Sie sind auf Seite 1von 4

Title of the project *

STEGANOGRAPHY
(A new technique to hide information within image file)
Introduction and Objectives of the study *

Steganography is the art of hiding the fact that communication is taking place, by hiding
information in other information. Many different carrier file formats can be used, but digital
images are the most popular because of their frequency on the internet. For hiding secret
information in images, there exists a large variety of steganography techniques some are
more complex than others and all of them have respective strong and weak points. Different
applications may require absolute invisibility of the secret information, while others require a
large secret message to be hidden. This project report intends to give an overview of image
steganography, its uses and techniques. It also attempts to identify the requirements of a good
steganography algorithm and briefly reflects on which steganography techniques are more
suitable for which applications.
Steganography become more important as more people join the cyberspace revolution.
Steganography is the art of concealing information in ways that prevents the detection of
hidden messages. Steganography include an array of secret communication methods that hide
the message from being seen or discovered.

Problem Statement (including Literature Review) *

Due to advances in ICT, most of information is kept electronically. Consequently, the security
of information has become a fundamental issue. Besides cryptography, steganography can be
employed to secure information. In cryptography, the message or encrypted message is
embedded in a digital host before passing it through the network, thus the existence of the
message is unknown. Besides hiding data for confidentiality, this approach of information
hiding can be extended to copyright protection for digital media: audio, video and images.

The growing possibilities of modern communications need the special means of security
especially on computer network. The network security is becoming more important as the
number of data being exchanged on the internet increases. Therefore, the confidentiality and
data integrity are requires to protect against unauthorized access and use. This has resulted in
an explosive growth of the field of information hiding
Information hiding is an emerging research area, which encompasses applications such as
copyright protection for digital media, watermarking, fingerprinting, and steganography.

Methodology and References

After analyzing the requirements of the task to be performed, the next step is to analyze the
problem and understand its context. The first activity in the phase is studying the existing
system and other is to understand the requirements and domain of the new system. Both the
activities are equally important, but the first activity serves as a basis of giving the functional
specifications and then successful design of the proposed system. Understanding the
properties and requirements of a new system is more difficult and requires creative thinking
and understanding of existing running system is also difficult, improper understanding of
present system can lead diversion from solution.
The model that is basically being followed is the WATER FALL MODEL, which states that
the phases are organized in a linear order. First of all the feasibility study is done. Once that
part is over the requirement analysis and project planning begins. If system exists one and
modification and addition of new module is needed, analysis of present system can be used as
basic model. The design starts after the requirement analysis is complete and the coding
begins after the design is complete. Once the programming is completed, the testing is done.
In this model the sequence of activities performed in a software development project are: 1

Requirement Analysis

2 Project Planning
3

System design

Detail design

Coding

Unit testing

System integration & testing

Here the linear ordering of these activities is critical. End of the phase and the output of one
phase is the input of other phase. The output of each phase is to be consistent with the overall
requirement of the system. Some of the qualities of spiral model are also incorporated like
after the people concerned with the project review completion of each of the phase the work
done.

STUDY OF THE SYSTEM


GUI
In the flexibility of the uses the interface has been developed a graphics concept in mind,
associated through a browses interface. The GUIS at the top level have been categorized as
1. Administrative user interface
2. The operational or generic user interface
NUMBER OF MODULES
The system after careful analysis has been identified to be presented with the following
modules
Modules:
1. User Module
2. Administrator Module
3. Department Module

REFERENCES

FOR .NET INSTALLATION

www.support.mircosoft.com
1

FOR DEPLOYMENT AND PACKING ON SERVER

www.developer.com
www.15seconds.com

FOR SQL

www.msdn.microsoft.com
3

FOR ASP.NET

www.msdn.microsoft.com/net/quickstart/aspplus/default.com
www.asp.net
www.fmexpense.com/quickstart/aspplus/default.com
www.asptoday.com
www.aspfree.com
www.4guysfromrolla.com/index.aspx

Das könnte Ihnen auch gefallen