+ All Categories
Home > Documents > Steganography

Steganography

Date post: 24-Nov-2014
Category:
Upload: pradeep-pradhi
View: 5 times
Download: 1 times
Share this document with a friend
Popular Tags:
67
STEGANOGRAPHY (A new technique to hide information within image file) 1
Transcript
Page 1: Steganography

STEGANOGRAPHY (A new technique to hide information within image file)

1

Page 2: Steganography

STEGANOGRAPHY

(A new technique to hide information within image file)

A PROJECT REPORT

Submitted By

S.PRADEEP

REG.NO. 0936JO127 Under the Guidance of

Mr. D.BOOMINATH M.C.A., M.Phil.,

A Project report submitted to

DEPARTMENT OF COMPUTER SCIENCE

In partial fulfillment of the requirements for the award of the degree of

MASTER OF INFORMATION TECHNOLOGY

IN

MARCH-2011

RATHINAM COLLEGE OF ARTS AND SCIENCE

(Affiliated to Bharathiar University , Accredited with B++ grade by

NAAC, Approved by AICTE and ISO 9001:2008 Certified Institution),

Rathinam Techzone Campus, Pollachi Main Road,

2

Page 3: Steganography

Eachanari, Coimbatore-641021.

CERTIFICATE

This is to certify that the project work entitled “STEGANOGRAPHY” submitted

to Bharathiar University in partial fulfillment of the requirements for the award of the

degree of MASTER OF INFORMATION TECHNOLOGY is a record of original

work done by supervision and guidance and that this project work has not formed the

basis for the award of any degree or similar title to any candidate of our college.

Guide Head of the Department

Principal

Submitted for the university examination held on ____________________

INTERNAL EXAMINER EXTERNAL EXAMINER

3

Page 4: Steganography

DECLARATION

I here by declare that this bonafied project work entitled the study on

“STEGANOGRAPHY” submitted to the Rathinam college of Arts and Science, in

partial fulfillment of the requirement for the award of the Degree of MASTER OF

INFORMATION TECHNOLOGY is the original work done by me during 2009-2011

under the supervision of Mr.D.BOOMINATH M.C.A.,M.Phil., Lecturer in Department

of computer Science, Rathinam college of Arts and Science, Coimbatore.

Signature of the candidate

NAME : S.PRADEEP

REG. NO : 0936JO127

COURSE : M.SC (INFORMATION TECHNOLOGY)

COLLEGE : Rathinam College of Arts & Science

PLACE : Coimbatore

DATE :

4

Page 5: Steganography

ACKNOWLEDGEMENT

I thank God for his grace and blessings that have been showered upon me to bring

success for this project.

I extend my thanks to our chairman DR. MADAN A SENDHIL M.S., Ph.D., for

having given his concern to do my project in his organization.

I thank my respected administrative officer Mr. R. MANICKAM M.C.A., M. Phil.,

for having facilitated permission for this project.

I am grateful to our Principal Dr.P.MURUGESAN M.A., M.Phil., Ph.D., for

allowing me to undertake this project.

I am indebted to my internal guide Mr. D.BOOMINATH M.C.A., M.Phil., Head of

the department of computer science my thanks are due to him for her valuable and timely

help not only during the project schedule but during my career as her student for the past

three years. She is also my guide.

I extend my thanks to my class tutor. Mr.P.BOOPATHY MCA., M.Phil., Besides

mentioning a few names my thanks are due to all my staff for their guidance and support.

I thank my parents, friends, and everlasting almighty for giving me the necessary

courage and for his invisible guidance to complete this project.

5

Page 6: Steganography

SYNOPSIS

Steganography is the art of hiding the fact that communication is taking place, by

hiding information in other information. Many different carrier file formats can be used,

but digital images are the most popular because of their frequency on the internet.

For hiding secret information in images, there exists a large variety of steganography

techniques some are more complex than others and all of them have respective strong and

weak points.

Different applications may require absolute invisibility of the secret information,

while others require a large secret message to be hidden. This project report intends to

give an overview of image steganography, its uses and techniques. It also attempts to

identify the requirements of a good steganography algorithm and briefly reflects on

which steganographic techniques are more suitable for which applications.

6

Page 7: Steganography

CHAPTER I. INTRODUCTION

1.1 AN OVER VIEW

The word steganography comes from the Greek “Seganos”, which mean covered or

secret and – “graphy” mean writing or drawing. Therefore, steganography mean, literally,

covered writing. It is the art and science of hiding information such its presence cannot be

detected and a communication is happening. A secrete information is encoding in a

manner such that the very existence of the information is concealed. Paired with existing

communication methods, steganography can be used to carry out hidden exchanges.

The main goal of this projects it to communicate securely in a completely undetectable

manner and to avoid drawing suspicion to the transmission of a hider data. There has

been a rapid growth of interest in steganography for two reasons:

The publishing and broadcasting industries have become interested in techniques for

hiding encrypted copyright marks and serial numbers in digital films, audio recordings,

books and multimedia products.

Moves by various governments to restrict the availability of encryption services have

motivated people to study methods by which private messages can be embedded in

seemingly innocuous cover messages.

The basic model of steganography consists of Carrier, Message and password. Carrier

is also known as cover-object, which the message is embedded and serves to hide the

presence of the message.

7

Page 8: Steganography

Basically, the model for steganography is shown on following figure:

Message is the data that the sender wishes to remain it confidential. It can be plain

text, cipher text, other image, or anything that can be embedded in a bit stream such as a

copyright mark, a covert communication, or a serial number. Password is known as

stego-key, which ensures that only recipient who knows the corresponding decoding key

will be able to extract the message from a cover-object. The cover-object with the

secretly embedded message is then called the Stego-object.

Recovering message from a stego-object requires the cover-object itself and a

corresponding decoding key if a stego-key was used during the encoding process. The

original image may or may not be required in most applications to extract the message.

There are several suitable carriers below to be the cover-object:

• Network protocols such as TCP, IP and UDP

• File and Disk that can hides and append files by using the slack space

• Text such as null characters, just alike Morse code including html and java

• Images file such as bmp, gif and jpg, where they can be both color and gray-scale.

Cover-object, C

Message, M

Stego-key, K

F(X, M, K)

Stego Object, Z

8

Page 9: Steganography

In general, the information hiding process extracts redundant bits from cover-object.

The process consists of two steps:

• Identification of redundant bits in a cover-object. Redundant bits are those bits

that can be modified without corrupting the quality or destroying the integrity of the

cover-object.

• Embedding process then selects the subset of the redundant bits to be replaced

with data from a secret message. The stego-object is created by replacing the selected

redundant bits with message bits

9

Page 10: Steganography

CHAPTER II. SELECTION OF THE ORGANIZATION

MICROMATE COMPUTERS runs on a unique combination of advanced software

and hardware. The heart of our software is web site development along with customized

software packages, project development and implementations.

People are our asset-This statement is more than a slogan at MICROMATE

COMPUTERS, it is our business. We have the best of Indian talent for delivering an

international quality services in a cost effective business model. So caring for nurturing

people is a synergistic combination of philosophy and business.

MICROMATE COMPUTERS is having strength of 9 software and 2 hardware

engineers working with reputed projects in hand and having committed employee base, it

will play a prominent role in the coming networked era.

Software Solutions – Here, we build up from initial study using our industry

knowledge and after a client need analysis, a complete business application for the

customer.

We have strong skills and experience in building custom application in the

industry/technology of our focus. Our project managers have been part of large enterprise

application development and deployment projects.

Typically, then they can begin with a through need analysis so as to prepare a system

requirement document. Then they can manage the entire development cycle and ensure a

smooth and effective implementation. They also have the ability to train people on the

system usage.

10

Page 11: Steganography

We develop,

• New Internet applications

• New Intranet applications

• User friendly applications, and

• New application in the retail banking, credit cards management etc.

Expertise:

Web enabling business application is thrust area. In the Internet era, web-enabling

applications are not just a technology issue but a business proposition as well. It has the

expertise to implement turnkey commercial application development projects covering

the entire software Development life cycle from initial system study, system design, code

development, testing, implementation, maintenance to training users on the application.

11

Page 12: Steganography

CHAPTER III. PROBLEM FORMULATION

3.1 PROBLEM IDENTIFICATION

The former consists of linguistic or language forms of hidden writing. The later, such

as invisible ink, try of hide messages physically. One disadvantage of linguistic

steganography is that users must equip themselves to have a good knowledge of

linguistry. In recent years, everything is trending toward digitization. And with the

development of the internet technology, digital media can be transmitted conveniently

over the network. Therefore, messages can be secretly carried by digital media by using

the steganography techniques, and then be transmitted through the internet rapidly

Steganography is the art of hiding the fact that communication is taking place, by

hiding information in other information. Many different carrier file formats can be used,

but digital images are the most popular because of their frequency on the internet. For

hiding secret information in images, there exists a large variety of steganography

techniques some are more complex than others and all of them have respective strong and

weak points.

So we prepare this application, to make the information hiding simpler and user

friendly.

12

Page 13: Steganography

3.2 EXISTING SYSTEM

The existing system uses hide the image in an image, in both the methods there are

number of loopholes through which the hackers can attack the message. The hackers may

change or damage the entire message. So there is no safety in transferring the data via

image.

It is possible to combine the techniques by encrypting message using cryptography

and then hiding the encrypted message using steganography. The resulting stego-image

can be transmitted without revealing that secret information is being exchanged.

Steganography pay attention to the degree of Invisibility while watermarking pay most

of its attribute to the robustness of the message and its ability to withstand attacks of

removal, such as image operations(rotation, cropping, filtering), audio

operations(rerecording, filtering)in the case of images and audio files being watermarked

respectively.

DRAWBACKS

It provides less security, because the secret messages are hacked by the

hackers and competitive companies.

It does not have proper reliability.

There is no proper acknowledgement.

The authority is not properly maintained.

3.3 PROPOSED SYSTEM

To overcome the limitations of the existing system a new system has been proposed

using C# .Net. In this system we used two methods to add security to the file. The first

13

Page 14: Steganography

method, cryptography is a technique of hiding the message in the text file. So that the

authorized users can’t get the original information. On the receiving end, only by

knowing the private key (i.e., password) the user can decrypt the message.

The method, Steganography is a computer technique (or an art). It is same as text

encryption. But the message can be hidden in the picture in the pixel format.

To provide high degree of correctness and effectiveness and to reduce the workload it

is very important to computerize the system. System computerized is easy to handle and

provide the high accuracy in its output.

Since the software is developed for multi-user Environment the password protection is

provided to protect it from unauthorized user.

ANTICIPATED ADVANTAGES

It provides high security and reliability occurs.

The authorization is highly provided.

It gives assurance for the security of data.

There is no chance for hacking.

Because the data is in the form of Encrypted text.

3.4 SYSTEM OBJECTIVES

The goal of steganography is to covert communication. So, a fundamental requirement

of this steganography system is that the hidden message carried by stego-media should

not be sensible to human beings.

The other goal of steganography is to avoid drawing suspicion to the existence of a

hidden message. This approach of information hiding technique has recently became

important in a number of application area

This project has following objectives:

14

Page 15: Steganography

To product security tool based on steganography techniques.

To explore techniques of hiding data using encryption module of this

project

To extract techniques of getting secret data using decryption module.

Steganography sometimes is used when encryption is not permitted. Or, more

commonly, steganography is used to supplement encryption. An encrypted file may still

hide information using steganography, so even if the encrypted file is deciphered, the

hidden message is not seen

SPECIFIC OBJECTIVE

The objective of “Steganography” is to increase the efficiency of the system to reduce

the manual work time.

It is more effective and efficient way to transfer the file to the receiving end.

Easy method to manage the information so that the hackers can’t understand the

message.

3.5 HARDWARE SPECIFICATION

Processor : Intel P4 2.88 GHz

Memory Size : 1 GB

Hard disc : 160 GB

Floppy disk drive : 1.44 MB

CDROM drive : 52X 32 CDROM drive

Monitor : 15” Color

Keyboard : HCL 107

Mouse : 2 Button Mouse

3.6 SOFTWARE SPECIFICATION

15

Page 16: Steganography

Operating system : Windows XP

Front-End : .NET Framework 3.5

3.7 APPLICATION SPECIFICATION

WINDOWS XP

Windows XP is an operating system that was produced by Microsoft for use on

personal computers, including home and business desktops, laptops, and media centers. It

was first released to computer manufacturers on August 24, 2001, and is the most popular

version of Windows, based on installed user base. The name "XP" is short for

"eXPerience.

Windows XP was the successor to both Windows 2000 and Windows Me, and was the

first consumer-oriented operating system produced by Microsoft to be built on the

Windows NT kernel and architecture. Windows XP was released for retail sale on

October 25, 2001, and over 400 million copies were in use in January 2006, according to

an estimate in that month by an IDC analyst. It was succeeded by Windows Vista, which

was released to volume license customers on November 8, 2006, and worldwide to the

general public on January 30, 2007.

Direct OEM and retail sales of Windows XP ceased on June 30, 2008. Microsoft

continued to sell Windows XP through their System Builders (smaller OEMs who sell

assembled computers) program until January 31, 2009. XP may continue to be available

as these sources run through their inventory or by purchasing Windows 7 Ultimate,

Windows 7 Pro, Windows Vista Ultimate or Windows Vista Business, and then

downgrading to Windows XP.

16

Page 17: Steganography

FEATURES OF WINDOWS XP

Built on the new Windows engine

Windows XP Professional is built on the proven code base of Windows NT and

Windows 2000, which features a 32-bit computing architecture and a fully protected

memory model. Windows XP Professional will provide a dependable computing

experience for all business users.

Enhanced device driver verifier

Building on the device driver verifier found in Windows 2000, the Windows XP

Professional will provide even greater stress tests for device drivers.

Dramatically reduced reboot scenarios

The dramatically reduced reboot scenario eliminates most scenarios that force end

users to reboot in Windows NT 4.0 and Windows 95/98/Me. Also, many software

installations will not require reboots.

Improved code protection

Critical kernel data structures are read-only, so that drivers and applications cannot

corrupt them. All device driver code is read-only and page protected. Rogue applications

cannot adversely affect core operating system areas.

Side-by-side DLL support

Provides a mechanism for multiple versions of individual Windows components to be

installed and run "side by side". This helps to address the "DLL hell" problem by

allowing an application written and tested with one version of a system component to

continue to use that version even if an application that uses a newer version of the same

component is installed.

17

Page 18: Steganography

Windows File Protection

Windows file protection protects core system files from being over written by

application installations. If a file is overwritten, Windows File Protection will restore the

correct version.

.NET FRAMEWORK

The Microsoft .NET Framework is an integrated and managed environment for the

development and execution of your code. The .NET Framework is a managed, type safe

environment for application development and execution. The framework manages all

aspects of the execution of your program: it allocates memory for the storage of data and

instructions, grants or denies the appropriate permissions to your application, initiates and

manages application execution, and manages the reallocation of memory for resources

that are no longer needed. The .NET Framework consists of two main components: the

common language runtime and the .NET Framework class library.

The .NET Framework is a software framework for Microsoft Windows operating

systems. It includes a large library, and it supports several programming languages which

allow language interoperability (each language can use code written in other languages).

The .NET library is available to all the programming languages that .NET supports.

The framework's Base Class Library provides user interface, data access, database

connectivity, cryptography, web application development, numeric algorithms, and

network communications. The class library is used by programmers, who combine it with

their own code to produce applications.

Programs written for the .NET Framework execute in a software (as contrasted to

hardware) environment, known as the Common Language Runtime (CLR). The CLR is

18

Page 19: Steganography

an application virtual machine so that programmers need not consider the capabilities of

the specific CPU that will execute the program. The CLR also provides other important

services such as security, memory management, and exception handling. The class library

and the CLR together constitute the .NET Framework.

FEATURES OF .NET FRAMEWORK

With its language enhancements and its tight integration into the .NET Framework,

Visual Basic is a thoroughly modernized language that will likely become the premier

development tool for creating a wide range of .NET applications. In the past, Visual

Basic was often seen as a "lightweight" language that could be used for particular kinds

of tasks, but was wholly unsuitable for others.

Object Orientation.

Common Type System.

Access to System Services: The Framework Class Library.

A Common Runtime Environment.

.NET FRAMEWORK has a number of features hat help it retain backwards

compatibility with Visual Basic 6(VB6). Other features have been added specifically to

adapt Visual Basic to object-oriented programming and to the .NET platform.

.NET FRAMEWORK provides support in the language to find bugs early in the

development process. This makes for code that is easier to maintain and programs that

are more reliable.

THE .NET PLATFORM

In July 2000, Microsoft announced the .NET platform, a development framework that

provides a new way to create Windows applications. However, .NET goes beyond

traditional Windows programming to facilitate creating web application quickly and

19

Page 20: Steganography

easily. And .NET FRAMEWORK is one of the premier languages that Microsoft

supports for development in this new and exciting .NET space.

Reports are that Microsoft is devoting 80% of its research and development budget

to .NET and its associated technologies. The results of this commitment are impressive.

The .NET FRAMEWORK language can be used to develop two types of applications

that can be run on windows:

Console applications display no graphics.

Windows applications use the standard Windows interface.

COMMON LANGUAGE RUNTIME

The CLR is the heart of the .NET framework. It is the engine that drives key

functionality. “Runtime” is a component that a computer processes in order to execute

programs written in a particular programming language.

Here is how the CLR works. First of all, the source code written in a .NET language

gets compiled to the Intermediate Language (IL) and at the same time metadata

information is created by using the Meta data engine. These are optimally linked with

other code compiled by different compilers and the result is an EXE or DLL containing

the IL code, which is saved to disk.

Then, on execution, the IL code and any functionality from the .NET base class

libraries is brought together by using the class loader. Then, the combined code is

optimally tested for type safety by using the verifier before the Just-In-Time (JIT)

compiler comes to play. The JIT compiler processes the IL, creating managed native

code. Then, the managed native code is passes on to the .NET runtime manager.

20

Page 21: Steganography

CHAPTER 1V. SYSTEM ANALYSIS

Steganography system requires any type of image file and the information or message

that is to be hidden. It has two modules encrypt and decrypt.

Microsoft .Net framework prepares a huge amount of tool and options for

programmers that they simples programming. One of .Net tools for pictures and images is

auto-converting most types of pictures to BMP format. I used this tool in this software

called “Steganography” that is written in C#.Net language and you can use this software

to hide your information in any type of pictures without any converting its format to

BMP (software converts inside it).

The algorithm used for Encryption and Decryption in this application provides using

several layers lieu of using only LSB layer of image. Writing data starts from last layer

(8th or LSB layer); because significant of this layer is least and every upper layer has

doubled significant from its down layer. So every step we go to upper layer image quality

decreases and image retouching transpires.

The encrypt module is used to hide information into the image; no one can see that

information or file. This module requires any type of image and message and gives the

only one image file in destination.

The decrypt module is used to get the hidden information in an image file. It take the

image file as an output, and give two file at destination folder, one is the same image file

and another is the message file that is hidden it that.

Before encrypting file inside image we must save name and size of file in a definite

place of image. We could save file name before file information in LSB layer and save

21

Page 22: Steganography

file size and file name size in most right-down pixels of image. Writing this information

is needed to retrieve file from encrypted image in decryption state.

4.1 ENCRYPTION PROCESS

IMAGE FILE INFORMATION FILE

BMP FILE

22

Page 23: Steganography

4.2 DECRYPTION PROCESS

BMP FILE

INFORMATION FILE IMAGE FILE

23

Page 24: Steganography

CHAPTER V. DESIGN AND DEVELOPMENT

5.1 DESIGN PROCESS

5.1.1 INPUT DESIGN

The input design is the process of entering data to the system. The input design goal is

to enter to the computer as accurate as possible. Here inputs are designed effectively so

that errors made by the operations are minimized. The inputs to the system have been

designed in such a way that manual forms and the inputs are coordinated where the data

elements are common to the source document and to the input. The input is acceptable

and understandable by the users who are using it.

The quality of the system input determines the quality for system output. Input

specification describes the manner in which data entered the system processing.

Input design is the process of converting user-originated inputs to a computer-based

format input data are collected and organized into group of similar data. Once identified,

appropriate input media are selected for processing.

The input design also determines the user to interact efficiently with the system. Input

design is a part of overall system design that requires special attention because it is the

common source for data processing error. The goal of designing input data is to make

entry easy and free from errors.

Five objectives of the input design are:

Effectiveness

Accuracy

Ease to use

24

Page 25: Steganography

Consistency

Attractiveness

The main objectives that are done during the input design are:

Data are collected from the source

Transfer of data to an input form is done

Data is converted to a computer acceptable form

The converted data are verified.

Data are checked for its accuracy.

Validation of input data are done

Data collections are done to eliminate the error

5.1.2 OUTPUT DESIGN

The output design was done so that results of processing could be communicated to

the users. The various outputs have been designed in such a way that they represent the

same format that the office and management used to.

Computer output is the most important and direct source of information to the user.

Efficient, intelligible output design should improve the systems relationships with the

user and help in decision making. A major form of output is the hardcopy from the

printer.

Output requirements are designed during system analysis. A good starting point for

the output design is the Data Flow Diagram (DFD). Human factors educe issues for

design involves addressing internal controls to ensure readability.

Design is concerned with identifying software components specifying Relationships

among components. Specifying software structure and providing blue print for the

document phase.

25

Page 26: Steganography

Modularity is one the desirable properties of large systems. It implies that the system

is divided into several parts. In such a manner, the interaction between parts is minimal

clearly specified.

Design will explain software components in detail. This will help the implementation

of the system. Moreover, this will guide the further changes in the system to satisfy the

future requirements.

System design is described as a process of planning a new business system or more to

replace or to complement an existing system. The system design states how a system will

meet the requirements identified during the system analysis.

It describes a solution of approaching to the creation of new system. System design is

a transmission from a user-oriented document to a document oriented to programmers. It

goes through a logical and physical design.

The key points followed at the times of designing are:

Preparing input and output specification

Data flows and stores

Preparing security and control specification

Temporary and permanent collection of data

A walk through before implementation

Process

Reviewing the study phase activities and making decisions about which functions are

to be performed by the hardware, software, and human ware started in the design phase.

The output, input and file design for each of the programs was done. Finally, the

generalized systems were explained to the management for approval.

The steps involved in designing phase were:

a) The function to be performed is identified

b) The input, output and file design is performed

c) The system and component cost requirements is specified

26

Page 27: Steganography

d) The design phase report is generated.

CHAPTER VI. TESTING AND IMPLEMENTATION

6.1 SYSTEM TESTING

System testing is the process of exercising software with the intent of finding and

ultimately correcting errors. This fundamental philosophy does not change for web

applications, because web-based systems and applications resides on a network and

interoperate with many different operating systems, browsers, hardware platforms, and

communication protocols, the search for errors represents a significant challenge for web

applications.

The distributed nature of client-server environments, the performance issues

associated with transaction processing, the potential presence of number of different

hardware platform, the complexities of network communications, the need to serve

multiple clients from a centralized database and the requirements imposed on the server

all combine to make testing of client-server architectures.

TESTING ISSUES

Client GUI considerations

Target environment and platform diversity considerations

Distributed processing considerations

6.2 TESTING METHODOLOGIES

User needs to run the application. The user has two tab options – encrypt and decrypt.

If user select encrypt, application give the screen to select image file, information file and

27

Page 28: Steganography

option to save the image file. If user select decrypt, application gives the screen to select

only image file and ask path where user want to save the secrete file.

This project has two methods – Encrypt and Decrypt.

In Encryption the secrete information is hiding in with any type of image file.

Decryption is getting the secrete information from image file. The objective of the

testing is to discover errors. To fulfill this objective a series of test step unit, integration,

validation and system tests were planned and executed. The test steps are:

6.2.1 UNIT TESTING

Unit is the testing changes made in an existing or new program. This test is carried out

during the programming and each module is found to be working satisfactory. In the

registration form user details are stored in database without any change.

6.2.2 INTEGRATION TESTING

A comprehensive integration testing is carried out using integrated test plans in the

design phase of the development as guide to ensure the behavior of functions with live

data. The administrator module can integrate with user module.

6.2.3 VALIDATION TESTING

Software validation is achieved through the series of tests that demonstrate

confirmative with requirement. Thus the proposed system and considerations has been

tested by validation and found to be working satisfactorily.

6.2.4 OUTPUT TESTING

Asking the user about the format required by them to test the output generated by the

system under considerations. It can be considered in two ways, one on the screen and the

28

Page 29: Steganography

other is printed format. The output format on the screen is found to be correct as the

format designed in the system design.

TESTING RESULTS

All tests should be traceable to customer requirements. The focus of testing will shift

progressively from programs. Exhaustive testing is not possible. To be more effective,

testing should be one, which has probability of finding errors.

The following are the attributes of good test:

A good test has a high probability of finding an error.

A good test is not redundant.

A good test should be “best of breeds”.

A good test should neither too simple nor too complex.

6.3 QUALITY ASSURANCE

Quality assurance consists of auditing and reporting functions of management. The

goal of quality assurance is to provide management with the data necessary to be

informed about product quality, thereby gaining insight and confidence that product

quality is meeting its goal.

QUALITY ASSURANCE GOALS

CORRECTNESS - The extent to which the program meets system specifications and

user objectives.

RELIABILITY - The degree to which the system performs Intended functions overtime.

29

Page 30: Steganography

EFFICIENCY - The amount of computer resources required by a program to perform a

function.

USABILITY - The effort required learning and operating a system.

MAINTAINABILITY - To use with which program errors are located and corrected.

TESTABILITY - The effort required testing a program to ensure its correct

performance.

PORTABILITY - The ease of transporting a program from one hardware configuration

to another.

ACCURACY - The required portion in input editing, computation and output.

6.3 SYSTEM IMPLEMENTATION

Implementation is the stage in the project where the theoretical design is turned a

working system. The most crucial stage is achieving a successful new system and giving

the user confidence in that the new system will work efficiently and effectively in the

implementation stage.

The stage consists of

Testing the developed program with simple data.

Detections and corrections.

Creating whether the system is meets user requirements.

Testing whether the system.

Making necessary changes as desired by the user.

Training user personnel.

30

Page 31: Steganography

6.4 IMPLEMENTATION PROCEDURES

The implementation phase is less creative than system design a system project

may be dropped at any time prior to implementation although it becomes more difficult

when it goes to the design phase.

The final report to the implementation phase includes procedural flow charts,

record layout, report layout and a workable plan for implementing the candidate system

include an operational one. Conversion is one aspect of implementation.

Several procedures of documents are unique to the conversion phase. They

include the following

The conversion portion of the implementation plan is finalized and approved.

Files are converted.

Parallel processing between the existing and the new system of logged on the

special form.

Assuming no problems, no parallel processing is discontinued.

Implementation results for documented for reference.

Conversion is completed. Plans for the post implementation review are prepared.

Following the review the new system is officially operational.

USER TRAINING

31

Page 32: Steganography

User training is designed to prepare the user for testing and converting the system.

There are several ways to train the user they are:

User manual

Help screens

Training demonstration

TRAINING DEMONSTRATION

Another user training element is a training demonstration. Live demonstration with

personal contact is extremely effective for training users.

6.5 SYSTEM MAINTENANCE

Maintenance is actually the implementation of the review plan. As important as it is,

many programmers and analysts are to perform are identify themselves with the

maintenance effort. There are psychologist, personality and professional reasons, for this.

Analyst and programmers spend far more time to maintain the program. Then they do

writing them. Maintenance accounts for 50-80% of total system development.

Maintenance is expensive. One way to reduce maintenance cost is through

maintenance management and software modification audits.

Maintenance is not as rewarding as exciting as developing system. It is perceived as

required neither skill not experience.

User are not fully cognizant of the maintenance problem are its high cost.

Few tools and techniques are available for maintenance.

A good test plan is lacking.

32

Page 33: Steganography

Standard, procedures and guidelines are poorly defined and efforted.

Programs are often maintained without care for structure and documentation.

There are minimal standard for maintenance.

33

Page 34: Steganography

CONCLUSION

The project entitled “STEGANOGRAPHY” is developed in .Net at “MICROMATE

COMPUTERS”. The project is tested successfully. After successful completion of this it

has been tested with test data and found the result in a satisfactory manner.

The process of encryption and decryption are maintained more simple and easy. The

system is highly scalable, visible and user friendly. It is implemented and gone through

all validation. All phases of development were conceived using methodologies and now

the software executes successfully by fulfilling the objective of the project.

All the objective of the system has been met. The system minimizes the problem

arising in the existing manual system. It eliminates the human errors to zero level. Further

extensions to this system can be made as requirement is satisfies by the proposed system.

34

Page 35: Steganography

CHAPTER VII. SCOPE OF THE FUTURE DEVELOPMENT

This project is developed for hiding information in any image file. The scope of the

project is implementation of steganography tools for hiding information includes any

type of information file and image files and the path where the user wants to save Image

and extruded file.

Modification and enhancement can be made affecting any other part of the program

because of the user friendliness and understandability of the project.

The data screens can be upgraded and menus can be easily added when required.

Items can be added to the forms when there comes necessity of new data.

The system has much scope in the future an it can be developed to add more features

to satisfy the user‘s request and company’s request.

35

Page 36: Steganography

CHAPTER VIII. BIBLIOGRAPHY

WEBSITES

Following websites are referring to create this project reports.

• http://www.google.com

• http://www.codeproject.com

• http://www.asp.net

• http://www.asp123.com

• http://www.wikipedia.org

BOOKS

Following books and ebook are used to complete this project reports.

• .NET Black Book (Paperback)

• Professional ASP.NET (Paperback)

• MCAD/MCSD Self-Paced Training Kit: Developing Web Applications with

Microsoft® Visual Basic® .NET and Microsoft Visual C#® .NET, Second Edition

• MCAD/MCSE/MCDBA Self-Paced Training Kit: Microsoft SQL Server 2000

Database Design and Implementation, Exam 70-229, Second Edition

36

Page 37: Steganography

APPENDICES

A. SYSTEM FLOW DIAGAM (SFD):

Start Application

Encryption Decryption

Image file

BMP image file

Image Message file

37

Page 38: Steganography

B. DATA FLOW DIAGRAM (DFD):

ENCRYPTION DECRYPTION

38

Encrypted File

A

START

Main Form

Choice Selectio

n

Load Image & File

Encrypted File

ENCRYPT

DECRYPT

Decrypted Image & File

Page 39: Steganography

A

Stop

Final Result

39

Page 40: Steganography

C. SCREEN OUTPUTS

40

Page 41: Steganography

ENCRYPTION

41

Page 42: Steganography

42

Page 43: Steganography

43

Page 44: Steganography

44

Page 45: Steganography

45

Page 46: Steganography

46

Page 47: Steganography

DECRYPTION

47

Page 48: Steganography

48

Page 49: Steganography

49

Page 50: Steganography

50

Page 51: Steganography

51


Recommended