Secured Data Transmission through Network
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
seminar surveyer
Active In SP
**

Posts: 3,541
Joined: Sep 2010
#1
13-10-2010, 12:56 PM


Abstract

This project and implimentation "Secured Data Transmission through Network" handles hiding a secret message with in an image in such a way that others cannot discern the presence or contents of the hidden message. A message might be hidden with in an image by changing Least Significant Bit to be the message bits. Then the image can be transmitted through Network.LSB based Steganography is perhaps the most simple and straight forward approach. In this project and implimentation we embed the message in to the least significant bit planes of the image. Since this will only affect each pixel by +/- 1, if at all, it is generally assumed with good reason that degradation caused by this embedding process would perceptually transaparent. Hence there are a number of LSB based Steganography techniques in the passive warden model as it difficult to differentate cover-images from stegoimages, given the small changes that have been made.
Existing System:

Supporting efficient and reliable data transmission over wireless networks has been subject of continuous research over the last decade. The major concerns were in the area of security. The data confronts the security hazard during transmission over a wireless network. Indeed, it is relatively easy to eavesdrop on video/audio conversations, or intercept and modify data packets. Anyone with a PC and access to the public network has the ability to capture network traffic, potentially compromising the privacy and the reliability of the applications. Hence, it is mandatory for wireless applications to guarantee authentication, confidentiality and integrity of data.

Proposed System:
The index terms used in this project and implimentation are
• LSB Technique.
• Transmission.
• Image Viewer.

Here using LSB technique, the information is hidden in the least significant bits of the image data. By means of server sockets, the image containing information transmitted to network. Image viewer used to view the normal and stegoimages. A quality measure gives the variation between original and stegoimage information. In the receiver side the same software is to be installed. When the image file is opened the software tells the user whether that contains any hiding information or not. If the image contains hidden information then client sockets will receive it.



With over 600 filling stations and exploitation fields Petrom needs a powerful and capable system to transport and pick-up data from each location all over the country.
They needed a highly flexible and reliable equipment capable to transmit secure data to a central headquarter where are managed through an advanced ERP (Enterprise Resource Planning) system. Also the equipment must have been able to transmit data from all kind of locations, the majority having no fixed Internet connection available



Modules:
• Sender
• Receiver
• Encryption
• Transmitting


Requirements
Hardware : PC with 2 GB hard-disk and 256 MB RAM
Operating System : Windows 95/98/00/XP with MS-office
Software : Java Swings.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  ROBUST DWT-SVD DOMAIN IMAGE WATERMARKING: EMBEDDING DATA IN ALL FREQUENCIES computer science crazy 6 5,693 17-11-2013, 04:43 PM
Last Post: Guest
  PC to PC Wireless Communication through RF Link project topics 10 9,755 18-10-2013, 10:24 PM
Last Post: Guest
  SECURED ATM TRANSACTION USING GSM ppt seminar projects maker 0 418 30-09-2013, 03:02 PM
Last Post: seminar projects maker
  The pothole patrol: using a mobile sensor network for road seminar projects maker 0 537 26-09-2013, 03:56 PM
Last Post: seminar projects maker
  Virtual River Monitoring System for Bangladesh using Wireless Sensor Network Report seminar projects maker 0 491 20-09-2013, 04:45 PM
Last Post: seminar projects maker
  DEVELOPMENT OF COAL MINE SAFETY SYSTEM USING WIRELESS SENSOR NETWORK REPORT seminar projects maker 0 607 14-09-2013, 03:53 PM
Last Post: seminar projects maker
  PROTECTOIN OF TRANSMISSION LINES USING Global Positioning System Report study tips 0 447 27-08-2013, 04:56 PM
Last Post: study tips
  wireless energy transmitter with tariff system through microcontroller seminar class 5 2,943 27-08-2013, 10:07 AM
Last Post: study tips
  ENHANCING DATA TRUSTWORTHINESS VIA ASSURED DIGITAL SIGNING REPORT study tips 0 623 22-08-2013, 04:19 PM
Last Post: study tips
  Remote Controlled Metal Detecting Robot with Remote Image Transmission seminar class 5 6,668 07-08-2013, 12:32 PM
Last Post: Guest