Sie sind auf Seite 1von 4

7.

TESTING
Software Testing is the process used to help identify the correctness, completeness, security, and quality of developed software. Testing is a process of technical investigation, performed on behalf of stakeholders, that is intended to reveal quality-related information about the product with respect to the context in which it is intended to operate. This includes, but is not limited to, the process of executing a program or application with the intent of finding errors

System Test Plan


System Testing checks the product as a whole. White box Testing White box testing (a.k.a. clear box testing, glass box testing or structural testing) uses an internal perspective of the system to design test cases based on internal structure. It deals with coverage of each activity in each use case(according to activity diagram).

Levels of Testing
The different levels of testing that are to be conducted are 1. Code Testing 2. Program Testing 3. System Testing Code Testing: The code test has been conducted to test the logic of the program. Program Testing: Program testing is also called unit testing. The modules in the system are integrated to perform the specific function. The modules have been tested independently, later assembled and tested thoroughly for integration between different modules. System Testing: System testing has been conducted to test the integration of each module in the system .It is used to find discrepancies between the system and its original objective.

20

Software Testing is carried out in three steps The first step includes unit testing where in each module is tested to provide his correctness, validity and also determine any missing operations. Errors are noted down and corrected immediately. Unit testing is the import and major part of the project. So errors are rectified easily in particular module and program clarity is increased. In this project entire system is divided into several modules and is developed individually. So unit testing is conducted to individual modules. The second step includes integration testing. It need not be the case, the software whose modules when run individually and showing perfect results, will also show perfect results when run as a whole. The individual modules are clipped under this major module and tested again and the results are verified. The final step involves validation and testing which determines the software functions as the user expected. Here also there may be some modifications. In the completion of the project it is satisfied fully by the user.

Testing Objective:
Testing is a process of executing a program with the intent of finding an error. A good test case is the one that has a high probability of finding an as-yet undiscovered error. A successful test is one that uncovers an as-yet undiscovered error.

In order to make sure that the system does not have errors, the different levels of testing strategies that are applied at different stages of software development are: Unit Testing. System Testing.

Unit Testing:
Unit testing is done on individual modules as they are completed and become executable. Unit testing treats each component as stand-alone entity which does not need other components during the testing process.

21

System Testing:
This involves in-house testing of the entire system before delivery to the user. Its aim is to satisfy the user. The system meets all the requirements of the clients specification.

7.1 Test Results:Sender(Alices) View: 1. Test case Input Process Output : Sending a message : Enter senders email id, password, receivers email id, message : Click on the send button. If entered details are correct messege sent dialogue box appears. : Displays message sent dialogue box.

Receiver(Bobs) View: 2. Test case Input Process Output : Reading email : Enter emai id(Bob),password and senders(Alice) email id, decrypted password.. :Click on GetMail button, In the Message box secret message sent by Alice appears on to the screen. : Email read by Bob after running application screen appears.

Third person(Eves) View: 3. Test case Input Process Output : Reading email with wrong password. : Enters Alices gmail id and password with wrong decrypted password. :Clicks on GetMail button, In the Message box **Image corrupted/wrong password** message appears. : Image corrupted/wrong password screen appears.

22

8. CONCLUSION
As Steganography only hides the data into another medium (for e.g. digital image), once noticed the hidden data could be retrieved with known algorithms. Thus Steganography must be used in conjunction with Cryptography to combine data obfuscation and data hiding properties to make Message Communication between Alice and Bob even more secure. However, Steganography alone gives the clear advantage over cryptography such that messages do not attract attention to themselves, to messengers, or to recipients. There are several algorithms for hiding/retrieving the data from the target image but most of them suffer from some amount of loss of hidden data while retrieving it. All three research papers propose techniques to improve the process of hiding data in order to better retrieve it suffering minimal data loss. Moreover, the Content Based Image Authentication System with Lossless Data Hiding method suggested in third research paper is comparatively easy to implement in practical scenarios and therefore could be applied commercially

9. REFERENCES
1.Java 2, the complete reference, Pabrick Naughton, Tata McGraw Hill 2005 2.http://en.wikipedia.org/wiki/Steganography

3..http://technet.microsoft.com/en-us/library/cc875813.aspx 4.A Unified Modeling Language User Guide, 2nd edition, Book by Grady Booch, James Rumbaugh ,IvarJacobson for UML concepts and models.

23

Das könnte Ihnen auch gefallen