-level data-flow diagram is then "exploded" to show more detail of the system
being modeled.

3. Data-flow diagrams were invented by Larry Constantine, the original developer of


structured design, based on Martin and Estrus’s “data-flow graph" model of computation.

4. Developing a data-flow diagram helps in identifying the transaction data in the data
model.

ENCRYPTION AND DECRYPTION OF DATA ON IMAGES Page 14


13
Symbols:

ENCRYPTION AND DECRYPTION OF DATA ON IMAGES Page 16


4.1.1 Data Flow Diagrams:

A graphical tool used to describe and analyze the moment of data through a system
manual or automated including the process, stores of data, and delays in the system.
Data Flow Diagrams are the central tool and the basis from which other
components are developed. The transformation of data from input to output,
through processes, may be described logically and independently of the physical
components associated with the system. The DFD is also know as a data flow graph
or a bubble chart.
TYPES OF DATA FLOW DIAGRAMS:

DFD’s are of two types

(a) Physical DFD


(b) Logical DFD
1.Physical DFD

Structured analysis states that the current system should be first


understand correctly. The physical DFD is the model of the current system and is
used to ensure that the current system has been clearly understood. Physical
DFDs shows actual devices, departments, and people etc., involved in the current
system.

2. Logical DFD:

Logical DFD s is the model of the proposed system. They clearly should
show the requirements on which the new system should be built. Later during
design activity this is taken as the basis for drawing the system’s structure charts.

ENHANCED DATA SECURITY MODEL IN CLOUD COMPUTING Page 17


Source External sources or destination of data, which may be

people, programs, organizations or other entities.

Data Store Here data are stored or referenced by a process in the system.

DATA FLOW DIAGRAMS

Level 0

sender Encryption Receiver


decryption

ENHANCED DATA SECURITY MODEL IN CLOUD COMPUTING Page 18


Level 1

Change password

encryption

Sender register Login Home

ENHANCED DATA SECURITY MODEL IN CLOUD COMPUTING Page 19


Level 2:

Sender Register Login Home

Encryptio Decryptio
n n

Text
Image Text Image

Browse Brows

Show Show

ENHANCED DATA SECURITY MODEL IN CLOUD COMPUTING Page 20


4.1 Class Diagram

Class diagram in the Unified Modeling Language (UML) is a type of static


structure diagram that describes the structure of a system by showing
the system's classes, their attributes, and the relationships between the
classes. It is the main building block in object oriented modeling. It is
being used both for general conceptual modeling of the systematic of
the application, and for detailed modeling translating the models into
programming code.

The classes in a class diagram represent both the main objects and
interactions in the application and the objects to be programmed. In the
class diagram these classes are represented with boxes which contain
three parts:

 The upper part holds the name of the class.


 The middle part contains the attributes of the class, and
 The bottom part gives the methods or operations the class can
take.
In the conceptual design of a system, a number of classes are
identified and grouped together in a class diagram which helps to
determine the statically relations between those objects. With detailed
modeling, the classes of the conceptual design are often split in a
number of subclasses.
CLASS DIAGRAM:

Login System

String
uname,password
Login()
Login()
Registration()

Text Encryption Text decryption Registration

String key,text String key String name

Encryption() Decryption() Registration()

Image encryption Image decryption

Photo,code,text Getphoto,encrypted key

Image encryption() Show()

Send() Browse()

Browse()
Activity diagram:

4.2 Sequence Diagrams

A sequence diagram in Unified Modeling Language (UML) is a kind


of interaction diagram that shows how processes operate with one
another and in what order. It is a construct of a Message Sequence
Chart. A sequence diagram shows, as parallel vertical lines (lifelines),
different processes or objects that live simultaneously, and, as horizontal
arrows, the messages exchanged between them, in the order in which
they occur. This allows the specification of simple runtime scenarios in a
graphical manner.

Sequence Diagram:

Data base Text User Image Text Image System Other


encryption encryption decryption decryption device

7 8 9

10

11 12
1.login(fill details) 6.check data base for images 11.Decrypts the
image

2.Check data base 7.Image available 12.System shows text

3.Valid/Invalid 8.encryption done

4.Choose text and encrypt 9.Send to receiver

5.Choose image 10.Receiver decrypts the text with a key

4.3 Use Case Diagram

A Use case diagram in the Unified Modeling Language (UML) is a


type of behavioral diagram defined by and created from a Use-case
analysis. Its purpose is to present a graphical overview of the
functionality provided by a system in terms of actors, their goals
(represented as use cases), and any dependencies between those use
cases.
The main purpose of a use case diagram is to show what system
functions are performed for which actor. Roles of the actors in the
system can be depicted.

Use Case Diagram:


registration

Login

Change
password

Text encryption

Image encryption

Text decryption

Image decryption

Logout
4.4 Collaboration Diagram

Collaboration diagrams remains analogous with the sequence diagrams


since

Diagrams encompasses various objects, links along with transmission or

receiving of Messages in this way they coordinate to structural aspects


of

system.(which also provides Dynamic view of the system)

Text Receiver
decryption
User 1

12 11 10

4 9

3
Data base 2 Application 14 Image
decryption
13

5 7 8

Text
Image
encryption
encryption
1. Login 8. Encrypted image
2. Check data 9. Send
3. Response 10. Response
4. Valid /invalid 11. Request key
5. Choose text 12. Decrypted key
6. Encrypted text 13. Browse the received image
7. Choose an image 14. Decrypted image

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy