This action might not be possible to undo. Are you sure you want to continue?
(A new technique to hide information within image file)
(A new technique to hide information within image file)
A PROJECT REPORT Submitted By
S.PRADEEP REG.NO. 0936JO127
Under the Guidance of Mr. D.BOOMINATH M.C.A., M.Phil., A Project report submitted to DEPARTMENT OF COMPUTER SCIENCE In partial fulfillment of the requirements for the award of the degree of MASTER OF INFORMATION TECHNOLOGY IN
MARCH-2011 RATHINAM COLLEGE OF ARTS AND SCIENCE (Affiliated to Bharathiar University , Accredited with B++ grade by NAAC, Approved by AICTE and ISO 9001:2008 Certified Institution), Rathinam Techzone Campus, Pollachi Main Road, Eachanari, Coimbatore-641021.
This is to certify that the project work entitled “STEGANOGRAPHY” submitted to Bharathiar University in partial fulfillment of the requirements for the award of the degree of MASTER OF INFORMATION TECHNOLOGY is a record of original work done by supervision and guidance and that this project work has not formed the basis for the award of any degree or similar title to any candidate of our college.
Head of the Department
Submitted for the university examination held on
I here by declare that this bonafied project work entitled the study on “STEGANOGRAPHY” submitted to the Rathinam college of Arts and Science, in partial fulfillment of the requirement for the award of the Degree of MASTER OF INFORMATION TECHNOLOGY is the original work done by me during 2009-2011 under the supervision of Mr.D.BOOMINATH M.C.A.,M.Phil., Lecturer in Department of computer Science, Rathinam college of Arts and Science, Coimbatore.
Signature of the candidate
NAME REG. NO COURSE COLLEGE PLACE DATE
: S.PRADEEP : 0936JO127 : M.SC (INFORMATION TECHNOLOGY) : Rathinam College of Arts & Science : Coimbatore :
I thank God for his grace and blessings that have been showered upon me to bring success for this project.
I extend my thanks to our chairman DR. MADAN A SENDHIL M.S., Ph.D., for having given his concern to do my project in his organization. I thank my respected administrative officer Mr. R. MANICKAM M.C.A., M. Phil., for having facilitated permission for this project. I am grateful to our Principal Dr.P.MURUGESAN M.A., M.Phil., Ph.D., for allowing me to undertake this project. I am indebted to my internal guide Mr. D.BOOMINATH M.C.A., M.Phil., Head of the department of computer science my thanks are due to him for her valuable and timely help not only during the project schedule but during my career as her student for the past three years. She is also my guide. I extend my thanks to my class tutor. Mr.P.BOOPATHY MCA., M.Phil., Besides mentioning a few names my thanks are due to all my staff for their guidance and support. I thank my parents, friends, and everlasting almighty for giving me the necessary courage and for his invisible guidance to complete this project.
Different applications may require absolute invisibility of the secret information. Many different carrier file formats can be used. For hiding secret information in images. by hiding information in other information. while others require a large secret message to be hidden.SYNOPSIS Steganography is the art of hiding the fact that communication is taking place. its uses and techniques. It also attempts to identify the requirements of a good steganography algorithm and briefly reflects on which steganographic techniques are more suitable for which applications. This project report intends to give an overview of image steganography. but digital images are the most popular because of their frequency on the internet. 6 . there exists a large variety of steganography techniques some are more complex than others and all of them have respective strong and weak points.
Carrier is also known as cover-object. which the message is embedded and serves to hide the presence of the message. steganography mean. audio recordings. covered writing. INTRODUCTION 1. steganography can be used to carry out hidden exchanges. books and multimedia products. Message and password.1 AN OVER VIEW The word steganography comes from the Greek “Seganos”. It is the art and science of hiding information such its presence cannot be detected and a communication is happening.CHAPTER I. The basic model of steganography consists of Carrier. A secrete information is encoding in a manner such that the very existence of the information is concealed. Paired with existing communication methods. which mean covered or secret and – “graphy” mean writing or drawing. Moves by various governments to restrict the availability of encryption services have motivated people to study methods by which private messages can be embedded in seemingly innocuous cover messages. 7 . The main goal of this projects it to communicate securely in a completely undetectable manner and to avoid drawing suspicion to the transmission of a hider data. There has been a rapid growth of interest in steganography for two reasons: The publishing and broadcasting industries have become interested in techniques for hiding encrypted copyright marks and serial numbers in digital films. literally. Therefore.
There are several suitable carriers below to be the cover-object: • • • • Network protocols such as TCP. The process consists of two steps: 8 . K Message is the data that the sender wishes to remain it confidential. other image. or a serial number. Z F(X. It can be plain text. where they can be both color and gray-scale. The original image may or may not be required in most applications to extract the message. K) Stego-key. cipher text. C Message. just alike Morse code including html and java Images file such as bmp. Password is known as stego-key. M Stego Object. the model for steganography is shown on following figure: Coverobject. the information hiding process extracts redundant bits from cover-object.Basically. Recovering message from a stego-object requires the cover-object itself and a corresponding decoding key if a stego-key was used during the encoding process. In general. or anything that can be embedded in a bit stream such as a copyright mark. M. a covert communication. gif and jpg. The cover-object with the secretly embedded message is then called the Stego-object. IP and UDP File and Disk that can hides and append files by using the slack space Text such as null characters. which ensures that only recipient who knows the corresponding decoding key will be able to extract the message from a cover-object.
Redundant bits are those bits that can be modified without corrupting the quality or destroying the integrity of the cover-object. The stego-object is created by replacing the selected redundant bits with message bits 9 . • Embedding process then selects the subset of the redundant bits to be replaced with data from a secret message.• Identification of redundant bits in a cover-object.
They also have the ability to train people on the system usage. then they can begin with a through need analysis so as to prepare a system requirement document. The heart of our software is web site development along with customized software packages. MICROMATE COMPUTERS is having strength of 9 software and 2 hardware engineers working with reputed projects in hand and having committed employee base. a complete business application for the customer. So caring for nurturing people is a synergistic combination of philosophy and business. project development and implementations. Then they can manage the entire development cycle and ensure a smooth and effective implementation.CHAPTER II. 10 . it will play a prominent role in the coming networked era. We have strong skills and experience in building custom application in the industry/technology of our focus. Software Solutions – Here. it is our business. Our project managers have been part of large enterprise application development and deployment projects. We have the best of Indian talent for delivering an international quality services in a cost effective business model. SELECTION OF THE ORGANIZATION MICROMATE COMPUTERS runs on a unique combination of advanced software and hardware. Typically. we build up from initial study using our industry knowledge and after a client need analysis. People are our asset-This statement is more than a slogan at MICROMATE COMPUTERS.
In the Internet era. implementation. Expertise: Web enabling business application is thrust area. system design. web-enabling applications are not just a technology issue but a business proposition as well. maintenance to training users on the application. credit cards management etc. 11 . It has the expertise to implement turnkey commercial application development projects covering the entire software Development life cycle from initial system study. • • • • New Internet applications New Intranet applications User friendly applications. testing. code development.We develop. and New application in the retail banking.
PROBLEM FORMULATION 3. try of hide messages physically.CHAPTER III. there exists a large variety of steganography techniques some are more complex than others and all of them have respective strong and weak points. 12 . to make the information hiding simpler and user friendly. And with the development of the internet technology. messages can be secretly carried by digital media by using the steganography techniques. In recent years. The later. and then be transmitted through the internet rapidly Steganography is the art of hiding the fact that communication is taking place. digital media can be transmitted conveniently over the network. Many different carrier file formats can be used. One disadvantage of linguistic steganography is that users must equip themselves to have a good knowledge of linguistry. For hiding secret information in images. but digital images are the most popular because of their frequency on the internet. everything is trending toward digitization. by hiding information in other information. So we prepare this application.1 PROBLEM IDENTIFICATION The former consists of linguistic or language forms of hidden writing. Therefore. such as invisible ink.
password) the user can decrypt the message. It does not have proper reliability.Net. It is possible to combine the techniques by encrypting message using cryptography and then hiding the encrypted message using steganography. There is no proper acknowledgement. So that the authorized users can’t get the original information. filtering). only by knowing the private key (i. such as image operations(rotation. 3. audio operations(rerecording. The authority is not properly maintained. On the receiving end. cryptography is a technique of hiding the message in the text file. Steganography pay attention to the degree of Invisibility while watermarking pay most of its attribute to the robustness of the message and its ability to withstand attacks of removal. The hackers may change or damage the entire message. DRAWBACKS It provides less security. in both the methods there are number of loopholes through which the hackers can attack the message. because the secret messages are hacked by the hackers and competitive companies. The resulting stego-image can be transmitted without revealing that secret information is being exchanged. 13 .3 PROPOSED SYSTEM To overcome the limitations of the existing system a new system has been proposed using C# .2 EXISTING SYSTEM The existing system uses hide the image in an image.. So there is no safety in transferring the data via image. The first method.e. cropping.3. filtering)in the case of images and audio files being watermarked respectively. In this system we used two methods to add security to the file.
Since the software is developed for multi-user Environment the password protection is provided to protect it from unauthorized user. To provide high degree of correctness and effectiveness and to reduce the workload it is very important to computerize the system. ANTICIPATED ADVANTAGES It provides high security and reliability occurs. The authorization is highly provided. This approach of information hiding technique has recently became important in a number of application area This project has following objectives: • To product security tool based on steganography techniques.The method. But the message can be hidden in the picture in the pixel format. Because the data is in the form of Encrypted text. Steganography is a computer technique (or an art).4 SYSTEM OBJECTIVES The goal of steganography is to covert communication. 14 project . So. It is same as text encryption. The other goal of steganography is to avoid drawing suspicion to the existence of a hidden message. a fundamental requirement of this steganography system is that the hidden message carried by stego-media should not be sensible to human beings. System computerized is easy to handle and provide the high accuracy in its output. • To explore techniques of hiding data using encryption module of this • To extract techniques of getting secret data using decryption module. There is no chance for hacking. 3. It gives assurance for the security of data.
Easy method to manage the information so that the hackers can’t understand the message.44 MB 52X 32 CDROM drive 15” Color HCL 107 2 Button Mouse 3. so even if the encrypted file is deciphered. more commonly. It is more effective and efficient way to transfer the file to the receiving end.Steganography sometimes is used when encryption is not permitted. Or. 3.5 3. An encrypted file may still hide information using steganography.7 APPLICATION SPECIFICATION 15 . steganography is used to supplement encryption.88 GHz 1 GB 160 GB 1. the hidden message is not seen SPECIFIC OBJECTIVE The objective of “Steganography” is to increase the efficiency of the system to reduce the manual work time.NET Framework 3.6 SOFTWARE SPECIFICATION Operating system Front-End : : Windows XP .5 HARDWARE SPECIFICATION Processor Memory Size Hard disc Floppy disk drive CDROM drive Monitor Keyboard Mouse : : : : : : : : Intel P4 2.
and worldwide to the general public on January 30. Windows XP was released for retail sale on October 25. based on installed user base. and is the most popular version of Windows. Windows 7 Pro. Direct OEM and retail sales of Windows XP ceased on June 30. laptops. The name "XP" is short for "eXPerience. XP may continue to be available as these sources run through their inventory or by purchasing Windows 7 Ultimate. FEATURES OF WINDOWS XP 16 . according to an estimate in that month by an IDC analyst. Microsoft continued to sell Windows XP through their System Builders (smaller OEMs who sell assembled computers) program until January 31. 2007. 2001. and then downgrading to Windows XP. and over 400 million copies were in use in January 2006. 2008.WINDOWS XP Windows XP is an operating system that was produced by Microsoft for use on personal computers. It was succeeded by Windows Vista. Windows XP was the successor to both Windows 2000 and Windows Me. 2001. and was the first consumer-oriented operating system produced by Microsoft to be built on the Windows NT kernel and architecture. 2006. Windows Vista Ultimate or Windows Vista Business. 2009. which was released to volume license customers on November 8. including home and business desktops. and media centers. It was first released to computer manufacturers on August 24.
0 and Windows 95/98/Me. Rogue applications cannot adversely affect core operating system areas. Side-by-side DLL support Provides a mechanism for multiple versions of individual Windows components to be installed and run "side by side". Also. the Windows XP Professional will provide even greater stress tests for device drivers. Enhanced device driver verifier Building on the device driver verifier found in Windows 2000. so that drivers and applications cannot corrupt them. which features a 32-bit computing architecture and a fully protected memory model. Dramatically reduced reboot scenarios The dramatically reduced reboot scenario eliminates most scenarios that force end users to reboot in Windows NT 4. All device driver code is read-only and page protected. Windows File Protection 17 . This helps to address the "DLL hell" problem by allowing an application written and tested with one version of a system component to continue to use that version even if an application that uses a newer version of the same component is installed. Windows XP Professional will provide a dependable computing experience for all business users. many software installations will not require reboots. Improved code protection Critical kernel data structures are read-only.Built on the new Windows engine Windows XP Professional is built on the proven code base of Windows NT and Windows 2000.
database connectivity.NET Framework is an integrated and managed environment for the development and execution of your code. 18 .NET FRAMEWORK The Microsoft .NET Framework is a managed.NET library is available to all the programming languages that . initiates and manages application execution. and manages the reallocation of memory for resources that are no longer needed. The CLR also provides other important services such as security. cryptography.NET Framework consists of two main components: the common language runtime and the . web application development.NET Framework class library. grants or denies the appropriate permissions to your application. memory management. and exception handling. Windows File Protection will restore the correct version. If a file is overwritten. The framework's Base Class Library provides user interface. The class library is used by programmers. The .NET Framework. and network communications.NET supports.NET Framework execute in a software (as contrasted to hardware) environment. The . It includes a large library. numeric algorithms.NET Framework is a software framework for Microsoft Windows operating systems. who combine it with their own code to produce applications. and it supports several programming languages which allow language interoperability (each language can use code written in other languages). known as the Common Language Runtime (CLR). The framework manages all aspects of the execution of your program: it allocates memory for the storage of data and instructions. . The class library and the CLR together constitute the . The CLR is an application virtual machine so that programmers need not consider the capabilities of the specific CPU that will execute the program. The . type safe environment for application development and execution. The . Programs written for the .Windows file protection protects core system files from being over written by application installations. data access.
NET FRAMEWORK is one of the premier languages that Microsoft supports for development in this new and exciting . Object Orientation.NET FRAMEWORK has a number of features hat help it retain backwards compatibility with Visual Basic 6(VB6). THE . Visual Basic is a thoroughly modernized language that will likely become the premier development tool for creating a wide range of .NET goes beyond traditional Windows programming to facilitate creating web application quickly and easily. In the past.NET platform.NET platform. 19 .NET applications.NET and its associated technologies. The results of this commitment are impressive. .NET Framework. A Common Runtime Environment.FEATURES OF . Microsoft announced the . . but was wholly unsuitable for others. Other features have been added specifically to adapt Visual Basic to object-oriented programming and to the .NET FRAMEWORK provides support in the language to find bugs early in the development process. Visual Basic was often seen as a "lightweight" language that could be used for particular kinds of tasks. However. Reports are that Microsoft is devoting 80% of its research and development budget to .NET space. Common Type System. a development framework that provides a new way to create Windows applications. Access to System Services: The Framework Class Library. And . .NET FRAMEWORK With its language enhancements and its tight integration into the .NET PLATFORM In July 2000. This makes for code that is easier to maintain and programs that are more reliable.
NET FRAMEWORK language can be used to develop two types of applications that can be run on windows: • Console applications display no graphics. Then. the combined code is optimally tested for type safety by using the verifier before the Just-In-Time (JIT) compiler comes to play. SYSTEM ANALYSIS 20 . the IL code and any functionality from the . creating managed native code. • Windows applications use the standard Windows interface. First of all. the managed native code is passes on to the .NET base class libraries is brought together by using the class loader. CHAPTER 1V. Here is how the CLR works. the source code written in a . Then. COMMON LANGUAGE RUNTIME The CLR is the heart of the .NET runtime manager. It is the engine that drives key functionality. which is saved to disk.NET framework.The . These are optimally linked with other code compiled by different compilers and the result is an EXE or DLL containing the IL code. “Runtime” is a component that a computer processes in order to execute programs written in a particular programming language. on execution.NET language gets compiled to the Intermediate Language (IL) and at the same time metadata information is created by using the Meta data engine. Then. The JIT compiler processes the IL.
Microsoft . 4.1 ENCRYPTION PROCESS 21 .Net language and you can use this software to hide your information in any type of pictures without any converting its format to BMP (software converts inside it). and give two file at destination folder. The encrypt module is used to hide information into the image.Net framework prepares a huge amount of tool and options for programmers that they simples programming. It has two modules encrypt and decrypt. because significant of this layer is least and every upper layer has doubled significant from its down layer. The algorithm used for Encryption and Decryption in this application provides using several layers lieu of using only LSB layer of image.Net tools for pictures and images is auto-converting most types of pictures to BMP format. So every step we go to upper layer image quality decreases and image retouching transpires. one is the same image file and another is the message file that is hidden it that. We could save file name before file information in LSB layer and save file size and file name size in most right-down pixels of image.Steganography system requires any type of image file and the information or message that is to be hidden. It take the image file as an output. I used this tool in this software called “Steganography” that is written in C#. One of . Writing this information is needed to retrieve file from encrypted image in decryption state. The decrypt module is used to get the hidden information in an image file. no one can see that information or file. Before encrypting file inside image we must save name and size of file in a definite place of image. This module requires any type of image and message and gives the only one image file in destination. Writing data starts from last layer (8th or LSB layer).
2 DECRYPTION PROCESS 22 .IMAGE FILE INFORMATION FILE BMP FILE 4.
DESIGN AND DEVELOPMENT 23 .BMP FILE INFORMATION FILE IMAGE FILE CHAPTER V.
The input design also determines the user to interact efficiently with the system.5.1. The quality of the system input determines the quality for system output. Five objectives of the input design are: Effectiveness Accuracy Ease to use Consistency Attractiveness Data are collected from the source Transfer of data to an input form is done 24 The main objectives that are done during the input design are: . Input design is the process of converting user-originated inputs to a computer-based format input data are collected and organized into group of similar data. Input design is a part of overall system design that requires special attention because it is the common source for data processing error. Here inputs are designed effectively so that errors made by the operations are minimized. The input design goal is to enter to the computer as accurate as possible. The goal of designing input data is to make entry easy and free from errors.1 INPUT DESIGN The input design is the process of entering data to the system. Once identified. The input is acceptable and understandable by the users who are using it. The inputs to the system have been designed in such a way that manual forms and the inputs are coordinated where the data elements are common to the source document and to the input. Input specification describes the manner in which data entered the system processing.1 DESIGN PROCESS 5. appropriate input media are selected for processing.
A good starting point for the output design is the Data Flow Diagram (DFD).1. Design will explain software components in detail. Efficient.2 OUTPUT DESIGN The output design was done so that results of processing could be communicated to the users. Modularity is one the desirable properties of large systems. The various outputs have been designed in such a way that they represent the same format that the office and management used to. Computer output is the most important and direct source of information to the user. the interaction between parts is minimal clearly specified. Data are checked for its accuracy. It implies that the system is divided into several parts. Specifying software structure and providing blue print for the document phase. Moreover. 25 . Data is converted to a computer acceptable form The converted data are verified. this will guide the further changes in the system to satisfy the future requirements. intelligible output design should improve the systems relationships with the user and help in decision making. Output requirements are designed during system analysis. Human factors educe issues for design involves addressing internal controls to ensure readability. This will help the implementation of the system. Design is concerned with identifying software components specifying Relationships among components. In such a manner. Validation of input data are done Data collections are done to eliminate the error 5. A major form of output is the hardcopy from the printer.
System design is described as a process of planning a new business system or more to replace or to complement an existing system. and human ware started in the design phase. Finally. The key points followed at the times of designing are: Preparing input and output specification Data flows and stores Preparing security and control specification Temporary and permanent collection of data A walk through before implementation Process Reviewing the study phase activities and making decisions about which functions are to be performed by the hardware. the generalized systems were explained to the management for approval. TESTING AND IMPLEMENTATION 26 . output and file design is performed c) The system and component cost requirements is specified d) The design phase report is generated. software. CHAPTER VI. System design is a transmission from a user-oriented document to a document oriented to programmers. The output. input and file design for each of the programs was done. It describes a solution of approaching to the creation of new system. The steps involved in designing phase were: a) The function to be performed is identified b) The input. It goes through a logical and physical design. The system design states how a system will meet the requirements identified during the system analysis.
TESTING ISSUES Client GUI considerations Target environment and platform diversity considerations Distributed processing considerations 6. If user select decrypt. application gives the screen to select only image file and ask path where user want to save the secrete file.2 TESTING METHODOLOGIES User needs to run the application. the potential presence of number of different hardware platform. because web-based systems and applications resides on a network and interoperate with many different operating systems. browsers. This fundamental philosophy does not change for web applications.1 SYSTEM TESTING System testing is the process of exercising software with the intent of finding and ultimately correcting errors. the performance issues associated with transaction processing. If user select encrypt. the complexities of network communications. the search for errors represents a significant challenge for web applications. This project has two methods – Encrypt and Decrypt. The user has two tab options – encrypt and decrypt. hardware platforms. application give the screen to select image file. The distributed nature of client-server environments. information file and option to save the image file.6. and communication protocols. the need to serve multiple clients from a centralized database and the requirements imposed on the server all combine to make testing of client-server architectures. 27 .
Thus the proposed system and considerations has been tested by validation and found to be working satisfactorily. This test is carried out during the programming and each module is found to be working satisfactory. The output format on the screen is found to be correct as the format designed in the system design. TESTING RESULTS 28 . In the registration form user details are stored in database without any change. one on the screen and the other is printed format. The objective of the testing is to discover errors. To fulfill this objective a series of test step unit. integration. The test steps are: 6. 6.2. The administrator module can integrate with user module.1 UNIT TESTING Unit is the testing changes made in an existing or new program.In Encryption the secrete information is hiding in with any type of image file. validation and system tests were planned and executed. Decryption is getting the secrete information from image file. 184.108.40.206 OUTPUT TESTING Asking the user about the format required by them to test the output generated by the system under considerations. It can be considered in two ways.2 INTEGRATION TESTING A comprehensive integration testing is carried out using integrated test plans in the design phase of the development as guide to ensure the behavior of functions with live data.3 VALIDATION TESTING Software validation is achieved through the series of tests that demonstrate confirmative with requirement.2. 6.
3 QUALITY ASSURANCE Quality assurance consists of auditing and reporting functions of management.The extent to which the program meets system specifications and user objectives. 29 . A good test should be “best of breeds”. To be more effective. A good test is not redundant.The amount of computer resources required by a program to perform a function.All tests should be traceable to customer requirements. thereby gaining insight and confidence that product quality is meeting its goal. QUALITY ASSURANCE GOALS CORRECTNESS . Exhaustive testing is not possible.To use with which program errors are located and corrected. The following are the attributes of good test: A good test has a high probability of finding an error. 6.The degree to which the system performs Intended functions overtime. which has probability of finding errors.The effort required learning and operating a system. MAINTAINABILITY . EFFICIENCY . A good test should neither too simple nor too complex. testing should be one. USABILITY . RELIABILITY . The focus of testing will shift progressively from programs. The goal of quality assurance is to provide management with the data necessary to be informed about product quality.
4 IMPLEMENTATION PROCEDURES 30 .The required portion in input editing.3 SYSTEM IMPLEMENTATION Implementation is the stage in the project where the theoretical design is turned a working system. The stage consists of Testing the developed program with simple data.TESTABILITY . Making necessary changes as desired by the user. ACCURACY . Testing whether the system.The effort required testing a program to ensure its correct performance. 6. Creating whether the system is meets user requirements. Detections and corrections. The most crucial stage is achieving a successful new system and giving the user confidence in that the new system will work efficiently and effectively in the implementation stage. computation and output.The ease of transporting a program from one hardware configuration to another. Training user personnel. PORTABILITY . 6.
The implementation phase is less creative than system design a system project may be dropped at any time prior to implementation although it becomes more difficult when it goes to the design phase. record layout. The final report to the implementation phase includes procedural flow charts. Conversion is one aspect of implementation. Assuming no problems. They include the following The conversion portion of the implementation plan is finalized and approved. USER TRAINING User training is designed to prepare the user for testing and converting the system. Implementation results for documented for reference. There are several ways to train the user they are: User manual Help screens Training demonstration TRAINING DEMONSTRATION 31 . no parallel processing is discontinued. Following the review the new system is officially operational. Conversion is completed. Files are converted. Plans for the post implementation review are prepared. Several procedures of documents are unique to the conversion phase. Parallel processing between the existing and the new system of logged on the special form. report layout and a workable plan for implementing the candidate system include an operational one.
personality and professional reasons. 6. There are minimal standard for maintenance. User are not fully cognizant of the maintenance problem are its high cost. One way to reduce maintenance cost is through maintenance management and software modification audits. Few tools and techniques are available for maintenance. Maintenance is not as rewarding as exciting as developing system. Maintenance is expensive. Then they do writing them. Live demonstration with personal contact is extremely effective for training users.Another user training element is a training demonstration. As important as it is. A good test plan is lacking. There are psychologist. Programs are often maintained without care for structure and documentation. Standard. Analyst and programmers spend far more time to maintain the program. It is perceived as required neither skill not experience. for this. 32 .5 SYSTEM MAINTENANCE Maintenance is actually the implementation of the review plan. many programmers and analysts are to perform are identify themselves with the maintenance effort. Maintenance accounts for 50-80% of total system development. procedures and guidelines are poorly defined and efforted.
After successful completion of this it has been tested with test data and found the result in a satisfactory manner. All phases of development were conceived using methodologies and now the software executes successfully by fulfilling the objective of the project.Net at “MICROMATE COMPUTERS”.CONCLUSION The project entitled “STEGANOGRAPHY” is developed in . The system minimizes the problem arising in the existing manual system. The project is tested successfully. The process of encryption and decryption are maintained more simple and easy. All the objective of the system has been met. Further extensions to this system can be made as requirement is satisfies by the proposed system. 33 . It eliminates the human errors to zero level. It is implemented and gone through all validation. The system is highly scalable. visible and user friendly.
The data screens can be upgraded and menus can be easily added when required. SCOPE OF THE FUTURE DEVELOPMENT This project is developed for hiding information in any image file. Items can be added to the forms when there comes necessity of new data. The system has much scope in the future an it can be developed to add more features to satisfy the user‘s request and company’s request. 34 . Modification and enhancement can be made affecting any other part of the program because of the user friendliness and understandability of the project. The scope of the project is implementation of steganography tools for hiding information includes any type of information file and image files and the path where the user wants to save Image and extruded file.CHAPTER VII.
• • • • .com http://www.NET (Paperback) MCAD/MCSD Self-Paced Training Kit: Developing Web Applications with MCAD/MCSE/MCDBA Self-Paced Training Kit: Microsoft SQL Server 2000 Microsoft® Visual Basic® .asp.NET and Microsoft Visual C#® .com http://www.org BOOKS Following books and ebook are used to complete this project reports.NET Black Book (Paperback) Professional ASP.google.NET.net http://www. Exam 70-229. Second Edition Database Design and Implementation.wikipedia.codeproject. Second Edition 35 .com http://www. • • • • • http://www.CHAPTER VIII.asp123. BIBLIOGRAPHY WEBSITES Following websites are referring to create this project reports.
APPENDICES A. SYSTEM FLOW DIAGAM (SFD): Start Application Encryption Decryption Image Message f file Image file BMP image file 36 .
B. DATA FLOW DIAGRAM (DFD): START Main Form ENCRYPTION Choice Selectio n DECRYPTION Load Image & File Encrypted File ENCRYP T DECRYP T Encrypted File A Decrypted Image & File 37 .
A Final Result Stop 38 .
SCREEN OUTPUTS 39 .C.
ENCRYPTION 40 .
DECRYPTION 46 .
This action might not be possible to undo. Are you sure you want to continue?