Escolar Documentos
Profissional Documentos
Cultura Documentos
OBJECTIVES
1. The letter size, spacing, typeface, or other characteristics of a cover text can
be manipulated to carry the hidden message.
2. The message is the composition of some character.
3. Halftone watermarking differs from cryptography in the sense that where
cryptography focuses on keeping the contents of a message secret.
4. The strength of Halftone watermarking can thus be amplified by combining
it with cryptography.
5. Halftone watermarking are used to provide the more security and
confidential access.
6. Hiding the image or text.
1. INTRODUCTION
1.1 ABOUT THE PROJECT
In the existing system, messages are hidden using cryptography and other
methods which could be easily decoded if someone have enough hardware and
software resources. Another technique which is based on the information hiding
strategy is digital watermarking. But, in case of digital watermarking, the
important property of information hiding known as resistance to removal is
preferred. So, in these applications, we are not worrying about imperceptibility but
resistance to removal. This is mainly used in commercial applications like
copyright protection of digital forms of media like video or image.
A feasibility study is carried out to select the best system that meets
performance requirements. The main aim of the feasibility study activity is to
determine whether it would be financially and technically feasible to develop the
product. The feasibility study activity involves the analysis of the problem and
collection of all relevant information relating to the product such as the different
data items which would be input to the system, the processing required to be
carried out on these data, the output data required to be produced by the system as
well as various constraints on the behavior of the system.
Economical Feasibility
Technical Feasibility.
Social Feasibility.
ECONOMIC FEASIBILITY
Economic analysis is the most frequently used technique for evaluating the
effectiveness of a proposed system. More commonly known as Cost / Benefit
analysis, the procedure is to determine the benefits and savings that are expected
from a proposed system and compare them with costs. If benefits outweigh costs, a
decision is taken to design and implement the system. Otherwise, further
justification or alternative in the proposed system will have to be made if it is to
have a chance of being approved. This is an outgoing effort that improves in
accuracy at each phase of the system life cycle.
TECHNICAL FEASIBILITY
The social feasibility of its part would determine the proposed project will
be satisfactory for the people or not. This assumption would in general examine the
probability that the project would have to be accepted by the group of people that
are directly affected by the proposed system.The legal feasibility study would
determine whether the proposed project conflicts with legal requirements such as
known Acts, Statutes, or any pending legislation.
SYSTEM REQUIREMENTS
Hardware Requirements:
Software Requirements:
TECHNOLOGY REQUIREMENTS
FRONT END SOFTWARE
FEATURES OF PHP
PHP: Hypertext Preprocessor (the name is a recursive acronym) is a widely used,
general-purpose scripting language that was originally designed for web development to produce
dynamic web pages. For this purpose, PHP code is embedded into the HTML source document
and interpreted by a web server with a PHP processor module, which generates the web page
document. As a general-purpose programming language, PHP code is processed by an interpreter
application in command-line mode performing desired operating system operations and
producing program output on its standard output channel. It may also function as a graphical
application. PHP is available as a processor for most modern web servers and as standalone
interpreter on most operating systems and computing platforms.
PHP was originally created by Rasmus Lerdorf in 1995[1] and has been in continuous
development ever since. The main implementation of PHP is now produced by The PHP Group
and serves as the de facto standard for PHP as there is no formal specification. PHP is free
software released under the PHP License, which is incompatible with the GNU General Public
License (GPL) because restrictions exist regarding the use of the term PHP.
Hypertext refers to files linked together using hyperlinks, such as HTML (HyperText
Markup Language) files. Preprocessing is executing instructions that modify the output. Below is
a demonstration of the difference between HTML and PHP files.
1. Your browser sends a request to that web page's server (computer) for the file (HTML or
image) you wish to view.
2. The web server (computer) sends the file requested back to your computer.
3. Your browser displays the file appropriately.
4. If you request a PHP file (ends with ".php"), the server handles it differently.
1. Your browser sends a request to that web page's server for the PHP file you wish to view.
2. The web server calls PHP to interpret and perform the operations called for in the PHP
script.
3. The web server sends the output of the PHP program back to your computer.
4. Your browser displays the output appropriately.
PHP originally stood for personal home page. Its development began in 1994 when the
Danish/Greenlandic programmer Rasmus Lerdorf initially created a set of Perl scripts he called
'Personal Home Page Tools' to maintain his personal homepage, including tasks such as
displaying his résumé and recording how much traffic his page was receiving. He rewrote these
scripts as C programming language Common Gateway Interface (CGI) binaries, extending them
to add the ability to work with web forms and to communicate with databases and called this
implementation 'Personal Home Page/Forms Interpreter' or PHP/FI. PHP/FI could be used to
build simple, dynamic web applications. Lerdorf released PHP/FI as 'Personal Home Page Tools
(PHP Tools) version 1.0' publicly on June 8, 1995, to accelerate bug location and improve the
code. This release already had the basic functionality that PHP has today. This included Perl-like
variables, form handling, and the ability to embed HTML. The syntax was similar to Perl but
was more limited and simpler, although less consistent. A development team began to form and,
after months of work and beta testing, officially released PHP/FI 2 in November 1997.
A new major version has been under development alongside PHP 5 for several
years. This version was originally planned to be released as PHP 6 as a result of its significant
changes, which included plans for full Unicode support. However, Unicode support took
developers much longer to implement than originally thought, and the decision was made in
March 2010[13] to move the project to a branch, with features still under development moved to
trunk.
Changes in the new code include the removal of register_globals, magic quotes, and
safe mode. The reason for the removals was that register_globals had given way to security
holes, and the use of magic quotes had an unpredictable nature, and was best avoided. Instead, to
escape characters, magic quotes may be replaced with the addslashes() function, or more
appropriately an escape mechanism specific to the database vendor itself like
mysql_real_escape_string() for MySQL. Functions that will be removed in future versions and
have been deprecated in PHP 5.3 will produce a warning if used.
PHP currently does not have native support for Unicode or multibyte strings; Unicode
support is under development for a future version of PHP and will allow strings as well as class,
method, and function names to contain non-ASCII characters.
PHP interpreters are available on both 32-bit and 64-bit operating systems, but on
Microsoft Windows the only official distribution is a 32-bit implementation, requiring Windows
32-bit compatibility mode while using Internet Information Services (IIS) on a 64-bit Windows
platform. As of PHP 5.3.0, experimental 64-bit versions are available for MS Windows.
Security
The PHP interpreter only executes PHP code within its delimiters. Anything outside its
delimiters is not processed by PHP (although non-PHP text is still subject to control structures
described within PHP code). The most common delimiters are <?php to open and ?> to close
PHP sections. <script language="php"> and </script> delimiters are also available, as are the
shortened forms <? or<?= (which is used to echo back a string or variable) and ?> as well as
ASP-style short forms <% or <%= and %>. While short delimiters are used, they make script
files less portable as support for them can be disabled in the PHP configuration, and so they are
discouraged. The purpose of all these delimiters is to separate PHP code from non-PHP code,
including HTML.
The first form of delimiters, <?php and ?>, in XHTML and other XML documents,
creates correctly formed XML 'processing instructions'. This means that the resulting mixture of
PHP code and other markup in the server-side file is itself well-formed XML.
Variables are prefixed with a dollar symbol and a type does not need to be specified in
advance. Unlike function and class names, variable names are case sensitive. Both double-quoted
("") and heredoc strings allow the ability to embed a variable's value into the string. PHP treats
newlines as whitespace in the manner of a free-form language (except when inside string
quotes), and statements are terminated by a semicolon. PHP has three types of comment syntax:
/* */ marks block and inline comments; // as well as # are used for one-line comments. The echo
statement is one of several facilities PHP provides to output text (e.g. to a web browser).
In terms of keywords and language syntax, PHP is similar to most high level languages that
follow the C style syntax. if conditions, for and while loops, and function returns are similar in
syntax to languages such as C, C++, Java and Perl.
FEATURES OF MY SQL
MySQL Introduction
The MySQL® database has become the world's most popular open source database
because of its consistent fast performance, high reliability and ease of use. It's used on every
continent -- Yes, even Antarctica! -- by individual Web developers as well as many of the
world's largest and fastest-growing organizations to save time and money powering their high-
volume Web sites, business-critical systems and packaged software -- including industry leaders
such as Yahoo!, Alcatel-Lucent, Google, Nokia, YouTube, and Zappos.com.
Not only is MySQL the world's most popular open source database, it's also become the
database of choice for a new generation of applications built on the LAMP stack (Linux, Apache,
MySQL, PHP / Perl / Python.) MySQL runs on more than 20 platforms including Linux,
Windows, Mac OS, Solaris, HP-UX, IBM AIX, giving you the kind of flexibility that puts you in
control.
MySQL can be built and installed manually from source code, but this can be tedious so it is
more commonly installed from a binary package unless special customizations are required. On most
Linux distributions the package management system can download and install MySQL with minimal
effort, though further configuration is often required to adjust security and optimization settings.
Though MySQL began as a low-end alternative to more powerful proprietary databases, it has
gradually evolved to support higher-scale needs as well. It is still most commonly used in small to
medium scale single-server deployments, either as a component in a LAMP based web application or as a
standalone database server. Much of MySQL's appeal originates in its relative simplicity and ease of use,
which is enabled by an ecosystem of open source tools such as phpMyAdmin. In the medium range,
MySQL can be scaled by deploying it on more powerful hardware, such as a multi-processor server with
gigabytes of memory.
There are however limits to how far performance can scale on a single server, so on larger
scales, multi-server MySQL deployments are required to provide improved performance and reliability. A
typical high-end configuration can include a powerful master database which handles data write
operations and is replicated to multiple slaves that handle all read operations. The master server
synchronizes continually with its slaves so in the event of failure a slave can be promoted to become the
new master, minimizing downtime. Further improvements in performance can be achieved by caching the
results from database queries in memory using memcached, or breaking down a database into smaller
chunks called shards which can be spread across a number of distributed server clusters.
MYSQL:
MySQL is the world's most used open source relational database management system
(RDBMS) as of 2008 that run as a server providing multi-user access to a number of databases.
The MySQL development project has made its source code available under the terms of
the GNU General Public License, as well as under a variety of proprietary agreements. MySQL
was owned and sponsored by a single for-profit firm, the Swedish company MySQL AB, now
owned by Oracle Corporation.
2. High Performance
A unique storage-engine architecture allows database professionals to configure the
MySQL database server specifically for particular applications, with the end result being
amazing performance results. Whether the intended application is a high-speed transactional
processing system or a high-volume web site that services a billion queries a day, MySQL can
meet the most demanding performance expectations of any system. With high-speed load
utilities, distinctive memory caches, full text indexes, and other performance-enhancing
mechanisms, MySQL offers all the right ammunition for today's critical business systems.
3. High Availability
Rock-solid reliability and constant availability are hallmarks of MySQL, with customers
relying on MySQL to guarantee around-the-clock uptime. MySQL offers a variety of high-
availability options from high-speed master/slave replication configurations, to specialized
Cluster servers offering instant failover, to third party vendors offering unique high-availability
solutions for the MySQL database server.
4. Robust Transactional Support
MySQL offers one of the most powerful transactional database engines on the market.
Features include complete ACID (atomic, consistent, isolated, durable) transaction support,
unlimited row-level locking, distributed transaction capability, and multi-version transaction
support where readers never block writers and vice-versa. Full data integrity is also assured
through server-enforced referential integrity, specialized transaction isolation levels, and instant
deadlock detection.
5. Web and Data Warehouse Strengths
MySQL is the de-facto standard for high-traffic web sites because of its high-
performance query engine, tremendously fast data insert capability, and strong support for
specialized web functions like fast full text searches. These same strengths also apply to data
warehousing environments where MySQL scales up into the terabyte range for either single
servers or scale-out architectures. Other features like main memory tables, B-tree and hash
indexes, and compressed archive tables that reduce storage requirements by up to eighty-percent
make MySQL a strong standout for both web and business intelligence applications.
6. Strong Data Protection
Because guarding the data assets of corporations is the number one job of database
professionals, MySQL offers exceptional security features that ensure absolute data protection.
In terms of database authentication, MySQL provides powerful mechanisms for ensuring only
authorized users have entry to the database server, with the ability to block users down to the
client machine level being possible. SSH and SSL support are also provided to ensure safe and
secure connections. A granular object privilege framework is present so that users only see the
data they should, and powerful data encryption and decryption functions ensure that sensitive
data is protected from unauthorized viewing. Finally, backup and recovery utilities provided
through MySQL and third party software vendors allow for complete logical and physical
backup as well as full and point-in-time recovery.
7. Comprehensive Application Development
One of the reasons MySQL is the world's most popular open source database is that it
provides comprehensive support for every application development need. Within the database,
support can be found for stored procedures, triggers, functions, views, cursors, ANSI-standard
SQL, and more. For embedded applications, plug-in libraries are available to embed MySQL
database support into nearly any application. MySQL also provides connectors and drivers
(ODBC, JDBC, etc.) that allow all forms of applications to make use of MySQL as a preferred
data management server. It doesn't matter if it's PHP, Perl, Java, Visual Basic, or .NET, MySQL
offers application developers everything they need to be successful in building database-driven
information systems.
8. Management Ease
MySQL offers exceptional quick-start capability with the average time from software
download to installation completion being less than fifteen minutes. This rule holds true whether
the platform is Microsoft Windows, Linux, Macintosh, or UNIX. Once installed, self-
management features like automatic space expansion, auto-restart, and dynamic configuration
changes take much of the burden off already overworked database administrators. MySQL also
provides a complete suite of graphical management and migration tools that allow a DBA to
manage, troubleshoot, and control the operation of many MySQL servers from a single
workstation. Many third party software vendor tools are also available for MySQL that handle
tasks ranging from data design and ETL, to complete database administration, job management,
and performance monitoring.
3.4 PRELIMINARY PRODUCT DESCRIPTION
This project uses software tools such as operation system, the compiler,
testing tools and library are necessary tools to compile, link and install the software
that are specified.
The objective of the system is all the facilities to fulfill the drawbacks found
in the existing system. Here there is not at all any kind of paper work to be done to
maintain the record details of the users.
Home
Load Encode
Save
Decode Load
UML DIAGRAM:
Class Notation:
UML class is represented by the diagram shown below. The diagram is divided
into four parts.
Object Notation:
The object is represented in the same way as the class. The only difference is
the name which is underlined as shown below.
Collaboration Notation:
Use case is represented as an eclipse with a name inside it. It may contain
additional responsibilities.
Actor Notation:
An actor can be defined as some internal or external entity that interacts with the
system.
Actor is used in a use case diagram to describe the internal or external entities.
USECASE DIAGRAMS
Destination
Source
Hide the image or text
Extracting
Image or Encryption Image
text
Source Destination
Upload
image
Hiding the
image
4. SYSTEM DESIGN
4.1 BASIC MODULE
o Identify Authentication
o Encoding
o Key Generation
o Calculate PSNR Value
o Decoding
MODULE DESCRIPTION:
IDENTIFY AUTHENTICATION
ENCODING
In this module, users can load a bitmap image in to the application and can
encode a message along with a secret code in to the digital image and the user can
save the encoded image and can send to any one through email and other means.
KEY GENERATION
DECODING
In this module, users who have access to the Image Halftone watermarking
application and the secret key used during encoding can load the encoded image
and decode it using the secret key to obtain the message hidden during the
encoding module.
The most creative and challenging face of the system development is low
level design. If provides the understanding and procedural detail nessary for
implementing the system recommended in the feasibility study. Design goes
through the logical and physical stages of development . In designing a new
system, analysis must have a clear understanding of the objectives, which the
design is aiming to fulfill.
INPUT DESIGN
This section is a description of the input media used by the operator for
providing information to the system; show a mapping to the high-level data flows
For example, data entry screens, optical character readers, bar scanners, etc. If
appropriate, the input record types, file structures, and database structures
provided in Section 3, File and Database Design, may be referenced. Include data
element definitions, or refer to the data dictionary.
Provide the layout of all input data screens or graphical user interfaces
(GUTs) (for example, windows). Provide a graphic representation of each
interface. Define all data elements associated with each screen or GUI, or
reference the data dictionary.
This section should contain edit criteria for the data elements, including
specific values, range of values, mandatory/optional, alphanumeric values, and
length. Also address data entry controls to prevent edit bypassing.
Discuss the miscellaneous messages associated with operator inputs, including the
following:
Copies of form(s) if the input data are keyed or scanned for data entry from
printed forms
Description of any access restrictions or security considerations
Each transaction name, code, and definition, if the system is a transaction-based
processing system
OUTPUT DESIGN
Identification of codes and names for reports and data display screens
Description of report and screen contents (provide a graphic representation of
each layout and define all data elements associated with the layout or reference
the data dictionary).
1. Unit testing
2. System testing
3. Integration testing
4. Acceptance testing
5. Software testing
6. Integration testing
7. Validation testing
8. Recovery testing
9. Security testing
UNIT TESTING
Unit testing is performed prior to integration of the unit into a larger system.
It is like
A program unit must be tested for Functional tests, Performance tests, Stress
tests and Structure tests.
Functional tests refer to executing the code with standard inputs, for which
the results will occur within the expected boundaries. Performance test determines
the execution time spent in various parts of the unit, response time, device
utilization and throughput. Performance testing will help the tuning of the system.
Stress tests drive the system to its limits. They are designed to intentionally
break the unit. Structure tests verify logical execution along different execution
paths. Functional, performance and stress tests are collectively known as “Black
box testing”. Structure testing is referred to as “White box” or “glass box” testing.
Program errors can be classified as missing path errors, computational errors and
domain errors.Even if it looks like all possible execution paths have been tested,
there might still exist some more paths. A missing path error occurs, when a
branching statement and the associated computations are accidentally omitted.
Missing paths can be detected only by functional specifications. A domain error
occurs when a program traverses the wrong path because of an incorrect predicate
in a branching statement. When a test case fails to detect a computational error
there is said to be a coincidental error.
DEBUGGING
1. Collect all the information about test details and test results
2. Look for patterns
3. Form one or more hypotheses and rank /classify them.
4. Prove/disprove hypotheses. Re examine
5. Implement appropriate corrections
6. Verify the corrections. Re run the system and test again until
satisfactory
Debugging by deduction involves the following steps:
SYSTEM TESTING
INTEGRATION TESTING
Top-down integration starts with the main routine and one or two
immediately next lower level routines. After a thorough checking the top level
becomes a test harness to its immediate subordinate routines. Top-down
integration offers the following advantages.
ACCEPTANCE TESTING
SOFTWARE TESTING
TESTING OBJECTIVES
INTEGRATION TESTING
An overall test plan for the project is prepared before the start of coding.
VALIDATION TESTING
This project will be tested under this testing using sample data and produce
the correct sample output.
RECOVERY TESTING
This project will be tested under this testing using correct data input and its
product and the correct valid output without any errors.
SECURITY TESTING
6. SCREEN SHOT
7. CONCLUSION
REFERENCE
BOOK REFERENCE
WEBSITE REFERENCE
• http://www.vhsoft.com/products/vhtender.htm
http://www.bloochip.com/website/site/products/tender_management_sys
tem/home.htm
• http://www.c1india.com/solutions/tender.html