Sie sind auf Seite 1von 4

Acknowledgement

First and foremost, I would like to express my sincere gratitude to my project

guide, Mr.Deepak Chouhan. I was privileged to experience a sustained

enthusiastic and involved interest from his side. This fuelled my enthusiasm

even further and encouraged us to boldly step into what was a totally dark and

unexplored expanse before us.

I would also like to thank my fellows who were ready with a positive comment

all the time, whether it was an off-hand comment to encourage us or a

constructive piece of criticism and a special thank to our co-ordinator who

arranged a good guide for me.

Last but not least, I would like to thank the Computer Science Department

IES IPS Academy staff members and the institute, in general, for extending a

helping hand at every juncture of need.

i
ABSTRACT

The system deals with security during transmission of data. Commonly used

technologies are Cryptography. This system deals with implementing security

using Steganography. In this the end user identifies an image, which is going to

act as the carrier of data. The data file is also selected and then to achieve

greater speed of transmission the data file and image file are Compressed and

sent. Prior to this the data is embedded into the image and then sent. The image

if hacked or interpreted by a third party user will open up in any image

previewed but not displaying the data. This protects the data from being

invisible and hence be secure during transmission. The user in the receiving end

uses another piece of code to retrieve the data from the image.

ii
LIST OF TABLES
No. Title

1) Case Generation Report


2) Test Report
3) Test Case Analysis
4) Test Procedure
5) Example of GUI Test Case
6) Example of positive Test Case
7) Example of positive Test Case

iii
List of Figures
1) Use Case Sender
2) Use Case Receiver
3) Architecture Diagram
4) Class Diagram
5) Sequence Diagram (Sender)
6) Sequence Diagram (Receiver)
7) Activity (Sender)
8) Activity (Receiver)
9) Login Window
10) Key Window
11) Message Dialogue Box
12) Stegno Menu
13) Encryption Window
14) Decryption Window

iv

Das könnte Ihnen auch gefallen