Skip to content

ShengHangNB/48430-File-Compression-and-Encryption-Project

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

46 Commits
 
 
 
 

Repository files navigation

48430 Fundamentals of C Programming Group project

Project Name: Bank Customer Security Management System

Team leader: Hang Sheng
Team members: Wei Chen, Liam Jiang, Longhao Zhu

Project mark: 29.76/30
Final mark for this subject: 97/100

Project runs instruction:

Please type "make" command in the terminal to compile all the c sources codes, then type "./main.out" to run the Program

Language Standard: C90
Running Environment: Linux

Another commands:
make clean: clean all the compiled files in the directory.
make cleanf: clean all the intermediate files generated during the program.

Role Duty

Name Role
Hang Sheng Implement the Huffman Coding Compression and Decompression (Displayed as "Efficient Compression" during the program) ; implement the searching algorithm
Wei Chen Implement the Run-length-coding File Compression (Displayed as "Inefficient Compression" during the program)
Liam Jiang Implement the Caesar Cipher File Encryption and decryption(Displayed as "High security" during the encryption and decryption features of the program)
Longhao Zhu Implement the XOR File Encryption and decryption(Displayed as "Low security" during the encryption and decryption features of the program), implement the file sort algorithm

Data-Flow Diagram and System Design

The data flow diagram of the entire project is shown as follows.The user can have an overview of this project according to this picture and view the flow of data by the arrows. The leftmost “customer.txt” is the database prepared to be used in the project, there are six attributes totally for each row, which are “ID”, “Name”, “Gender”, “Account type”, “Account Balance”, “Annual income”. The user may experience different features by following the red word “Recall” and the oval with a red border. The squares connected with the green word “Output” are the ultimate output files.

image

Program Designs:

The user can run the program as the following design:

  1. Read data > Compress data > Decompress Data > Output Data

  2. Read data > Encrypt data > Decrypt Data > Output Data

  3. Read data > Compress data > Encrypt data > Decrypt Data > Decompress data > Output data

  4. Read data > Encrypt data > Compress data > Decompress data > Decrypt Data > Output data

  5. Read data > Encrypt data > Compress data > Search data

  6. Read data > Compress data > Encrypt data > Search data

  7. Read data > sort data

  8. Self defined the data > read data > sort data

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published