0 Bewertungen0% fanden dieses Dokument nützlich (0 Abstimmungen)
106 Ansichten13 Seiten
Software Requirement Specification Of STEGANOGRAPHY: INFILTRATION OF HIDDEN INFORMATION INTO IMAGE FILE Submitted in partial IulIment oI the requirement oI Uttarakhand Technical University, Dehradun For the degree oI B. Tech In Computer Science and Engineering Under the guidance of Miss. Ena 1ain Lecturer Computer Science Department Submitted By Submitted To: Bhashkara Nand Joshi(99070101142) Mr.S
Software Requirement Specification Of STEGANOGRAPHY: INFILTRATION OF HIDDEN INFORMATION INTO IMAGE FILE Submitted in partial IulIment oI the requirement oI Uttarakhand Technical University, Dehradun For the degree oI B. Tech In Computer Science and Engineering Under the guidance of Miss. Ena 1ain Lecturer Computer Science Department Submitted By Submitted To: Bhashkara Nand Joshi(99070101142) Mr.S
Copyright:
Attribution Non-Commercial (BY-NC)
Verfügbare Formate
Als DOCX, PDF, TXT herunterladen oder online auf Scribd lesen
Software Requirement Specification Of STEGANOGRAPHY: INFILTRATION OF HIDDEN INFORMATION INTO IMAGE FILE Submitted in partial IulIment oI the requirement oI Uttarakhand Technical University, Dehradun For the degree oI B. Tech In Computer Science and Engineering Under the guidance of Miss. Ena 1ain Lecturer Computer Science Department Submitted By Submitted To: Bhashkara Nand Joshi(99070101142) Mr.S
Copyright:
Attribution Non-Commercial (BY-NC)
Verfügbare Formate
Als DOCX, PDF, TXT herunterladen oder online auf Scribd lesen
Submitted in partial IulIilment oI the requirement oI Uttarakhand Technical University, Dehradun For the degree oI B. Tech In Computer Science and Engineering
Under the guidance of Miss. Ena 1ain Lecturer Computer Science Department
Submitted By Submitted To: Bhashkara Nand Joshi(99070101142) Mr.SuneetChaudhary Gaurav Pande(99070101144) Asst. ProIessor Kamal Singh Jalal(99070101144) Computer Science Department Prakash Thapa(99070101147)
Department Of Computer Science and Engineering Dehradun Table of Contents 1. Introduction............................................................................................. 1.1 Purpose....................................................................................................................... 1.2Document Conventions................................................................................................ 1.3 Intended Audience and Reading Suggestions............................................................. 1.4 Project Scope............................................................................................................... 2. Overall Description.................................................................................. 2.1 Product Perspective..................................................................................................... 2.2 Product Feature............................................................................................................. 2.3 User Classes and Characteristics................................................................................. 2.4Operating Environment................................................................................................ 2.5 Design and Implementation Constrain........................................................................ 2.6User Document.............................................................................................................. 2.7 Assumptions and Dependencies...................................................................... 3. External Interface Requirements........................................................... 3.1 User InterIaces............................................................................................................. 3.2 Hardware InterIaces..................................................................................................... 3.3SoItware InterIaces........................................................................................ 4. Other Non-functional Requirements...................................................... 4.1 PerIormance Requirements.......................................................................................... 4.2SaIety Requirements..................................................................................................... 4.3 Security Requirements.................................................................................. 5. Other Requirements................................................................................ 6. References........................
1. Introduction
One oI the reasons that intruders can be successIul is the most oI the inIormation they acquire Irom a system is in a Iorm that they can read and comprehend. Intruders may reveal the inIormation to others, modiIy it to misrepresent an individual or organization, or use it to launch an attack. One solution to this problem is, through the use oI steganography. Steganography is a technique oI hiding inIormation in digital media. In contrast to cryptography, it is not to keep others Irom knowing the hidden inIormation but it is to keep others Irom thinking that the inIormation even exists. Steganography become more important as more people join the cyberspace revolution. Steganography is the art oI concealing inIormation in ways that prevents the detection oI hidden messages. Steganography include an array oI secret communication methods that hide the message Irom being seen or discovered. Due to advances in ICT, most oI inIormation is kept electronically. Consequently, the security oI inIormation has become a Iundamental issue. Besides cryptography, streganography can be employed to secure inIormation. In cryptography, the message or encrypted message is embedded in a digital host beIore passing it through the network, thus the existence oI the message is unknown. Besides hiding data Ior conIidentiality, this approach oI inIormation hiding can be extended to copyright protection Ior digital media: audio, video and images. The growing possibilities oI modern communications need the special means oI security especially on computer network. The network security is becoming more important as the number oI data being exchanged on the internet increases. ThereIore, the conIidentiality and data integrity are requires to protect against unauthorized access and use. This has resulted in an explosive growth oI the Iield oI inIormation hiding. Steganography hide the secrete message within the host data set and presence imperceptible and is to be reliably communicated to a receiver. The host data set is purposely corrupted, but in a covert way, designed to be invisible to an inIormation analysis.
Document Purpose. The purpose oI the document is to highlight the various aspects oI the project which is to be developed under the speciIied standards. The document is Iormatted as per the standard to make and highlight the Ieatures in an eIIicient manner . Product Scope This project is developed Ior hiding inIormation in any image Iile. The scope oI the project is implementation oI steganography tools Ior hiding inIormation includes any type oI inIormation Iile and image Iiles and the path where the user wants to save Image and extruded Iile.
Intended Audience and Document Overview The document listed here is intended Ior the developer oI the security system , the administrator oI the govt .. the testing team ,the college administrator (the proIIersors,guide,and the mentor)
Developers The SRS is also useIul the developer who wish to develop their own Implantations oI Steganography.They can use SRS as directly to enhance the implement SoItware ormay develop a new SoItware right Irom scratch.
Testers Because the soItware is bulky and large in size,all the testers testing the Stegomagic soItware should read SRS careIully to go through all the paths oI the soItware during testing.
Students The SRS is also knowledgeable Ior the students to get the inIormation about Steganography. They can reIer our SRS, SDD and Project Report to get an overview oI Stegnography. The SRS here is deIined in the Iormat prescribed by IEEE and the document is organised in a manner as to make sure that the reader gets the complete insight oI what is to be delivered. The initial portions oI the document presents the general introduction, deIinitions, abbreviations, the middle portions highlighting the Iunctionality and the overall description, and the speciIic requirements clearly mentioning the dependencies and other requirements, usage oI diagrams is also done where it is required. The sections covered are equally important to all the readers and intended users oI the application. Definitions, Acronyms and Abbreviations Steganography Steganography is the art oI hiding the Iact that communication is taking place, by hiding inIormation in other inIormation. Many diIIerent carrier Iile Encryption Encryption is the conversion oI data into a Iorm, called a cipher text that cannot be easily understood by unauthorized people. Decryption Decryption is the conversion oI cipher text into plaintext that can be easily understood by people. Document Conventions In general this document Iollows the IEEE Iormatting requirements. We have used 'Times New Roman size 12 throughout the document Ior text ,used italics Ior comments. Document text should be single spaced and maintain the 1 margins Iound in this document. The headings are also in Arial Iont but are bold and have size 14. The major headings are highlighted to make them visible apart Irom the normal text
2. Overall Description
2.1 Product Perspective
The project originated as the Iinal year project to be submitted Ior the IulIillment oI B Tech degree course, Steganography is the art oI hiding the Iact that communication is taking place, by hiding inIormation in other inIormation. Many diIIerent carrier Iile Iormats can be used, but digital images are the most popular because oI their Irequency on the internet. For hiding secret inIormation in images, there exists a large variety oI steganography techniques some are more complex than others and all oI them have respective strong and weak points. DiIIerent applications may require absolute invisibility oI the secret inIormation, while others require a large secret message to be hidden. This project give an overview oI image steganography, its uses and techniques. It also attempts to identiIy the requirements oI a good steganography algorithm and brieIly reIlects on which steganographic techniques are more suitable Ior which applications.
The graphical representation oI this system is as Iollows:
Fig.1 5tart App!IcatInn Lnciyplion Dociyplion
Inago fiIo MI inago fiIo Inago Mossago fiIo
lmage
Message flle
Product Features O Carrier File image Iile O File Iormat are supported O Hidden Object can be a text Iile O Hidden Iiles can be oI any Iormat O Encryption in supported O Compression is supported O Multiple hidden Iiles can be stored in a single carrier Iile iI the size permit O Past steganographic task can be viewed by the help oI log Iile O Schedular is also available O Look oI the soItware can be changed at runtime O Context Sensitive is Present 2.3 User Classes and Characteristics User: They can perIorm the Steganographic task and have control over the user management and log Iile.
2.4 Operating Environment Operating System: Win Xp,2000,98,vista,windoes7 Software Requirement`s : C#,.net Framework 3.5 Hardware Requirement: 256mb ram RAM or higher,10mb disk space screen Resoulation:1024x768
Steganography System requires any type oI Iile in a deIinte place oI image. We could save Iile name beIore Iile inIormation in LSB layer and save Steganography system requires any type oI image Iile and the inIormation or message that is to be hidden. It has two modules encrypt and decrypt.
2.5 Design and Implementation Constraints MicrosoIt .Net Iramework prepares a huge amount oI tool and options Ior programmers that they simples programming. One oI .Net tools Ior pictures and images is auto-converting most types oI pictures to BMP Iormat. I used this tool in this soItware called 'Steganography that is written in C#.Net language and you can use this soItware to hide your inIormation in any type oI pictures without any converting its Iormat to BMP (soItware converts inside it). The algorithm used Ior Encryption and Decryption in this application provides using several layers lieu oI using only LSB layer oI image. Writing data starts Irom last layer (8st or LSB layer); because signiIicant oI this layer is least and every upper layer has doubled signiIicant Irom its down layer. So every step we go to upper layer image quality decreases and image retouching transpires. The encrypt module is used to hide inIormation into the image; no one can see that inIormation or Iile. This module requires any type oI image and message and gives the only one image Iile in destination. The decrypt module is used to get the hidden inIormation in an image Iile. It take the image Iile as an output, and give two Iile at destination Iolder, one is the same image Iile and another is the message Iile that is hidden it that. BeIore encrypting Iile inside image we must save name and size Iile size and Iile name size in most right-down pixels oI image. Writing this inIormation is needed to retrieve Iile Irom encrypted image in decryption state. 2.6 User Documentation Installation Guide, User Manual and Help File are provided separately with the product. Context sensitive help in integrated implicitly with the Product.
2.7Assumption and Dependencies: Dependencies: O 2 GB or higher storage required. O II project runs in diIIerent location the project may not run correctly.
Assumptions: O Operating System is only one oI NT Iamily.
3.External Interface Requirements 3.1 User Interfaces: It provides various Ieatures to user about the mode oI use oI soItware. User can choose text, image option and can do work on it. It also provides various other Ieatures like user management, compression , encryption,decryption, Iile. 3.2 Hardware Interfaces: Apart Irom the recommended conIiguration no other speciIic hardware is required to run the soItware. 3.3 Software Interfaces: O C# O .Net Framework 3.5
4. Other Nonfunctional Requirements 4.1 Performance Requirements O The RAM should be 128 mb at least. But 256 Mb RAM is Recommended. O The disk space required to strore the soItware is 20 Mb and to store the output Iiles. 4.2 Safety Requirements O The size constraints have to be evaluated by the end user only. O The soItware does not check Ior the size constraint. This is done to enhance the perIormance oI the soItware in terms oI speed. O In case size oI hidden object exceeds the max. Allowable size that can be hidden, the extra inIormation is truncated. The part oI hidden object oI size equal to maximum possible size is stored in carrier Iile. O The size oI hidden object that can be stored in a carrier Iile depends on the carrier Iile size and type oI Steganographic task. O The screen resolution should be set to 1027x768 or higher to get the complete view oI the soItware. In case oI lower screen resolution, the soItware not only looks awkward but also not completely visible. 4.3 Security Requirements O Application should not be open Ior public. O In Encryption and decryption should be used same application.
5. Other Requirements: There are no Iurther requirements other than the speciIied in this SRS under diIIerent headings.
6. References Websites Following websites are reIerring to create this project reports. O http://www.wikipedia.org Books Following books and eBooks are used to complete this project reports: O Mastering C# (Paperback) O SQL Server Bible (Paperback) O .NET Black Book (Paperback) O ProIessional C#, 2nd Edition (Paperback) O ProIessional ASP.NET (Paperback) O MCAD/MCSD SelI-Paced Training Kit: Developing Web Applications with MicrosoIt Visual Basic .NET and MicrosoIt Visual C# .NET, Second Edition O MCAD/MCSE/MCDBA SelI-Paced Training Kit: MicrosoIt SQL Server 2000 Database Design and Implementation, Exam 70-229, Second Edition