Professional Documents
Culture Documents
for
Secret Painter
Prepared by
Page ii
Contents
1 INTRODUCTION......................................................................................................................................................1 2 OVERALL DESCRIPTION.....................................................................................................................................1 3 SPECIFIC REQUIREMENTS.................................................................................................................................4 4 OTHER NON-FUNCTIONAL REQUIREMENTS...............................................................................................6
Page 1
1 Introduction
1.1 Document Purpose
This document aims at providing a detailed description of the application titled Secret Painter. This document will provide information about the functionalities, technologies inovolved, targeted users and various other aspects of this application. This document is intended to provide an authoritataive and detailed outline regarding all aspects of the Secret Painter application such as operating environment, design and implementation constraints, functional requirements of the application etc.
2 Overall Description
2.1 Product Perspective
The product perspective of this application is the technique of steganography, in this method; data can encoded within an image. This image can later be decoded at the receiver side using the same
Page 2
application ie Secret Painter to retrieve the original data in each image after providing the required authentication.
2.2
Product Functionality
The application allows a great deal of flexibility to the user, he can choose the text file that he wants to encode, he can choose the image file which will carry the encoded hidden data, he can even set password for that individual image in order to increase the level of security. Some of the functionalities offered by Secret Painter are: Allows user to select the text file that needs to be encoded Allows the user to select any image to be the carrier for the previously selected text file Enables the image to be password authenticated so that image cannot be easily decoded by a third-party using the Secret application. This increases the level of protection.
Saviour Mode In this the user will be able to decode the image received to recover the original data after providing necessary authentication details. He can then view, edit the original data.
Page 3
o Operating Environment
2.4.1 Hardware requirements o Processor o Main Memory o Hard Disk o Display 2.4.2 Software requirements o Operating System o Language Used o Tools : Intel Pentium IV or higher : 512 MB or higher : 160 GB : 15 color monitor or more : Windows XP or higher. : Java : Net Beans IDE
o User Documentation
After the developmental stage of the application is over, a step by step manual with screenshots of each step will be created to educate the users on how to use the application. The manual will cover all operational aspects of the application.
Page 4
3 Specific Requirements
3.1 External Interface Requirements
3.1.1 User Interfaces As mentioned earlier, the users in Secret painter can operate in two different modes for specific functionalities the interfaces in each mode will have the following buttons and features namely Pirate mode (Encoding Mode) In this mode, the interface will assume a dark background and will have options to select and upload the text file to be hidden. Specific options for selecting the image which will be the carrier. This mode will also have button which will enable user to set the password for authentication. Saviour mode (Decoding Mode) In this, the interface will assume a light background and the user will be able to decode the image received to recover the original data after providing necessary authentication details. He can then view or edit the original data in any text editor.
3.1.2 Hardware Interfaces Since this project is a system based application all activities regarding the project takes place within the system with minimal interfaces to the hardware components of the system. 3.1.3 Communications Interfaces Secret Painter is a system based application in which the encoded data is carried from source to destination by the user in storage devices like USB drives , or SD cards there is no need of communication protocols like HTTP etc for the implementation of this project. The only requirement is that the Secret painter application should be available at source and destination.
Page 5
Functional Requirements
Page 6
Page 7
Page 8