You are on page 1of 7

CONTENTS

Chapter No Topic Page No


Abstract
List Of Figures i
List Of Tables ii
List Of Symbols iii
List of Abbreviations iv

1 Introduction 1-3

1.1.Introduction to Project
1.2.Organizational Profile
2 Genisis of the study 4-6
2.1.Aim
2.2.Description of Existing System
2.3. Problems In The Exisiting System
2.4.Proposed System
2.5.Solution Of These Problems
3 Feasibility Study 7-8
3.1. Technical Feasibility
3.2. Operational Feasibility
3.3. Economical Feasibility
4 System Analysis 9-20
4.1.Introduction
4.2.Analysis Model
4.3.Modules Description
4.4. E-R Diagrams
4.5.Data Flow Diagrams
4.6.Unified Modeling Language Diagrams
4.6.1.Activity Diagram
4.6.2.Sequence Diagram
4.6.3.Usecase Diagram

5 Software Requirement Specification 21-33


5.1. Hardware Requirements
5.2. Software Requirements
5.3. Functional Requirements
5.4.Non Functional Requirements
5.5.Technology
5.5.1.Introduction To .Net Framework
5.4.2. About Front End:
Asp.Net
5.4.3 .About Back End: SQL Server 2005
6 System Design 34-40
6.1 Introduction
6.2.System workflow
6.3.Role For official
6.4.Normalization
6.5.Data Dictionary
7 System Testing And Implementation 41-56
7.1.Introduction
7.2.strategic approach To Software Testing
7.3.White box testing
7.4.Basic Path Testing
7.5.Conditional Testing
7.6. Black box testing
7.7.Testing Stratgies
7.8.Sample Code
8 System Security 57-58
8.1 Introduction
8.2 Security In Software
9 Conclusion 59-60
10 Appendices 61
11 Output Screens 62-77
Bibliography 78
List of Figures

Chapter No Name of the Figure Page-No


E-R Diagrams
4.4 12

Dataflow Diagrams
4.5 14
Activity Diagram
4.6.1 18
19
Sequence Diagram
4.6.2
4.6.3 Usecase Diagram 20

i
List of Tables

Chapter No Name of the Table Page-No


7.7 Acceptance table
45

7.7 Index aspx 46

ii
Chapter No Name of the Symbol Page-No

4.5 Data Flow 14

4.5 Data Store 14

4.5 Source or Destination of data 14

4.5 Process that transforms data flow 14

iii
List of Abbreviations

S.no Abbreviations Description


1 Quos Quality of Service

2 DFD Data Flow Diagram

3 API Application Programming Interface

4 UML Unified Modeling Language

5 GUI Graphical User Interface

6 IDE Integrated Development Environment

7 GS Guaranteed service

8 EF Expedited Forwarding

9 AF Assured Forwarding

10 BE Best Effort

11 OCGRR Output Controlled Grant-based Round Robin

12 SDLC Software Development Life Cycle

13 MRR Multiple Round Robin

14 FCFS First Come First Served

15 DRR Deficit Round Robin

16 JPEG Joint Photographic Experts Group

iv
ABSTRACT

Design of a robust and secure digital signature scheme for image authentication over
wireless channels, the introduction of 3G wireless communication systems, together with
the invasive distribution of digital images and the growing concern on their originality
triggers an emergent need of authenticating images received by unreliable channels, such
as public Internet and wireless networks.

To meet this need, a content-based image authentication scheme that is suitable for an
insecure network and robust to transmission errors is proposed. The proposed scheme
exploits the scalability of a structural digital signature in order to achieve a good tradeoff
between security and image transfer for networked image applications. In this scheme,
multi-scale features are used to make digital signatures robust to image degradations and
key dependent parametric wavelet filters are employed to improve the security against
forgery attacks. This scheme is also able to distinguish tampering areas in the attacked
image. Experimental results show the robustness and validity of the proposed scheme.

You might also like