Académique Documents
Professionnel Documents
Culture Documents
4 4 .
PROPOSED METHOD
The P
roposed method here is Object Oriented analysis. Object oriented analysis is basicallyconcerned with the decomposition of a problem into its
component parts and establishing alogical model to describe the system functions. We follow this analysis as for the project.Object Oriented
Understanding the problem : This is the first step in the analysis process. The problem statement provides the basis for drawing the requirements
the next step is to understand what the proposed to do. B ased on the user requirements , the specification for the software should be drawn .
What inputs are necessary ? Various interactive inputs that take the
user through the different stages encounteredduring the execution of the application .
y
outputs ?Entering the text , choosing the picture , encoding , decoding display .
4 . 3 I
dentification of objects : Objects can often be identified in terms of the real world objects as well as the abstract objects.Their applications can be
best analyzed by using the data flow diagrams. Design is concernedwith the mapping of objects in the problem space into objects in the solution space and
creatingan overall structure and computational models for the system. This stage normally uses thebottom - up approach to build the structure of the
system and the top- down functionaldecomp osition approach to design the class member functions that provides services. Thesteganographic
process basically involves encoding, decoding and checking if encodable. Theseare the basic functions of the class codec and the pic codec
class. The encryption process ishandled by the crypt and objects .The remaining objects are the various dialogs for display
Synopsis
5
Cover File: This is the image file that is used for encryption.
y
APPL
I I
CAT
ONS
y
S teganographic P rinters
Intelligence S ervices
y
Digital Watermarking
y
Defence
Synopsis
6 6 .
REFERENCES
1.
V
isual Cryptographic Steganography in Images, Piyush Marwaha1, Paresh Marwaha2,Infosys Technologies Limited, India2.
ishwakarma, Department of
Electronics & Communication Engineering, ASET, AmityUniversity, India3. Stegananlysis Method of Two
Least-Significant Bits Steganography Ke ZHANG Haiying GAO Wan-su BAO Zhengzhou Information Science and Technology
Institute, Zhengzhou,45000 4,China4. Designing of Robust Image Steganography Technique Based on LSB Insertion
and Encryption Mamta Juneja, Parvinder Singh Sandhu, Department of Computer Science and Engineering, Rayat and Bahra Institute of
Engineering and Bio-Technology, PunjabTechnical University, Punjab, India5. Significance of Steganography on Data Security
enkatraman.S, Ajith Abraham, MarcinPaprzycki, Dept. of Computer Science & Engineering, University of Madras, India6.
Analysis of LSB Based Image Steganography Techniques, R Chandramouli, MSyNC Lab,Stevens Institute Of
Technology, Dept. Of Electrical And Computer Science, Hoboken, NJ 070307. Authentication of Secret Information in Image
32 p.
24 p.
6 p. 2.
29 p.
6 p.
Add a Comment
Top of Form
Bottom of Form
Upload a Document
Top of Form
Search Documents
Bottom of Form
Foll