preloader

Search Here

Free Project with Source Code

Lets Learn with

Saini Technologes Free Projects with Source Code

Free Download project source code and project report. in Asp.Net , VB .NET, C#,Android,Php,Java, SQL Server Source Code for final year college student , project submission of BE, BCA, MCA, MBA, MTech, MS, BSC-IT with complete synopsis, flow chart, DFD, requirement, documentation. Academic and Live Project for your final year studies are available for free download here. Projects In ASP.NET, PHP, ANDROID, JAVA,IPhone Programming C,C++ SQL Server,Visual Basic 6, VB .NET , C#, Source Code for final year college student. Project submission of BE, BCA, MCA, MBA, MTech, MS, BSC-IT with complete Source Code, Synopsis, Flow chart, DFD, Requirement, Documentation. get more than 2000 unique academic project idea in different programming languages. Download this project concept, abstract, SRS, source code to complete project for IGNOU, SMU, DOEACC University and college submission.all the project is open source you can download totally free. newest Android,Iphone,vb,php,java,jsp,asp,.net,c# projects with source codes

Free Projects

In this Project railway ticket reservation system is implemented where following modules has been implement
1)  Registration Managment
2) Login Management
3) Train Scheduling
4) Ticket Booking
A2Z courior System provide all the features regarding courier facility
1.)  Client Management
2.) Courier PickUp
3.) Courier Delivery
4.) Courier Tracking
5.) Reporting
6.) Query
7.) Vehical Management
8.) Login Management
1.) Student Management
2.) Liberary Management
3.) Fee Managemnt
4.) Exam Management
Hiding Messages in the Noise of a Picture: There is only one safe place for private data and messages: the place where nobody looks for it. A file encrypted with algorithms like PGP are not readable, but everybody knows that there is something hidden. Wouldn't it be nice, if everyone could open your encrypted files, and see noisy photos of some old friends instead of your private data? They surely wouldn't look for pieces of encrypted messages in the pixel values. User can encrypt and Decrypt text message behind the noise of a Image using RSA.

This Project Titled “Data Hiding in Audio, Image and Video files” is the software developed for hiding information which uses the technology called as Steganography –derived from the Greek words meaning, “Covered writing”, is the art of hiding information in ways that prevent its detection.

It is a method akin to covert channels, and invisible links, which add another step in security. A message in cipher text may arouse suspicion while an invisible message is not. Digital stenography uses a host data or message known as a “Container” or “Cover” to hide another data or message in it. The conventional way of protecting information was to use a standard symmetric or asymmetric key system in encryption. Steganography can also be used to place a hidden “trademark” in images, music, and software, a technique referred to as watermarking.

To ensure the privacy of the communication between two parties, various new methods are being developed. Cryptography being the mother to all those projects. However, cryptography is like a tool, it can do as well as it is programmed to do. Also, there are various different techniques that can be implemented to attain a certain level of security. Here we implement a technique for data hiding in audio images, known as Audio file Steganography.

First the audio file which behaves as carrier file is selected. Then a message or a text file to be embedded in audio is selected. Then a key file is selected. The key file contains characters whose ASCII values are taken for encryption. Then the file is embedded in audio using low bit encoding mechanism and extraction of embedded message is being done vice-versa.

Step1: User regestiration page

To access the system, the user should register by providing required details such as e-mail, username and password should be eight characters in length, contain both upper and lowecase alphabetic and have at least one special character (!@#$%&-+=). After the users register to the application they will recive an email that has a pin to write “the pin is multi facter authication ”

Step2: User login page

After registration, user should login into the application using the username and password with the PIN will be provided automatically recived it from the email, and start using the application to encrypt the image.

Step3: Image Selection: