Beruflich Dokumente
Kultur Dokumente
INTRODUCTION
Multimedia data embedding refers to the process of inserting information
bearing messages into a digital host medium without -ideally- introducing
perceptible distortion to the host. The eld currently enjoys increased research
interest due to the rapid growth of commercial as well as national security related
activity. Applications of data embedding range from annotation, copyright
marking, and watermarking, to single stream media merging (text, audio, image)
and covert or secure communications.
ABSTRACT
We investigate the problem of embedding data in raw video sequences with
minimum video mean-square distortion for any required data recovery error rate.
In particular, for any given video frame sequence and any (block) transform
domain of interest, we find the optimal carrier and scalar parametrized linear
operator on the video data that maximize the output signal to-interference-plusnoise ratio (SINR) of the maximum-SINR data receiver filter or, equivalently,
minimize the average embedding distortion for any target message extraction error
rate. The procedure is extended from single-carrier to multi-carrier (multiple
messages) embedding. As a practical consideration, a sub-optimal computationally
efficient embedding algorithm is also proposed. Extensive experimental results
demonstrate that sub-optimal embedding as described has video distortion versus
data extraction error rate performance comparable to optimal embedding. Our
studies also demonstrate the robustness of the optimal (and sub-optimal)
embedding schemes to H.264 compliant encoding.
PROBLEM ANALYSIS
The hiding process such as least significant bit(LSB)replacement, is done in special
domain, while transform domain methods; hide data in another domain such as wavelet domain.
Least significant bit (LSB) is the simplest form of Steganography. LSB is based on inserting data
in the least significant bit of pixels, which lead to a slight change on the cover image that is not
noticeable to human eye.
PROBLEM STATEMENT
EXISTING SYSTEM
In the Existing System, only text is embedded in image and generated new
image. Image is not encrypted, so that hacker can steal the information inside the
image. Information authenticity and dependability are not ensured. The control of
access to information has become tighter, when access is given; it is still difficult to
guarantee that the information concerning a particular patient remains gathered in
one place.
PROPOSED SYSTEM
In the Proposed System for information protection Even though most of the
work on Embedding has concerned images in order to verify image integrity or
improve confidentiality, Embedding also provides a new way to share data. Data or
text file is encrypted using secret key with AES algorithm. Watermarking can be
used to provide proof of the authenticity of any data or file that is to say that the
information belongs to video. Proposed system includes the following features,
Algorithm Used:
The Data Encryption Standard (DES) specifies two FIPS approved
cryptographic algorithms as required by FIPS 140-1. When used in conjunction
with American National Standards Institute (ANSI) X9.52 standard, this
publication provides a complete description of the mathematical algorithms for
encrypting (enciphering) and decrypting (deciphering) binary coded information.
Encrypting data converts it to an unintelligible form called cipher. Decrypting
cipher converts the data back to its original form called plaintext. The algorithms
described in this standard specifies both enciphering and deciphering operations
which are based on a binary number called a key.
A DES key consists of 64 binary digits ("0"s or "1"s) of which 56 bits are
randomly generated and used directly by the algorithm. The other 8 bits, which are
not used by the algorithm, may be used for error detection. The 8 error detecting
bits are set to make the parity of each 8-bit byte of the key odd, i.e., there is an odd
number of "1"s in each 8-bit byte1. A TDEA key consists of three DES keys, which
is also referred to as a key bundle. Authorized users of encrypted computer data
must have the key that was used to encipher the data in order to decrypt it. The
encryption algorithms specified in this standard are commonly known among those
using the standard. The cryptographic security of the data depends on the security
provided for the key used to encipher and decipher the data.
Advantages
Faster and efficient Encryption and Decryption from the visual data.
Applicability:
This standard may be used by Federal departments and agencies when the
following conditions apply:
1. An authorized official or manager responsible for data security or the
security of any computer system decides that cryptographic protection is required;
TESTING
Types of testing done
The development process involves various types of testing. Each test type addresses a
specific testing requirement. The most common types of testing involved in the development
process are:
Unit Test
System test
Integration test
Function Test
Unit testing
The first test in the development process is the unit test. The source code is normally
divided into modules, which in turn are divided into smaller units called units. These units have
specific behavior. The test done on these units of code is called unit test. Unit test depends upon
the language on which the project is developed. Unit tests ensure that each unique path of the
project performs accurately to the documented specifications and contains clearly defined inputs
and expected results. Functional and reliability testing in an Engineering environment.Producing
tests for the behavior of components (nodes and vertices) of a product to ensure their correct
behavior prior to system integration.
System testing
Several modules constitute a project. If the project is long-term project, several
developers write the modules. Once all the modules are integrated, several errors may arise. The
testing done at this stage is called system test. System testing ensures that the entire integrated
software system meets requirements. It tests a configuration to ensure known and predictable
results. System testing is based on process descriptions and flows, emphasizing pre-driven
process links and integration points. Testing a specific hardware/software installation. This is
typically performed on a COTS (commercial off the shelf) system or any other system comprised
of disparate parts where custom configurations and/or unique installations are the norm.
Functional testing
Functional test can be defined as testing two or more modules together with the intent of
finding defects, demonstrating that defects are not present, verifying that the module performs its
intended functions as stated in the specification and establishing confidence that a program does
what it is supposed to do.
Integration testing
Testing in which modules are combined and tested as a group. Modules are typically code
modules, individual applications, source and destination applications on a network, etc.
Integration Testing follows unit testing and precedes system testing. Testing after the product is
code complete. Betas are often widely distributed or even distributed to the public at large in
hopes that they will buy the final product when it is released.
Verification Testing
To ensure that the product is being built according to the requirements and design
specifications. In other words, to ensure that work products meet their specified requirements.
Validation Testing
To ensure that the product actually meets the users needs, and that the specifications
were correct in the first place. In other words, to demonstrate that the product fulfills its intended
use when placed in its intended environment.
MODULES
User Interface Design
Hybrid protocol implementation
File Embedding
File Retrieving
Message embedding in Image
Message retrieving in Image
MODULE DESCRIPTION
User Interface Design
User login module is used to check the user is valid or not. Username and
password given by the user are validated against the records in the database .On
success the authorized users are allowed to carry out further actions. Invalid users
are restricted.
respective video. In this module we can also embed the message to the particular
video. We have to select the message to be embedded. And also select the video to
be embedded with the message. By performing the above process we can easily
provide the watermarked document by hiding the particular message to the
respective video.
File Retrieving
In this module we retrieve the message or message document from the
watermarked document. Now we select the watermarked document and the
respective keys. And hence we retrieve our message document from our encrypted
watermarked document.
Message embedding in Image
Digital images are often printed and scanned again, for example when they
are used in magazines and readers want to store digitally. When used as web site
illustrations, they are often compressed by loss compression algorithms like JPEG.
Common processing operations include softening, sharpening, DE noising, scaling,
cropping and color corrections. A number of benchmarking suits address image
watermarking robustness evaluation, Stir mark, Checkmark and Certimark are well
known examples.
Message retrieving in Image
A secret message is used to generate the VI for the image and watermark
combination. The secret message is one share of visual cryptography and VI is the
other share. Both these shares are required to extract the watermark pattern from a
suspect image that can be visually examined. Thus, rather than embedding any
information into the image, information is extracted from the image by applying
the principles of visual cryptography. This extracted information is used to verify
the copyright of the image.
Selection
Data File
DES algorithm
Encryption
Encrypted
Embedding
document
Video File
Embedded
Data file
Embedding
document
USECASE DIAGRAM
Architecture
ER-DIAGRAM
Video File
Encrypt
Hide
Image File
Password
Text
PDF File
Hardware requirements
Processor
RAM
2 GB (min)
Hard Disk
100 GB (min)
Input device
Output device
Operating System
Front End
C# .Net
Database
IDE
Software requirements
SOFTWARE DESCRIPTION
Security.
Robustness.
Productivity.
Performance.
SECURITY:
The runtime enforces code access security. The security features of the runtime thus
enable legitimate Internet-deployed software to be exceptionally feature rich. With regards to
security, managed components are awarded varying degrees of trust, depending on a number of
factors that include their origin to perform file-access operations, registry-access operations, or
other sensitive functions.
ROBUSTNESS:
The runtime also enforces code robustness by implementing a strict type- and codeverification infrastructure called the common type system(CTS). The CTS ensures that all
managed code is self-describing. The managed environment of the runtime eliminates many
common software issues.
PRODUCTIVITY:
The runtime also accelerates developer productivity. For example, programmers can write
applications in their development language of choice, yet take full advantage of the runtime, the
class library, and components written in other languages by other developers.
PERFORMANCE:
The runtime is designed to enhance performance. Although the common language
runtime provides many standard runtime services, managed code is never interpreted. A feature
called just-in-time (JIT) compiling enables all managed code to run in the native machine
language of the system on which it is executing. Finally, the runtime can be hosted by highperformance, server-side applications, such as Microsoft SQL Server and Internet
Information Services (IIS).
ASP.NET
ASP.NET is the next version of Active Server Pages (ASP); it is a unified Web
development platform that provides the services necessary for developers to build enterpriseclass Web applications. While ASP.NET is largely syntax compatible, it also provides a new
programming model and infrastructure for more secure, scalable, and stable applications.
ASP.NET is a compiled, NET-based environment, we can author applications in any
.NET compatible language, including Visual Basic .NET, C#, and JScript .NET. Additionally, the
entire .NET Framework is available to any ASP.NET application. Developers can easily access
the benefits of these technologies, which include the managed common language runtime
environment (CLR), type safety, inheritance, and so on.
ASP.NET has been designed to work seamlessly with WYSIWYG HTML editors and
other programming tools, including Microsoft Visual Studio .NET. Not only does this make Web
development easier, but it also provides all the benefits that these tools have to offer, including a
GUI that developers can use to drop server controls onto a Web page and fully integrated
debugging support.
Developers can choose from the following two features when creating an ASP.NET
application. Web Forms and Web services, or combine these in any way they see fit. Each is
supported by the same infrastructure that allows you to use authentication schemes; cache
frequently used data, or customizes your application's configuration, to name only a few
possibilities.
An XML Web service provides the means to access server functionality remotely. Using
Web services, businesses can expose programmatic interfaces to their data or business logic,
which in turn can be obtained and manipulated by client and server applications. XML Web
services enable the exchange of data in client-server or server-server scenarios, using standards
like HTTP and XML messaging to move data across firewalls. XML Web services are not tied to
a particular component technology or object-calling convention. As a result, programs written in
any language, using any component model, and running on any operating system can access
XML Web services.
Each of these models can take full advantage of all ASP.NET features, as well as the
power of the .NET Framework and .NET Framework common language runtime.
Accessing databases from ASP.NET applications is an often-used technique for
displaying data to Web site visitors. ASP.NET makes it easier than ever to access databases for
this purpose. It also allows us to manage the database from your code.
ASP.NET provides a simple model that enables Web developers to write logic that runs at
the application level. Developers can write this code in the global.aspx text file or in a compiled
class deployed as an assembly. This logic can include application-level events, but developers
can easily extend this model to suit the needs of their Web application.
ASP.NET provides easy-to-use application and session-state facilities that are familiar to
ASP developers and are readily compatible with all other .NET Framework APIs.
ASP.NET configuration settings are stored in XML-based files, which are human
readable and writable. Each of our applications can have a distinct configuration file and we can
extend the configuration scheme to suit our requirements.
Interoperability
Maintainability
Programmability
Performance Scalability
INTEROPERABILITY:
ADO.NET applications can take advantage of the flexibility and broad acceptance of
XML. Because XML is the format for transmitting datasets across the network, any component
that can read the XML format can process data. The receiving component need not be an
ADO.NET component.
The transmitting component can simply transmit the dataset to its destination without
regard to how the receiving component is implemented. The destination component might be a
Visual Studio application or any other application implemented with any tool whatsoever.
The only requirement is that the receiving component be able to read XML. SO, XML
was designed with exactly this kind of interoperability in mind.
MAINTAINABILITY:
In the life of a deployed system, modest changes are possible, but substantial,
Architectural changes are rarely attempted because they are so difficult. As the performance load
on a deployed application server grows, system resources can become scarce and response time
or throughput can suffer. Faced with this problem, software architects can choose to divide the
server's business-logic processing and user-interface processing onto separate tiers on separate
machines.
In effect, the application server tier is replaced with two tiers, alleviating the shortage of
system resources. If the original application is implemented in ADO.NET using datasets, this
transformation is made easier.
ADO.NET data components in Visual Studio encapsulate data access functionality in
various ways that help you program more quickly and with fewer mistakes.
PERFORMANCE:
ADO.NET datasets offer performance advantages over ADO disconnected record sets. In
ADO.NET data-type conversion is not necessary.
SCALABILITY:
ADO.NET accommodates scalability by encouraging programmers to conserve limited
resources. Any ADO.NET application employs disconnected access to data; it does not retain
database locks or active database connections for long durations.
Visual Studio supports the .NET Framework, which provides a common language
runtime and unified programming classes; ASP.NET uses these components to create ASP Web
applications and XML Web services. Also it includes MSDN Library, which contains all the
documentation for these development tools.
XML SUPPORT:
Extensible Markup Language (XML) provides a method for describing structured data.
XML is a subset of SGML that is optimized for delivery over the Web. The World Wide Web
Consortium (W3C) defines XML standards so that structured data will be uniform and
independent of applications. Visual Studio .NET fully supports XML, providing the XML
Designer to make it easier to edit XML and create XML schemas.
IMPLEMENTATION INHERITANCE:
Visual Basic.NET supports implementation inheritance. This means that, while creating
applications in Visual Basic.NET, we can drive from another class, which is know as the base
class that derived class inherits all the methods and properties of the base class. In the derived
class, we can either use the existing code of the base class or override the existing code.
Therefore, with help of the implementation inheritance, code can be reused.
GARBAGE COLLECTION:
Garbage Collection is another new feature in Visual Basic.NET. The .NET Framework
monitors allocated resources, such as objects and variables. In addition, the .NET Framework
automatically releases memory for reuse by destroying objects that are no longer in use. In
Visual Basic.NET, the garbage collector checks for the objects that are not currently in use by
applications. When the garbage collector comes across an object that is marked for garbage
collection, it releases the memory occupied by the object.
OVERLOADING:
MULTITHREADING:
Visual Basic.NET also supports multithreading. An application that supports
multithreading can handle multiple tasks simultaneously, we can use multithreading to decrease
the time taken by an application to respond to user interaction. To decrease the time taken by an
application to respond to user interaction, we must ensure that a separate thread in the application
handles user interaction.
3. FORM
4. REPORT
5. MACRO
TABLE:
A database is a collection of data about a specific topic.
VIEWS OF TABLE:
We can work with a table in two types,
1. Design View
2. Datasheet View
Design View
To build or modify the structure of a table we work in the table design view. We can
specify what kind of data will be hold.
Datasheet View
To add, edit or analyses the data itself we work in tables datasheet view mode.
QUERY:
A query is a question that has to be asked the data. Access gathers data that answers the
question from one or more table. The data that make up the answer is either dynaset (if you edit
it) or a snapshot(it cannot be edited).Each time we run query, we get latest information in the
dynaset.Access either displays the dynaset or snapshot for us to view or perform an action on it
,such as deleting or updating.
FORMS:
A form is used to view and edit information in the database record by record .A form
displays only the information we want to see in the way we want to see it. Forms use the familiar
controls such as textboxes and checkboxes. This makes viewing and entering data easy.
Views of Form:
We can work with forms in several primarily there are two views,
They are,
1. Design View
2. Form View
Design View
To build or modify the structure of a form, we work in forms design view. We can add
control to the form that are bound to fields in a table or query, includes textboxes, option buttons,
graphs and pictures.
Form View
The form view which display the whole design of the form.
REPORT:
A report is used to vies and print information from the database. The report can ground
records into many levels and compute totals and average by checking values from many records
at once. Also the report is attractive and distinctive because we have control over the size and
appearance of it.
MACRO:
A macro is a set of actions. Each action in macros does something. Such as opening a
form or printing a report .We write macros to automate the common tasks the work easy and save
the time.
MODULE:
Modules are units of code written in access basic language. We can write and use module
to automate and customize the database in very sophisticated ways.