Beruflich Dokumente
Kultur Dokumente
enthusiastic and involved interest from his side. This fuelled my enthusiasm
even further and encouraged us to boldly step into what was a totally dark and
I would also like to thank my fellows who were ready with a positive comment
Last but not least, I would like to thank the Computer Science Department
IES IPS Academy staff members and the institute, in general, for extending a
i
ABSTRACT
The system deals with security during transmission of data. Commonly used
using Steganography. In this the end user identifies an image, which is going to
act as the carrier of data. The data file is also selected and then to achieve
greater speed of transmission the data file and image file are Compressed and
sent. Prior to this the data is embedded into the image and then sent. The image
previewed but not displaying the data. This protects the data from being
invisible and hence be secure during transmission. The user in the receiving end
uses another piece of code to retrieve the data from the image.
ii
LIST OF TABLES
No. Title
iii
List of Figures
1) Use Case Sender
2) Use Case Receiver
3) Architecture Diagram
4) Class Diagram
5) Sequence Diagram (Sender)
6) Sequence Diagram (Receiver)
7) Activity (Sender)
8) Activity (Receiver)
9) Login Window
10) Key Window
11) Message Dialogue Box
12) Stegno Menu
13) Encryption Window
14) Decryption Window
iv