security identification system
TRANSCRIPT
8/4/2019 Security Identification System
http://slidepdf.com/reader/full/security-identification-system 1/41
Security Identification System
8/4/2019 Security Identification System
http://slidepdf.com/reader/full/security-identification-system 2/41
P roject coordinators:
Smt. Anju J
Smt Mala J B
P roject Guide:
Sri. Sumesh. M
8/4/2019 Security Identification System
http://slidepdf.com/reader/full/security-identification-system 3/41
8/4/2019 Security Identification System
http://slidepdf.com/reader/full/security-identification-system 4/41
� The controller includes comparative software that determines a correlation between the first and second
references to identify at least one discrepancy therebetween, if an intrusion is detected an alert is send to theadmin and also it records the intervened area.
� The software can be implemented by scheduling the
hours into restricted and working hours.
� In the working hours, if any intrusion happens no alert is send as it is the non restricted hour, whereas inrestricted hours,if any intrusion happens an immediatealert is send to the admin via messages , that something intruded into the system.
8/4/2019 Security Identification System
http://slidepdf.com/reader/full/security-identification-system 5/41
Module Description
± REGISTRATION AND BASE IMAGE
SETTING
± IMAGE COM P ARISON
± ALERT MESSAGE
8/4/2019 Security Identification System
http://slidepdf.com/reader/full/security-identification-system 6/41
REGISTRATION AND BASE IMAGE
SETTING
� In this module, the admin can register into the system and thus he will get
authenticated.
� The existing admin can register newadmin and employee details, and he can
update, delete, or can reset his owndetails and employee details.
� The admin also sets the base image
8/4/2019 Security Identification System
http://slidepdf.com/reader/full/security-identification-system 7/41
Inputs
� Username and password
8/4/2019 Security Identification System
http://slidepdf.com/reader/full/security-identification-system 8/41
Processing If (username= = uname && password = = psword)
Message ³Admin is authenticated´
add_new()
search_detail().update_detail().
delete_details().
reset_detail() .
set_baseimg()
Else
Message ³Invalid user´
End if
8/4/2019 Security Identification System
http://slidepdf.com/reader/full/security-identification-system 9/41
Read Admin username
and password
No If (username Yes
==uname &&
Password==psword)
New Admin
Authenticated updated deleted resetted
Set base image
updation New admin/
employee
deletion reset Set base
image
Start
stop
Flow chart
8/4/2019 Security Identification System
http://slidepdf.com/reader/full/security-identification-system 10/41
Outputs
� Authentication of admin.
� Updating, deletion or resetting of detailsof admin and employees
� Setting of base image.
8/4/2019 Security Identification System
http://slidepdf.com/reader/full/security-identification-system 11/41
IMAGE COM P ARISON
� In this module, whenever the camera
captures an image, it is considered as anintrusion and compares it with the base
image which is already set.
8/4/2019 Security Identification System
http://slidepdf.com/reader/full/security-identification-system 12/41
Inputs
� Image captured by the web camera.
8/4/2019 Security Identification System
http://slidepdf.com/reader/full/security-identification-system 13/41
Processing
If ( base_image != captured_image )
Message ³intrusion detected´.Compare(base_image, captured_image)
Stores intruded portion to the data base.
Else
No intrusion detected.
End if
8/4/2019 Security Identification System
http://slidepdf.com/reader/full/security-identification-system 14/41
Captured image
No If (base_image Yes!= captured_image )
No intrus ionIntrusion stored
stop
Start
Flow chart
8/4/2019 Security Identification System
http://slidepdf.com/reader/full/security-identification-system 15/41
Outputs
� Detect whether intrusion happens or
not.
8/4/2019 Security Identification System
http://slidepdf.com/reader/full/security-identification-system 16/41
ALERT MESSAGE
� In this section, an alert message is send
to the admin and employees in restricted
hours, if any intrusion is found to be
happen while image comparison.
� The alert messages send to the mobiles
through GSM and to the systems which
will be open at that time through the
RMI protocol.
8/4/2019 Security Identification System
http://slidepdf.com/reader/full/security-identification-system 17/41
Inputs
� Recognition of interruption.
8/4/2019 Security Identification System
http://slidepdf.com/reader/full/security-identification-system 18/41
P rocessing If (any intrusion happens)
If (restricted hour)
Intruded area is stored in the database An alert message is send to the admin and
Employees, via GSM to the mobiles and
RMI to the systems which are open
Else
Intruded area is stored in the database. End if±else
End if
8/4/2019 Security Identification System
http://slidepdf.com/reader/full/security-identification-system 19/41
Detected
Intrusion
No Yes
If (restricted hour)
Alert Mess age Send
stop
start
Flow chart
8/4/2019 Security Identification System
http://slidepdf.com/reader/full/security-identification-system 20/41
Outputs
� Alert message is send.
8/4/2019 Security Identification System
http://slidepdf.com/reader/full/security-identification-system 21/41
Security Identification System
Security
Identification
System
USE CASES AND USECASE DIAGRAMS
MAIN USECASE DIAGRAM:
Admin
8/4/2019 Security Identification System
http://slidepdf.com/reader/full/security-identification-system 22/41
Admin Admin
Security Identification System
<< include >>
<<
<< include >>
RegisterAdminAndE
mployeeDetails
SearchAdminAndEmployee
DeleteAdminAndEmployeeDetails
UpdateAdminAndEmployeeDetails
ResetAdminAnd
EmployeeDetails
ADMIN AND EM P LOY DETAILS USECASE DIAGRAM
8/4/2019 Security Identification System
http://slidepdf.com/reader/full/security-identification-system 23/41
Use case: Register inAndEmployeeDetails
ID: 1
Br ief descr iption:
The admin enter s the details of new admin or a new employee
Pr imar y actor s:Admin
Secondar yactor s: None
Pr econditions:The admin has logged onto the system
Main f low:1.The admin selects ³r egister´2. The admin enter s the details of new admin or new employee.3. The system cr eates a new admin or a new employee
Postconditions:A new admin or employee has been r egister ed.
Alter native f lows:Admin or employee alr eady exists
8/4/2019 Security Identification System
http://slidepdf.com/reader/full/security-identification-system 24/41
8/4/2019 Security Identification System
http://slidepdf.com/reader/full/security-identification-system 25/41
Use case: UpdateAdminAndEmployeeDetailsID: 3
Brief description:
The admin updates his details or details of employees.
Primary actors:
Admin
Secondary actors:
None
Preconditions:
The admin has logged onto the system
Main flow:
1. The admin first search details.
2. The admin then selects ³update´.
3. The admin updates his details or details of employees.
Postconditions:
Details have been updatedAlternative flows:
None
8/4/2019 Security Identification System
http://slidepdf.com/reader/full/security-identification-system 26/41
Use case :DeleteAdminAndEmployeeDetailsID: 4
Brief description:
Delete admin details or employee details.Primary actors:
Admin
Secondary actors:
None
Preconditions:
The admin has logged onto the system
Main flow:
1. The admin first searches details.
2. The admin then selects ³delete´
3. The admin deletes his details or employee details.
Postconditions:
The admin or employee details have been deleted.
Alternative flows:
None
8/4/2019 Security Identification System
http://slidepdf.com/reader/full/security-identification-system 27/41
Use case: ResetAdminAndEmployeeDetails
ID: 5
Br ief descr iption:
Resetsadmin or employee details.
Pr imar y actor s:
Admin
Secondar yactor s:
None
Pr econditions:
The admin has logged onto the system
Main f low:
1.The admin selects ´r eset´
2. The admin enter s details.
3.The details has been r eset
Postconditions:
The admin or employee details has been r eset
Alter native f lows:
None
8/4/2019 Security Identification System
http://slidepdf.com/reader/full/security-identification-system 28/41
Admin
Time
Security Identification System
SetBaseImage
CompareImages
IMAGE COM P ARISON USECASE DIAGRAM
8/4/2019 Security Identification System
http://slidepdf.com/reader/full/security-identification-system 29/41
Use case: SetBaseImage
ID:6
Br ief descr iption:
The admin sets the base image.
Pr imar y actor s:
Admin
Secondar yactor s:
None
Pr econditions:
1. The admin has logged on to the system.
Main f low:
1.The Admin selects ³set base image¶.
2.The web camer a captur es an image.
3.The base image has been set.
Postconditions:
A new base image has beenset.
Alter native f lows:
None
8/4/2019 Security Identification System
http://slidepdf.com/reader/full/security-identification-system 30/41
Use case: Compar eImages
ID:7
Br ief descr iption:
The newly captur ed image compar es with the base image that has alr eady set.
Pr imar y actor s:
Time
Secondar yactor s:
None
Pr econditions:
Web camer a captur es an image.
Main f low:
1. The web camer a captur es an image .
2. The image compar ison algor ithm invokes.
3. The newly captur ed image compar es with base image.
3.1.If ( base_image != captur ed_image )
3.1.1.Intusion detected
3.1.2. Stor es intr uded por tion to the data base.
3.2. Else
3.2.1. No intr usion detected.
Postconditions:
Detected intr usionhappens or not.
Alter native f lows:
None
8/4/2019 Security Identification System
http://slidepdf.com/reader/full/security-identification-system 31/41
Time
InvokeGSMkit/RMIServer
SendingMessage
Security Identification System
ALERT MESSAGE USECASE DIAGRAM
8/4/2019 Security Identification System
http://slidepdf.com/reader/full/security-identification-system 32/41
Use case: InvokingGSMkit/RmiSer ver
ID:8
Br ief descr iption: The aler t messages send to the mobiles thr ough GSM and to the
systems which will be open at that time thr ough the RMI pr otocol.
Pr imar y actor s:Time
Secondar yactor s:None
Pr econditions: an intr usion is detected
Main f low:
1. If (any intr usion happens)
1.1 If (r estr icted hour )
1.1.1Intr uded ar ea is stor ed in the database
1.1.2.An aler t message is send to the admin and
1.1.3 Employees, via GSM to the mobiles and RMI to the systems which ar e open
1.2Else
1.2.1Intr uded ar ea is stor ed in the database.
Postconditions:aler t message send or not
Alter native f lows:
None
8/4/2019 Security Identification System
http://slidepdf.com/reader/full/security-identification-system 33/41
Use case: SendingMessage
ID:9
Br ief descr iption:
The aler t message sends to admin and employees.
Pr imar y actor s:
Time
Secondar yactor s:
None
Pr econditions:
Detectionof intr usion.
Main f low:
1. The aler t message sends to the admin or employees.
Postconditions: None
Alter native f lows:
None
8/4/2019 Security Identification System
http://slidepdf.com/reader/full/security-identification-system 34/41
Username
Password
Administrator SecurityIdentification
System
DATA FLOW DIAGRAMS
DFD-LEVEL 0
8/4/2019 Security Identification System
http://slidepdf.com/reader/full/security-identification-system 35/41
Username
PasswordAdministrator Admin PageLogin
DFD-LEVEL 1
8/4/2019 Security Identification System
http://slidepdf.com/reader/full/security-identification-system 36/41
Register table
Base table
Base table
Image table
Registration
process
Admin
Send alert
messa e
Searching by
date
Set base image
Image
comparison
Login
DFD-LEVEL 2
8/4/2019 Security Identification System
http://slidepdf.com/reader/full/security-identification-system 37/41
Admin Login registration
Image
comparison
Send message
by GSM or RMI
Resetsearch
delete
addupdate
Search images
via date
Set base image
DFD-LEVEL 3
8/4/2019 Security Identification System
http://slidepdf.com/reader/full/security-identification-system 38/41
Login
+ uname:varchar
+psword:varchar
- Login()
Admin
+ Name:varchar
+Uname:varchar
+Psword:varchar
-Role:varchar
-DOB:date
-Age:number
-Address:varchar
+Phoneno:number
+Emailed:varchar
-Register()
-Search()
-Update()
-Delete()
-Reset()
Server
+id:integer
+imdate:date
-image: medium blob
-Setbase image()
-Compare()
Search
+Fromdate:date
+Todate:date
-View()
Message
+Mid:number
-Symid:varchar
+Mssgmob()
+Mssgsystem()
CLASS DIAGRAM
8/4/2019 Security Identification System
http://slidepdf.com/reader/full/security-identification-system 39/41
Sd: AdminAndEmployeeRegistration
Admin
login(username, password)
authenticate (username, password)
register()
search()
update() delete() reset()
setbaseimage(bid,imid)
: Details: Login : Image
SEQUENCE DIAGRAMS
8/4/2019 Security Identification System
http://slidepdf.com/reader/full/security-identification-system 40/41
Sd: CompareImageAndSendAlertMessage
Time
compare(bid,imid)
if (!equal)
: Server Message: Alert
Message
8/4/2019 Security Identification System
http://slidepdf.com/reader/full/security-identification-system 41/41
Thank you
P resented by
Abdul shukkoor A
NimmyRaju
Nimy Alexander
Syama u