0% found this document useful (0 votes)
30 views23 pages

Project

Uploaded by

aravindkumar8886
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views23 pages

Project

Uploaded by

aravindkumar8886
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 23

WELCOME

SRI BALAJI PG MCA COLLEGE

COMPARISON OF MACHINE LEARNING ALGORITHM FOR PREDICTING CRIME HOTSPOTS


Introduction
• Encryption of data plays a vital role in the real time environment to keep the data out of reach of
unauthorized people, such that it is not altered and tampered. The digital Encryption System is software,
which tries to alter the originality of the text into some encrypted form.
• The major task of the Digital Encryption System is to provide the user the flexibility of passing the
information implementing the encryption standards as per the specification and algorithms proposed and
store the information in a form that is unreadable.
• The Application should have a reversal process as of which should be in a position to decrypt the data to its
original format upon the proper request by the user. While the Encryption and Decryption is done the
application should confirm the standards of authentication and authorization of the user.
• The Entire application should strive to achieve a user friendly Graphical User Interface, which need to be in a
self-learning mode for the end user.
• The application of Decryption should be a reverse process at the other end and should be translated only
when the receiver of the data applies the proper reversal key.
Existing System
• The three factors that must come together

• every client has to be trained as to how to use the application and even the security in the communication
is also the factor to be considered.

• Network security in the existing system is the motivation factor for a new system with higher-level security
standards for the information exchange.
Defects of Existing System
• This makes maintenance expensive.

• Present day transactions are considered to be "un-trusted" in terms of security, i.e. they are
relatively easy to be hacked.
Proposed System
• The validation code should be placed on the server and not on the client such
that data transfer takes place between only the registered users only.

• The server should identi fy the type of request (GET/POST) and perform
appropriate acti on.
• It should also identi fy the user and provide the communicati on according
to the prescribed level of security with transfer of the fi le requested and
run the required process at the server if necessary
Advantages of Proposed System
• The transactions should take place in a secured format between
various clients in the network.
• the server should send necessary information such as User
authorization and authentication information, Encryption,
Decryption types and their level of hierarchy etc.
System Requirements

• Software Requirements
 Operating System Windows NT/2000 (Client/Server).
 Front-end: Java Swings.
 Communication Architecture: JDBC, Servlets.
 Database maintenance: Oracle 8i.

• Hardware Requirements
System Configuration
Pentium III Processor with 700 MHz Clock Speed
4 GB RAM, 500 GB HDD, 32 Bit PCI Ethernet Card.
Modules
This project contains five modules. They are:
• Data Embed and Retrieve
• Compression and Decompression
• CRC generation and CRC Verification
• Graphical User Interface
Brief Explanation Of Modules

Data Embed

• This module deals with identifying the data and the image to embed the data into the image before it
can be transmitted. This is then followed by compression to increase the rate of transfer of files
between the networks.
• The module opens by prompting the user to identify the file that need to be transmitted across the
network. The file is then selected using the GUI interface provided through JAVA. The module then
prompts to identify the image file, which needs to house the data file.
• The data is then embedded into the image file in such a way that the image file is not corrupted; at the
same time the data is secure. The image if hacked or interrupted by a third party can be viewed in any
browser without actually displaying the data. The data on the receivers end is isolated and removed
from the image.
• The module deals with identifying the hidden data in the image. The module receives the image file
that is decompressed and decompresses it using JAVA UTILITY PACKAGE.
Compression&Decompression:

• This technique maps arbitrary input into printable character output. The form of encoding has the following
relevant characteristics. The range of the function is a character set that is universally re-presentable at all sites,
not a specific binary encoding of that character set.
• The characters themselves can be encoded into whatever form is needed by a specific system. For instance, the
character 'E' is represented in ASCII system as a hexadecimal 45 and in EDCDIC- based system as hexadecimal-
c5.
• The character set consists of 65 printable characters, one of which is used for padding. With 2^6 = 64 available
characters, each character can be used to represent 6 bits of input.
• No control characters are included in the set. Thus, the message encoded in Radix-64 can traverse mail-
handling system. That scans the data stream for control characters. The hyphen character "- " is not included.
CRC Generation and Verification
• Its purpose is to protect programs (in which supporting code is linked) with one of the most effective
weapons against computer viruses: the Cyclic Redundancy Check, or CRC.
• There are many utilities that perform CRC checks on other but most of these are external programs that
are usually run only once, if at all. The CRC generated by these utilities must be compared to a value in an
external file; if the values match, the program is not infected.
• This approach has two problems: the first is that the CRC check is run only once when the user gets the
program, if at all. Most people would never run the check a second time.
• The CRC to be stored in the program itself (the .EXE file) and for the program to do its own check every
time it is loaded.
• This method is much more effective than the previous one because it means that the moment the program
is infected and the CRC changes, the infection will be detected the next time the program is run.
Graphical User Interface
• This project is developed using graphics in java swings. The options available are displayed in a menu
format, like in an online editor.
• Clicking on any particular menu item through mouse or through keyboard a dropdown menu is displayed,
listing all the options available under that menu item and the user can select the needed actions according
to their wish.
RESULTS
Login Screen Driver Connection
Database Connection Login Match
Main Screen File Selection
Key Entering Client Address
Message sent sucssfully
Information
Conclusion
• The challenge of cryptography is developing a system in which it is impossible to determine the key. This is
accomplished the use of a one-way function. With a one-way function, it is relatively easy to compute a
result given some input values.
• To encrypt data, enter the data “plain text” and an encryption to the encryption portion of the algorithm.
To decrypt the “cipher text” a proper decryption key is used at the decryption portion of the algorithm.
• The project work done herewith has given a lot of insight into the working of the Networking-programming
environment. The program written for encryption and decryption using DES Algorithm is tested on several
textual files and results are observed.The program could achieve a better secure transferring of files
between the server and various clients.
Future Enhancement

• The program written could be extended to higher order to achieve a better secure
transferring of files between server and the various clients.
References:

No. TITLE AUTHOR PUBLICATION EDITION


1. THE COMPLETE PATRICK NAUGHTON TATA McGraw 1994
REFERENCE JAVA2 HERBERT SCHILDT HILL

2. JAVA JAWORSICK TECH.MEDIA 1998


CERTIFICATION Publication

3. COMPLETE JAVA 2 ROBERT HELLERS DPB 1998


ERNEST PUBLICATIONS
Thank You

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy