Vous êtes sur la page 1sur 42

Synopsis

4 4 .

PROPOSED METHOD
The P

roposed method here is Object Oriented analysis. Object oriented analysis is basicallyconcerned with the decomposition of a problem into its

component parts and establishing alogical model to describe the system functions. We follow this analysis as for the project.Object Oriented

A nalysis ( OO A ) approach consists of the following steps :


4 .1

Understanding the problem : This is the first step in the analysis process. The problem statement provides the basis for drawing the requirements

specification of both the user and the software .


4 . 2

Requirements Specifications : Once the problem is clearly defined ,

the next step is to understand what the proposed to do. B ased on the user requirements , the specification for the software should be drawn .

Thedeveloper should state clearly


y

What outputs are required ? A set of screens displaying the

output of data hiding and retrieval of hidden data .


y

What inputs are necessary ? Various interactive inputs that take the

user through the different stages encounteredduring the execution of the application .
y

What processes are involved to produce these

outputs ?Entering the text , choosing the picture , encoding , decoding display .
4 . 3 I

dentification of objects : Objects can often be identified in terms of the real world objects as well as the abstract objects.Their applications can be

best analyzed by using the data flow diagrams. Design is concernedwith the mapping of objects in the problem space into objects in the solution space and

creatingan overall structure and computational models for the system. This stage normally uses thebottom - up approach to build the structure of the

system and the top- down functionaldecomp osition approach to design the class member functions that provides services. Thesteganographic

process basically involves encoding, decoding and checking if encodable. Theseare the basic functions of the class codec and the pic codec

class. The encryption process ishandled by the crypt and objects .The remaining objects are the various dialogs for display

andinteraction with the user.

Synopsis
5

Fig 2 : A Steganography System

The above diagram consists

of the following parts :


y

Message File: This is the file to be encrypted.


y

Cover File: This is the image file that is used for encryption.
y

S teg File: This is the result of encrypting

message file with cover file.


y

S teganography Tool: This tool allows users to insert and extract

hidden data into andfrom steg files.


5 .

APPL
I I

CAT

ONS
y

Web based applications


y

S teganographic P rinters

Intelligence S ervices
y

Digital Watermarking
y

Defence

Synopsis
6 6 .

REFERENCES
1.
V

isual Cryptographic Steganography in Images, Piyush Marwaha1, Paresh Marwaha2,Infosys Technologies Limited, India2.

Proposal of a New Steganographic Approach, Amitabh Mishra , Akshay Gupta, D.K.


V

ishwakarma, Department of

Electronics & Communication Engineering, ASET, AmityUniversity, India3. Stegananlysis Method of Two

Least-Significant Bits Steganography Ke ZHANG Haiying GAO Wan-su BAO Zhengzhou Information Science and Technology

Institute, Zhengzhou,45000 4,China4. Designing of Robust Image Steganography Technique Based on LSB Insertion

and Encryption Mamta Juneja, Parvinder Singh Sandhu, Department of Computer Science and Engineering, Rayat and Bahra Institute of

Engineering and Bio-Technology, PunjabTechnical University, Punjab, India5. Significance of Steganography on Data Security

enkatraman.S, Ajith Abraham, MarcinPaprzycki, Dept. of Computer Science & Engineering, University of Madras, India6.

Analysis of LSB Based Image Steganography Techniques, R Chandramouli, MSyNC Lab,Stevens Institute Of

Technology, Dept. Of Electrical And Computer Science, Hoboken, NJ 070307. Authentication of Secret Information in Image

Steganography, K Suresh Babu, K B Raja,Kiran Kumar K, Manjula Devi T H,


V

enugopal K R, L M Patnaik, Department of

Computer Science and Engineering, University


V

isvesvaraya College of Engineering, BangaloreUniversi

ty,Bangalore 560 001


Synopsis - Image Steganography
Download this Document for FreePrintMobileCollectionsReport Document

Info and Rating


image steganography Follow Akash Singh

Share & Embed More from this user


PreviousNext 1.

32 p.

24 p.

6 p. 2.

29 p.

6 p.

Add a Comment
Top of Form

Bottom of Form

Upload a Document
Top of Form

Search Documents
Bottom of Form

Foll

Vous aimerez peut-être aussi