SlideShare a Scribd company logo
1 of 2
Download to read offline
CreativeSoft (Corporate Office)
# 412, Annpurna Block, Aditya Enclave, Ameerpet, Hyderabad – 500016
Tel: +91-40-40159158
Mobile: 91-9247249455
Secured Data Transmission
ABSTRACT
Secured Data Transmission through Network handles hiding a secret message with in an image in such a
way that others cannot discern the presence or contents of the hidden message. A message might be
hidden within an image by changing Least Significant Bit to be the message bits. Then the image can be
transmitted through Network. LSB based Stenography is perhaps the most simple and straight forward
approach. In this project we embed the message in to the least significant bit planes of the image. Since
this will only affect each pixel by +/- 1, if at all, it is generally assumed with good reason that
degradation caused by this embedding process would perceptually transparent. Hence there are a
number of LSB based steganography techniques in the passive warden model as it difficult to
differentiate cover-images from steno images, given the small changes that have been made.
Module Description:
There is 1 module in this Secured Data Transmission over the Network. They are:
1. User
User Module
The functionalities of the User module are:
1. A user runs application.
2. User selects data to process.
3. Application processes the data Encrypt or Decrypt data.
User sends or receives data securely
Software Requirements
A set of programs associated with the operation of a computer is called software. Software is the part of
the computer system which enables the user to interact with several physical hardware devices.
CreativeSoft (Corporate Office)
# 412, Annpurna Block, Aditya Enclave, Ameerpet, Hyderabad – 500016
Tel: +91-40-40159158
Mobile: 91-9247249455
The minimum software requirement specifications for developing this project are as follows:
Operating System : Window 2000, XP
Presentation layer : Java awt, Swings, java.net;
Presentation : Power Point 2003
Documentation Tool : Ms Office / GoBe Productive
Hardware Requirement Specification
The Collection of internal electronic circuits and external physical devices used in building a computer is
called Hardware.
The minimum hardware requirement specification for developing this project is as follows:
Processor : Pentium IV
RAM : 512MB RAM
Hard Disk : 10GB
Monitor : Standard Color Monitor
Keyboard : Standard Keyboard
Mouse : Standard Mouse

More Related Content

What's hot

What's hot (12)

gaurav_shitole_profile
gaurav_shitole_profilegaurav_shitole_profile
gaurav_shitole_profile
 
Sudhakar Resume
Sudhakar ResumeSudhakar Resume
Sudhakar Resume
 
Ankit Nair (1)
Ankit Nair (1)Ankit Nair (1)
Ankit Nair (1)
 
sandilya
sandilyasandilya
sandilya
 
Network Engineer CV
Network Engineer CVNetwork Engineer CV
Network Engineer CV
 
Manjesh cv
Manjesh cvManjesh cv
Manjesh cv
 
Yawer Hussain Hameedi V3.11
Yawer Hussain Hameedi V3.11Yawer Hussain Hameedi V3.11
Yawer Hussain Hameedi V3.11
 
Mohammad Shaltaf Cv
Mohammad Shaltaf CvMohammad Shaltaf Cv
Mohammad Shaltaf Cv
 
Hemanta Kumar
Hemanta KumarHemanta Kumar
Hemanta Kumar
 
Shahid Resume
Shahid ResumeShahid Resume
Shahid Resume
 
Ankit chandelkar resume
Ankit chandelkar resumeAnkit chandelkar resume
Ankit chandelkar resume
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reports
 

Similar to Secured data transmission Abstract 2017

Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingIRJET Journal
 
Resume_Appaji
Resume_AppajiResume_Appaji
Resume_AppajiAppaji K
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET Journal
 
Remotely Scanning Organization’s Internal Network
Remotely Scanning Organization’s Internal NetworkRemotely Scanning Organization’s Internal Network
Remotely Scanning Organization’s Internal Networkijtsrd
 
Sample PPT Format.pptx E-commerce website for login
Sample PPT Format.pptx E-commerce website for loginSample PPT Format.pptx E-commerce website for login
Sample PPT Format.pptx E-commerce website for loginnaveendurga557
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Editor IJARCET
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Editor IJARCET
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
 
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET Journal
 
Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18Zscaler
 
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 AlgorithmIRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 AlgorithmIRJET Journal
 
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...IRJET Journal
 
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud StorageAttribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud StorageIJSRD
 
Location Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data SecurityLocation Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data SecurityEditor IJCATR
 
Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...IOSR Journals
 
Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...IOSR Journals
 
Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Jishnu Pradeep
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYIRJET Journal
 
A securing symmetric key distribution
A securing symmetric key distributionA securing symmetric key distribution
A securing symmetric key distributionvinothp2k
 

Similar to Secured data transmission Abstract 2017 (20)

Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
 
Resume_Appaji
Resume_AppajiResume_Appaji
Resume_Appaji
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
 
Remotely Scanning Organization’s Internal Network
Remotely Scanning Organization’s Internal NetworkRemotely Scanning Organization’s Internal Network
Remotely Scanning Organization’s Internal Network
 
Sample PPT Format.pptx E-commerce website for login
Sample PPT Format.pptx E-commerce website for loginSample PPT Format.pptx E-commerce website for login
Sample PPT Format.pptx E-commerce website for login
 
Rohan resume
Rohan resumeRohan resume
Rohan resume
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share Images
 
Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18
 
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 AlgorithmIRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
 
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
 
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud StorageAttribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
 
Location Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data SecurityLocation Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data Security
 
Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...
 
Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...
 
Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
 
A securing symmetric key distribution
A securing symmetric key distributionA securing symmetric key distribution
A securing symmetric key distribution
 

More from ioshean

Resource Pool Abstract 2017
Resource Pool Abstract 2017 Resource Pool Abstract 2017
Resource Pool Abstract 2017 ioshean
 
Resource out Sourcing Abstract 2017
Resource out Sourcing Abstract 2017Resource out Sourcing Abstract 2017
Resource out Sourcing Abstract 2017ioshean
 
Property Management System Abstract 2017
Property Management System Abstract 2017Property Management System Abstract 2017
Property Management System Abstract 2017ioshean
 
Pesticides Information System Abstract 2017
Pesticides Information System Abstract 2017Pesticides Information System Abstract 2017
Pesticides Information System Abstract 2017ioshean
 
order processing system for student music store Abstract 2107
order processing system for student music store Abstract 2107order processing system for student music store Abstract 2107
order processing system for student music store Abstract 2107ioshean
 
webs eye Abstract 2107
 webs eye Abstract 2107 webs eye Abstract 2107
webs eye Abstract 2107ioshean
 
Online Examination abstract 2017
Online Examination abstract 2017Online Examination abstract 2017
Online Examination abstract 2017ioshean
 
Multi Sensor Railway Track Geometry surveying system Abstract 2107
Multi Sensor Railway Track Geometry surveying system Abstract 2107Multi Sensor Railway Track Geometry surveying system Abstract 2107
Multi Sensor Railway Track Geometry surveying system Abstract 2107ioshean
 
Get Your Campus Abstract 2017
 Get Your Campus Abstract 2017 Get Your Campus Abstract 2017
Get Your Campus Abstract 2017ioshean
 
Faq o-Matic system Abstract 2017
Faq o-Matic system Abstract 2017Faq o-Matic system Abstract 2017
Faq o-Matic system Abstract 2017ioshean
 
Hostel Management Information system Abstract 2017
Hostel Management Information system Abstract 2017Hostel Management Information system Abstract 2017
Hostel Management Information system Abstract 2017ioshean
 
Hospital Management System Abstract 2017
Hospital Management System Abstract 2017Hospital Management System Abstract 2017
Hospital Management System Abstract 2017ioshean
 
Employee Transaction Scenario Abstract 2017
Employee Transaction Scenario Abstract 2017Employee Transaction Scenario Abstract 2017
Employee Transaction Scenario Abstract 2017ioshean
 
Face Identification Project Abstract 2017
Face Identification Project Abstract 2017Face Identification Project Abstract 2017
Face Identification Project Abstract 2017ioshean
 
Distribution Business Automation system Abstract 2017
Distribution Business Automation system Abstract 2017Distribution Business Automation system Abstract 2017
Distribution Business Automation system Abstract 2017ioshean
 
Distributed DBA Abstract 2017
 Distributed  DBA  Abstract 2017 Distributed  DBA  Abstract 2017
Distributed DBA Abstract 2017ioshean
 
DHL Courier System Abstract 2017
DHL Courier System Abstract 2017DHL Courier System Abstract 2017
DHL Courier System Abstract 2017ioshean
 
Event Tracker Abstract 2017
 Event Tracker Abstract 2017 Event Tracker Abstract 2017
Event Tracker Abstract 2017ioshean
 
Cyber shopping Abstract 2017
Cyber shopping Abstract 2017Cyber shopping Abstract 2017
Cyber shopping Abstract 2017ioshean
 
Business Process Outsourcing Abstract 2017
Business Process Outsourcing Abstract 2017Business Process Outsourcing Abstract 2017
Business Process Outsourcing Abstract 2017ioshean
 

More from ioshean (20)

Resource Pool Abstract 2017
Resource Pool Abstract 2017 Resource Pool Abstract 2017
Resource Pool Abstract 2017
 
Resource out Sourcing Abstract 2017
Resource out Sourcing Abstract 2017Resource out Sourcing Abstract 2017
Resource out Sourcing Abstract 2017
 
Property Management System Abstract 2017
Property Management System Abstract 2017Property Management System Abstract 2017
Property Management System Abstract 2017
 
Pesticides Information System Abstract 2017
Pesticides Information System Abstract 2017Pesticides Information System Abstract 2017
Pesticides Information System Abstract 2017
 
order processing system for student music store Abstract 2107
order processing system for student music store Abstract 2107order processing system for student music store Abstract 2107
order processing system for student music store Abstract 2107
 
webs eye Abstract 2107
 webs eye Abstract 2107 webs eye Abstract 2107
webs eye Abstract 2107
 
Online Examination abstract 2017
Online Examination abstract 2017Online Examination abstract 2017
Online Examination abstract 2017
 
Multi Sensor Railway Track Geometry surveying system Abstract 2107
Multi Sensor Railway Track Geometry surveying system Abstract 2107Multi Sensor Railway Track Geometry surveying system Abstract 2107
Multi Sensor Railway Track Geometry surveying system Abstract 2107
 
Get Your Campus Abstract 2017
 Get Your Campus Abstract 2017 Get Your Campus Abstract 2017
Get Your Campus Abstract 2017
 
Faq o-Matic system Abstract 2017
Faq o-Matic system Abstract 2017Faq o-Matic system Abstract 2017
Faq o-Matic system Abstract 2017
 
Hostel Management Information system Abstract 2017
Hostel Management Information system Abstract 2017Hostel Management Information system Abstract 2017
Hostel Management Information system Abstract 2017
 
Hospital Management System Abstract 2017
Hospital Management System Abstract 2017Hospital Management System Abstract 2017
Hospital Management System Abstract 2017
 
Employee Transaction Scenario Abstract 2017
Employee Transaction Scenario Abstract 2017Employee Transaction Scenario Abstract 2017
Employee Transaction Scenario Abstract 2017
 
Face Identification Project Abstract 2017
Face Identification Project Abstract 2017Face Identification Project Abstract 2017
Face Identification Project Abstract 2017
 
Distribution Business Automation system Abstract 2017
Distribution Business Automation system Abstract 2017Distribution Business Automation system Abstract 2017
Distribution Business Automation system Abstract 2017
 
Distributed DBA Abstract 2017
 Distributed  DBA  Abstract 2017 Distributed  DBA  Abstract 2017
Distributed DBA Abstract 2017
 
DHL Courier System Abstract 2017
DHL Courier System Abstract 2017DHL Courier System Abstract 2017
DHL Courier System Abstract 2017
 
Event Tracker Abstract 2017
 Event Tracker Abstract 2017 Event Tracker Abstract 2017
Event Tracker Abstract 2017
 
Cyber shopping Abstract 2017
Cyber shopping Abstract 2017Cyber shopping Abstract 2017
Cyber shopping Abstract 2017
 
Business Process Outsourcing Abstract 2017
Business Process Outsourcing Abstract 2017Business Process Outsourcing Abstract 2017
Business Process Outsourcing Abstract 2017
 

Recently uploaded

General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 

Recently uploaded (20)

General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 

Secured data transmission Abstract 2017

  • 1. CreativeSoft (Corporate Office) # 412, Annpurna Block, Aditya Enclave, Ameerpet, Hyderabad – 500016 Tel: +91-40-40159158 Mobile: 91-9247249455 Secured Data Transmission ABSTRACT Secured Data Transmission through Network handles hiding a secret message with in an image in such a way that others cannot discern the presence or contents of the hidden message. A message might be hidden within an image by changing Least Significant Bit to be the message bits. Then the image can be transmitted through Network. LSB based Stenography is perhaps the most simple and straight forward approach. In this project we embed the message in to the least significant bit planes of the image. Since this will only affect each pixel by +/- 1, if at all, it is generally assumed with good reason that degradation caused by this embedding process would perceptually transparent. Hence there are a number of LSB based steganography techniques in the passive warden model as it difficult to differentiate cover-images from steno images, given the small changes that have been made. Module Description: There is 1 module in this Secured Data Transmission over the Network. They are: 1. User User Module The functionalities of the User module are: 1. A user runs application. 2. User selects data to process. 3. Application processes the data Encrypt or Decrypt data. User sends or receives data securely Software Requirements A set of programs associated with the operation of a computer is called software. Software is the part of the computer system which enables the user to interact with several physical hardware devices.
  • 2. CreativeSoft (Corporate Office) # 412, Annpurna Block, Aditya Enclave, Ameerpet, Hyderabad – 500016 Tel: +91-40-40159158 Mobile: 91-9247249455 The minimum software requirement specifications for developing this project are as follows: Operating System : Window 2000, XP Presentation layer : Java awt, Swings, java.net; Presentation : Power Point 2003 Documentation Tool : Ms Office / GoBe Productive Hardware Requirement Specification The Collection of internal electronic circuits and external physical devices used in building a computer is called Hardware. The minimum hardware requirement specification for developing this project is as follows: Processor : Pentium IV RAM : 512MB RAM Hard Disk : 10GB Monitor : Standard Color Monitor Keyboard : Standard Keyboard Mouse : Standard Mouse