You are on page 1of 8

DECLARATION

We the undersigned solemnly declare that the report of the project work entitled, “Online
Banking” is based on our own work carried out during the course of our study under the
supervision of Mr. Toshant Kumar.

We assert that the statements made and conclusions drawn are an outcome of the project
work. We further declare that to the best of our knowledge and belief that the report does not
contain any work which has been submitted for the award of any other degree/diploma/certificate
in this university or any other university.

(Signature of the Candidate)


Name of the candidate:
Aditya Singh
Roll No.-3013315002
Enrollment No.-AR2424

(Signature of the Candidate)


Name of the candidate:
Shubham Soni
Roll No.-3013315050
Enrollment No.- AR2589

(Signature of the Candidate)


Name of the candidate:
Akash Pandey
Roll No.-3013314005
Enrollment No.- AR2623

i
CERTIFICATE

This is to certify that the report of the project submitted is an outcome of the project work
entitled, “Online Banking”, carried out, Aditya Singh Roll No: 3013315002 Enrolment No.
AR2587, Shubham Soni Roll No: 3013315050 Enrolment No. AR2589, Akash Pandey Roll
No: 3013315005 Enrolment No. AR2623, under my guidance and supervision for the award of
Degree in Bachelor of Engineering in Information Technology of Chhattisgarh Swami
Vivekanand Technical University, Bhilai (C.G), India.

To the best of my knowledge the report

 Embodies the work of the candidate herself,


 Has duly been completed,
 Fulfils the requirement of the Ordinance relating to the B.E. degree of the University,
 Is up to the desired standard for the purpose of which is submitted.

(Signature of the Guide)


Name of Guide:
Mr. Toshant Kumar
Designation: Professor
Department: Information Technology
Name and Address of the Institute:
B.I.T. Durg.

The project work as mentioned above is hereby being recommended and forwarded for
examination and evaluation.

(Signature of Head of Dept. with seal)

ii
CERTIFICATE BY THE EXAMINERS

This is to certify that the project work entitled “Online Banking” Submitted by Aditya
Singh Roll No: 3013315002 Enrolment No: AR2424, Shubham Soni Roll No: 3013315050
Enrolment No: AR2589, Akash Pandey Roll No: 3013315047 Enrolment No: AR2623 has
been examined by the undersigned as a part of the examination for the award of Bachelor of
Engineering degree in Information Technology of Chhattisgarh Swami Vivekanand Technical
University, Bhilai (C.G).

Internal Examiner External Examiner


Date: Date:

iii
ACKNOWLEDGEMENT

We wish to acknowledge with a deep sense of hearty gratitude and indebtedness


towards respected Dr. (Mrs.) Ani Thomas, HOD, Information Technology who gave us this
opportunity to experience project work & his valuable suggestion during this project have been
invaluable.

We take this opportunity to voice and record our sincerest gratefulness towards our
esteem guide Mr. Toshant Kumar under whose able guidance the project work has been
brought to completion.

We are heartily thankful to Amrendra Kumar Singh, Assistant professor for his
benevolence & time to time help, valuable suggestions, constructive criticism & active interest
in the successful completion of this project work.

We are also thankful to all our honorable teachers of the Information Technology
Department and our parents whose valuable support helped us and kept us motivated
throughout the process.

(Signature of Candidate) (Signature of Candidate) (Signature of Candidate)


Name: Aditya Singh Name: Shubham Soni Name: Akash Pandey
Roll no: 3013315002 Roll no: 3013315050 Roll no: 3013315005
Enrollment no:AR2424 Enrollment no:AR2587 Enrollment no:AR2623

iv
LIST OF FIGURES

Serial no. Figure Description Page no.

1 1.1.1 An overview of general watermarking 2

2 4.4 Data flow diagram 20

3 4.5 Use Case Diagram 21

4 4.6 Activity Diagram 22

5 4.7 Collaboration Diagram 23

6 5.1 Home Page 24

7 5.2 Selection of WAV File for Encoding 24

8 5.3 Typing message to be encoded 25

9 5.4 Decoding message 25

10 5.5 Enter Decryption Key 26

11 5.6 Pop up for successful completion of decoding 26

12 5.7 Display of hidden Message 27

v
CHAPTER PAGE NO

I INTRODUCTION 1-7

1.1 Digital Watermarking 2


1.2 Audio Watermarking 2
1.3 Properties of an Audio Watermark 3-5
1.3.1 Perpetual Transparency 3
1.3.2 Watermark bit rate 3
1.3.3 Robustness 3
1.3.4 Blind or informed watermark detection 4
1.3.5 Security 4
1.3.6 Computational complexity and cost 4
1.4 Importance of watermarking 5
1.5 Importance of steganography 5
1.6 Motivation 5

II LITERATURE REVIEW 8-10


2.1 Previous work 9-10

III PROBLEM IDENTIFICATION 11-13


3.1 Feasibility Study 11-12
3.1.1 Technical Feasibility 11
3.1.2 Operational Feasibility 11
3.1.3 Economical Feasibility 12
3.2 Existing System and Proposed System 12
3.3 Hardware and Software Requirements 12
3.4 Software Requirement Specification 12-13
3.4.1 Functional Requirements 12
3.4.2 Non-Functional Requirements 13

IV METHODOLOGY 14-23

4.1 Detailed Method of Encryption 14-17


4.2 Detailed Method of Decryption 17-18
4.3 Algorithm 18-19
4.5 Data Flow Diagram 20
4.6 Use Case Diagram 21
4.7 Activity diagram 22
4.8 Collaboration Diagram 23

vi
V RESULT AND DISCUSSIONS 24-29

5.1 Results 24-27


5.2 Discussions 28-29
VII CONCLUSION 30

VIII REFERENCES 31-32

vii
ABSTRACT
With the advent of Internet, data transfer has become smoother. Although this is undoubtedly
a boon, it has also escalated fraudulent activities in cyberspace like audio privacy. Plagiarism
of owner’s work and unethical attempts can be also be made to deliberately alter copyrighted
issue. Audio watermarking has proposed as a solution to deal with the issue. Audio
watermarking using java is the application developed to embed a text data into another audio
signal. It is concerned with embedding information in an innocuous cover speech in a secure
and robust manner.
This system make the files more secure by using the concept of steganography. In a computer-
based audio steganography system, secret messages are embedded in digital sound. The secret
message is embedded by slightly altering the binary sequence of a sound file. Embedding
secret messages in digital sound is usually a more difficult process than embedding messages
in other media, such as digital images.
In order to conceal secret messages successfully, a variety of methods for embedding
information in digital audio have been introduced. These methods range from rather simple
algorithms that insert information in the form of signal noise to more powerful methods that
exploit sophisticated signal processing techniques to hide information. The next section
discusses these methods in greater detail.

viii

You might also like