INTRODUCTION To DFD
INTRODUCTION To DFD
The data/text which the sender wants to transmit is selected first and then an
image is chosen from the current mobile device.
The chosen text is then encrypted in the image such that the data is not visible to
any third party.
After encryption is performed, the image is sent to receiving party and the receiver
decrypts the data using the key given by the sender.
OBJECTIVE
Main objective of this application is to provide a secure and secret
transmission of text by encrypting it on an image using a key and which can
only be decrypted by by an authenticated receiver using the same key on the
same application.
KEY FUNCTIONALITY
Start
Chosen text/retrieve data from current device
Browse an image from the device
1. INTRODUCTION
The perspective of data security, which has always been an important aspect of
quality of service, Cloud Computing inevitably, poses new challenging security threats
fornumber of reasons.
Encryption of data/text was previously done using hash and cryptographic algorithms,
which is written in binary form. Such encryption techniques are visible in a specific
form and the intruder who is aware of binary text formats can easily read the text.
In those times it provided a lot of security but as technology progressed many
hackers also came into existence and it could not provide security upto that extent.
In this project we used many techniques to encrypt and make the data in-visible to
any one(not even to the receiver). We used LSB (Least Significant Bit) format,
stenography and cryptographic techniques to encrypt the data and the data/text
being encrypted on an image will not be visible.
2. FEASIBILITY STUDY
Feasibility study is an important phase in the software development process. It
enables the developer to have an assessment of the product being developed. It
refers to thefeasibility study of the product in terms of outcomes of the product,
operational use andtechnical support required for implementing it.
Feasibility study should be performed on the basis of various criteria and
parameters. Thevarious feasibility studies are:
Economic feasibility
Operational feasibility
Technical feasibility
Our project reduces the expenses in the manual system because Our project is
applicable for only internet. So, it is economically feasible
Data flow diagram is a well known approach to visualize the data processing in
business analysis field. A data flow diagram is strong in illustrating the relationship of
processes, data stores and external entities in business information system.
2. It is common practice to draw a context level data flow diagram first which shows the
interaction between the system and outside entities. The DFD is designed to show how a
system is divided into smaller portions and to highlight the flow of data between those parts.
This context-level data-flow diagram is then "exploded" to show more detail of the system
being modeled.
4. Developing a data-flow diagram helps in identifying the transaction data in the data
model.
A graphical tool used to describe and analyze the moment of data through a system
manual or automated including the process, stores of data, and delays in the system.
Data Flow Diagrams are the central tool and the basis from which other
components are developed. The transformation of data from input to output,
through processes, may be described logically and independently of the physical
components associated with the system. The DFD is also know as a data flow graph
or a bubble chart.
TYPES OF DATA FLOW DIAGRAMS:
2. Logical DFD:
Logical DFD s is the model of the proposed system. They clearly should
show the requirements on which the new system should be built. Later during
design activity this is taken as the basis for drawing the system’s structure charts.
Data Store Here data are stored or referenced by a process in the system.
Level 0
Change password
encryption
Encryptio Decryptio
n n
Text
Image Text Image
Browse Brows
Show Show
The classes in a class diagram represent both the main objects and
interactions in the application and the objects to be programmed. In the
class diagram these classes are represented with boxes which contain
three parts:
Login System
String
uname,password
Login()
Login()
Registration()
Send() Browse()
Browse()
Activity diagram:
Sequence Diagram:
7 8 9
10
11 12
1.login(fill details) 6.check data base for images 11.Decrypts the
image
Login
Change
password
Text encryption
Image encryption
Text decryption
Image decryption
Logout
4.4 Collaboration Diagram
Text Receiver
decryption
User 1
12 11 10
4 9
3
Data base 2 Application 14 Image
decryption
13
5 7 8
Text
Image
encryption
encryption
1. Login 8. Encrypted image
2. Check data 9. Send
3. Response 10. Response
4. Valid /invalid 11. Request key
5. Choose text 12. Decrypted key
6. Encrypted text 13. Browse the received image
7. Choose an image 14. Decrypted image