You are on page 1of 51

STEGANOGRAPHY

(A new technique to hide information within image file)

1
STEGANOGRAPHY
(A new technique to hide information within image file)

A PROJECT REPORT
Submitted By
S.PRADEEP
REG.NO. 0936JO127
Under the Guidance of
Mr. D.BOOMINATH M.C.A., M.Phil.,

A Project report submitted to


DEPARTMENT OF COMPUTER SCIENCE

In partial fulfillment of the requirements for the award of the degree of


MASTER OF INFORMATION TECHNOLOGY
IN

MARCH-2011

RATHINAM COLLEGE OF ARTS AND SCIENCE


(Affiliated to Bharathiar University , Accredited with B++ grade by
NAAC, Approved by AICTE and ISO 9001:2008 Certified Institution),
Rathinam Techzone Campus, Pollachi Main Road,
Eachanari, Coimbatore-641021.

2
CERTIFICATE

This is to certify that the project work entitled “STEGANOGRAPHY” submitted


to Bharathiar University in partial fulfillment of the requirements for the award of the
degree of MASTER OF INFORMATION TECHNOLOGY is a record of original
work done by supervision and guidance and that this project work has not formed the
basis for the award of any degree or similar title to any candidate of our college.

Guide Head of the Department

Principal

Submitted for the university examination held on ____________________

INTERNAL EXAMINER EXTERNAL EXAMINER

3
DECLARATION

I here by declare that this bonafied project work entitled the study on
“STEGANOGRAPHY” submitted to the Rathinam college of Arts and Science, in
partial fulfillment of the requirement for the award of the Degree of MASTER OF
INFORMATION TECHNOLOGY is the original work done by me during 2009-2011
under the supervision of Mr.D.BOOMINATH M.C.A.,M.Phil., Lecturer in Department
of computer Science, Rathinam college of Arts and Science, Coimbatore.

Signature of the candidate

NAME : S.PRADEEP
REG. NO : 0936JO127
COURSE : M.SC (INFORMATION TECHNOLOGY)
COLLEGE : Rathinam College of Arts & Science
PLACE : Coimbatore
DATE :

4
ACKNOWLEDGEMENT

I thank God for his grace and blessings that have been showered upon me to bring
success for this project.

I extend my thanks to our chairman DR. MADAN A SENDHIL M.S., Ph.D., for
having given his concern to do my project in his organization.

I thank my respected administrative officer Mr. R. MANICKAM M.C.A., M. Phil.,


for having facilitated permission for this project.

I am grateful to our Principal Dr.P.MURUGESAN M.A., M.Phil., Ph.D., for


allowing me to undertake this project.

I am indebted to my internal guide Mr. D.BOOMINATH M.C.A., M.Phil., Head of


the department of computer science my thanks are due to him for her valuable and timely
help not only during the project schedule but during my career as her student for the past
three years. She is also my guide.

I extend my thanks to my class tutor. Mr.P.BOOPATHY MCA., M.Phil., Besides


mentioning a few names my thanks are due to all my staff for their guidance and support.

I thank my parents, friends, and everlasting almighty for giving me the necessary
courage and for his invisible guidance to complete this project.

5
SYNOPSIS

Steganography is the art of hiding the fact that communication is taking place, by
hiding information in other information. Many different carrier file formats can be used,
but digital images are the most popular because of their frequency on the internet.

For hiding secret information in images, there exists a large variety of steganography
techniques some are more complex than others and all of them have respective strong and
weak points.

Different applications may require absolute invisibility of the secret information,


while others require a large secret message to be hidden. This project report intends to
give an overview of image steganography, its uses and techniques. It also attempts to
identify the requirements of a good steganography algorithm and briefly reflects on
which steganographic techniques are more suitable for which applications.

6
CHAPTER I. INTRODUCTION

1.1 AN OVER VIEW

The word steganography comes from the Greek “Seganos”, which mean covered or
secret and – “graphy” mean writing or drawing. Therefore, steganography mean, literally,
covered writing. It is the art and science of hiding information such its presence cannot be
detected and a communication is happening. A secrete information is encoding in a
manner such that the very existence of the information is concealed. Paired with existing
communication methods, steganography can be used to carry out hidden exchanges.

The main goal of this projects it to communicate securely in a completely undetectable


manner and to avoid drawing suspicion to the transmission of a hider data. There has
been a rapid growth of interest in steganography for two reasons:

The publishing and broadcasting industries have become interested in techniques for
hiding encrypted copyright marks and serial numbers in digital films, audio recordings,
books and multimedia products.

Moves by various governments to restrict the availability of encryption services have


motivated people to study methods by which private messages can be embedded in
seemingly innocuous cover messages.
The basic model of steganography consists of Carrier, Message and password. Carrier
is also known as cover-object, which the message is embedded and serves to hide the
presence of the message.

7
Basically, the model for steganography is shown on following figure:

Cover-
object, C

Message, Stego Object,


M F(X, M, Z
K)

Stego-key,
K

Message is the data that the sender wishes to remain it confidential. It can be plain
text, cipher text, other image, or anything that can be embedded in a bit stream such as a
copyright mark, a covert communication, or a serial number. Password is known as
stego-key, which ensures that only recipient who knows the corresponding decoding key
will be able to extract the message from a cover-object. The cover-object with the
secretly embedded message is then called the Stego-object.

Recovering message from a stego-object requires the cover-object itself and a


corresponding decoding key if a stego-key was used during the encoding process. The
original image may or may not be required in most applications to extract the message.

There are several suitable carriers below to be the cover-object:


• Network protocols such as TCP, IP and UDP
• File and Disk that can hides and append files by using the slack space
• Text such as null characters, just alike Morse code including html and java
• Images file such as bmp, gif and jpg, where they can be both color and gray-scale.

In general, the information hiding process extracts redundant bits from cover-object.
The process consists of two steps:

8
• Identification of redundant bits in a cover-object. Redundant bits are those bits
that can be modified without corrupting the quality or destroying the integrity of the
cover-object.
• Embedding process then selects the subset of the redundant bits to be replaced
with data from a secret message. The stego-object is created by replacing the selected
redundant bits with message bits

9
CHAPTER II. SELECTION OF THE ORGANIZATION

MICROMATE COMPUTERS runs on a unique combination of advanced software


and hardware. The heart of our software is web site development along with customized
software packages, project development and implementations.

People are our asset-This statement is more than a slogan at MICROMATE


COMPUTERS, it is our business. We have the best of Indian talent for delivering an
international quality services in a cost effective business model. So caring for nurturing
people is a synergistic combination of philosophy and business.

MICROMATE COMPUTERS is having strength of 9 software and 2 hardware


engineers working with reputed projects in hand and having committed employee base, it
will play a prominent role in the coming networked era.

Software Solutions – Here, we build up from initial study using our industry
knowledge and after a client need analysis, a complete business application for the
customer.

We have strong skills and experience in building custom application in the


industry/technology of our focus. Our project managers have been part of large enterprise
application development and deployment projects.

Typically, then they can begin with a through need analysis so as to prepare a system
requirement document. Then they can manage the entire development cycle and ensure a
smooth and effective implementation. They also have the ability to train people on the
system usage.

10
We develop,
• New Internet applications
• New Intranet applications
• User friendly applications, and
• New application in the retail banking, credit cards management etc.

Expertise:
Web enabling business application is thrust area. In the Internet era, web-enabling
applications are not just a technology issue but a business proposition as well. It has the
expertise to implement turnkey commercial application development projects covering
the entire software Development life cycle from initial system study, system design, code
development, testing, implementation, maintenance to training users on the application.

11
CHAPTER III. PROBLEM FORMULATION

3.1 PROBLEM IDENTIFICATION

The former consists of linguistic or language forms of hidden writing. The later, such
as invisible ink, try of hide messages physically. One disadvantage of linguistic
steganography is that users must equip themselves to have a good knowledge of
linguistry. In recent years, everything is trending toward digitization. And with the
development of the internet technology, digital media can be transmitted conveniently
over the network. Therefore, messages can be secretly carried by digital media by using
the steganography techniques, and then be transmitted through the internet rapidly

Steganography is the art of hiding the fact that communication is taking place, by
hiding information in other information. Many different carrier file formats can be used,
but digital images are the most popular because of their frequency on the internet. For
hiding secret information in images, there exists a large variety of steganography
techniques some are more complex than others and all of them have respective strong and
weak points.

So we prepare this application, to make the information hiding simpler and user
friendly.

12
3.2 EXISTING SYSTEM

The existing system uses hide the image in an image, in both the methods there are
number of loopholes through which the hackers can attack the message. The hackers may
change or damage the entire message. So there is no safety in transferring the data via
image.

It is possible to combine the techniques by encrypting message using cryptography


and then hiding the encrypted message using steganography. The resulting stego-image
can be transmitted without revealing that secret information is being exchanged.

Steganography pay attention to the degree of Invisibility while watermarking pay most
of its attribute to the robustness of the message and its ability to withstand attacks of
removal, such as image operations(rotation, cropping, filtering), audio
operations(rerecording, filtering)in the case of images and audio files being watermarked
respectively.

DRAWBACKS
 It provides less security, because the secret messages are hacked by the hackers
and competitive companies.
 It does not have proper reliability.
 There is no proper acknowledgement.
 The authority is not properly maintained.

3.3 PROPOSED SYSTEM

To overcome the limitations of the existing system a new system has been proposed
using C# .Net. In this system we used two methods to add security to the file. The first
method, cryptography is a technique of hiding the message in the text file. So that the
authorized users can’t get the original information. On the receiving end, only by
knowing the private key (i.e., password) the user can decrypt the message.

13
The method, Steganography is a computer technique (or an art). It is same as text
encryption. But the message can be hidden in the picture in the pixel format.

To provide high degree of correctness and effectiveness and to reduce the workload it
is very important to computerize the system. System computerized is easy to handle and
provide the high accuracy in its output.
Since the software is developed for multi-user Environment the password protection is
provided to protect it from unauthorized user.

ANTICIPATED ADVANTAGES
 It provides high security and reliability occurs.
 The authorization is highly provided.
 It gives assurance for the security of data.
 There is no chance for hacking.
 Because the data is in the form of Encrypted text.

3.4 SYSTEM OBJECTIVES

The goal of steganography is to covert communication. So, a fundamental requirement


of this steganography system is that the hidden message carried by stego-media should
not be sensible to human beings.

The other goal of steganography is to avoid drawing suspicion to the existence of a


hidden message. This approach of information hiding technique has recently became
important in a number of application area

This project has following objectives:


• To product security tool based on steganography techniques.
• To explore techniques of hiding data using encryption module of this project
• To extract techniques of getting secret data using decryption module.

14
Steganography sometimes is used when encryption is not permitted. Or, more
commonly, steganography is used to supplement encryption. An encrypted file may still
hide information using steganography, so even if the encrypted file is deciphered, the
hidden message is not seen

SPECIFIC OBJECTIVE

The objective of “Steganography” is to increase the efficiency of the system to reduce


the manual work time.

 It is more effective and efficient way to transfer the file to the receiving end.
 Easy method to manage the information so that the hackers can’t understand the
message.

3.5 HARDWARE SPECIFICATION

Processor : Intel P4 2.88 GHz


Memory Size : 1 GB
Hard disc : 160 GB
Floppy disk drive : 1.44 MB
CDROM drive : 52X 32 CDROM drive
Monitor : 15” Color
Keyboard : HCL 107
Mouse : 2 Button Mouse

3.6 SOFTWARE SPECIFICATION

Operating system : Windows XP


Front-End : .NET Framework 3.5
3.7 APPLICATION SPECIFICATION

15
WINDOWS XP

Windows XP is an operating system that was produced by Microsoft for use on


personal computers, including home and business desktops, laptops, and media centers. It
was first released to computer manufacturers on August 24, 2001, and is the most popular
version of Windows, based on installed user base. The name "XP" is short for
"eXPerience.

Windows XP was the successor to both Windows 2000 and Windows Me, and was the
first consumer-oriented operating system produced by Microsoft to be built on the
Windows NT kernel and architecture. Windows XP was released for retail sale on
October 25, 2001, and over 400 million copies were in use in January 2006, according to
an estimate in that month by an IDC analyst. It was succeeded by Windows Vista, which
was released to volume license customers on November 8, 2006, and worldwide to the
general public on January 30, 2007.

Direct OEM and retail sales of Windows XP ceased on June 30, 2008. Microsoft
continued to sell Windows XP through their System Builders (smaller OEMs who sell
assembled computers) program until January 31, 2009. XP may continue to be available
as these sources run through their inventory or by purchasing Windows 7 Ultimate,
Windows 7 Pro, Windows Vista Ultimate or Windows Vista Business, and then
downgrading to Windows XP.

FEATURES OF WINDOWS XP

16
Built on the new Windows engine
Windows XP Professional is built on the proven code base of Windows NT and
Windows 2000, which features a 32-bit computing architecture and a fully protected
memory model. Windows XP Professional will provide a dependable computing
experience for all business users.

Enhanced device driver verifier


Building on the device driver verifier found in Windows 2000, the Windows XP
Professional will provide even greater stress tests for device drivers.

Dramatically reduced reboot scenarios


The dramatically reduced reboot scenario eliminates most scenarios that force end
users to reboot in Windows NT 4.0 and Windows 95/98/Me. Also, many software
installations will not require reboots.

Improved code protection


Critical kernel data structures are read-only, so that drivers and applications cannot
corrupt them. All device driver code is read-only and page protected. Rogue applications
cannot adversely affect core operating system areas.

Side-by-side DLL support


Provides a mechanism for multiple versions of individual Windows components to be
installed and run "side by side". This helps to address the "DLL hell" problem by
allowing an application written and tested with one version of a system component to
continue to use that version even if an application that uses a newer version of the same
component is installed.

Windows File Protection

17
Windows file protection protects core system files from being over written by
application installations. If a file is overwritten, Windows File Protection will restore the
correct version.

.NET FRAMEWORK

The Microsoft .NET Framework is an integrated and managed environment for the
development and execution of your code. The .NET Framework is a managed, type safe
environment for application development and execution. The framework manages all
aspects of the execution of your program: it allocates memory for the storage of data and
instructions, grants or denies the appropriate permissions to your application, initiates and
manages application execution, and manages the reallocation of memory for resources
that are no longer needed. The .NET Framework consists of two main components: the
common language runtime and the .NET Framework class library.

The .NET Framework is a software framework for Microsoft Windows operating


systems. It includes a large library, and it supports several programming languages which
allow language interoperability (each language can use code written in other languages).
The .NET library is available to all the programming languages that .NET supports.

The framework's Base Class Library provides user interface, data access, database
connectivity, cryptography, web application development, numeric algorithms, and
network communications. The class library is used by programmers, who combine it with
their own code to produce applications.

Programs written for the .NET Framework execute in a software (as contrasted to
hardware) environment, known as the Common Language Runtime (CLR). The CLR is
an application virtual machine so that programmers need not consider the capabilities of
the specific CPU that will execute the program. The CLR also provides other important
services such as security, memory management, and exception handling. The class library
and the CLR together constitute the .NET Framework.

18
FEATURES OF .NET FRAMEWORK

With its language enhancements and its tight integration into the .NET Framework,
Visual Basic is a thoroughly modernized language that will likely become the premier
development tool for creating a wide range of .NET applications. In the past, Visual
Basic was often seen as a "lightweight" language that could be used for particular kinds
of tasks, but was wholly unsuitable for others.
 Object Orientation.
 Common Type System.
 Access to System Services: The Framework Class Library.
 A Common Runtime Environment.

.NET FRAMEWORK has a number of features hat help it retain backwards


compatibility with Visual Basic 6(VB6). Other features have been added specifically to
adapt Visual Basic to object-oriented programming and to the .NET platform.

.NET FRAMEWORK provides support in the language to find bugs early in the
development process. This makes for code that is easier to maintain and programs that
are more reliable.

THE .NET PLATFORM

In July 2000, Microsoft announced the .NET platform, a development framework that
provides a new way to create Windows applications. However, .NET goes beyond
traditional Windows programming to facilitate creating web application quickly and
easily. And .NET FRAMEWORK is one of the premier languages that Microsoft
supports for development in this new and exciting .NET space.

Reports are that Microsoft is devoting 80% of its research and development budget
to .NET and its associated technologies. The results of this commitment are impressive.

19
The .NET FRAMEWORK language can be used to develop two types of applications
that can be run on windows:
• Console applications display no graphics.
• Windows applications use the standard Windows interface.

COMMON LANGUAGE RUNTIME

The CLR is the heart of the .NET framework. It is the engine that drives key
functionality. “Runtime” is a component that a computer processes in order to execute
programs written in a particular programming language.

Here is how the CLR works. First of all, the source code written in a .NET language
gets compiled to the Intermediate Language (IL) and at the same time metadata
information is created by using the Meta data engine. These are optimally linked with
other code compiled by different compilers and the result is an EXE or DLL containing
the IL code, which is saved to disk.

Then, on execution, the IL code and any functionality from the .NET base class
libraries is brought together by using the class loader. Then, the combined code is
optimally tested for type safety by using the verifier before the Just-In-Time (JIT)
compiler comes to play. The JIT compiler processes the IL, creating managed native
code. Then, the managed native code is passes on to the .NET runtime manager.

CHAPTER 1V. SYSTEM ANALYSIS

20
Steganography system requires any type of image file and the information or message
that is to be hidden. It has two modules encrypt and decrypt.

Microsoft .Net framework prepares a huge amount of tool and options for
programmers that they simples programming. One of .Net tools for pictures and images is
auto-converting most types of pictures to BMP format. I used this tool in this software
called “Steganography” that is written in C#.Net language and you can use this software
to hide your information in any type of pictures without any converting its format to
BMP (software converts inside it).

The algorithm used for Encryption and Decryption in this application provides using
several layers lieu of using only LSB layer of image. Writing data starts from last layer
(8th or LSB layer); because significant of this layer is least and every upper layer has
doubled significant from its down layer. So every step we go to upper layer image quality
decreases and image retouching transpires.

The encrypt module is used to hide information into the image; no one can see that
information or file. This module requires any type of image and message and gives the
only one image file in destination.

The decrypt module is used to get the hidden information in an image file. It take the
image file as an output, and give two file at destination folder, one is the same image file
and another is the message file that is hidden it that.

Before encrypting file inside image we must save name and size of file in a definite
place of image. We could save file name before file information in LSB layer and save
file size and file name size in most right-down pixels of image. Writing this information
is needed to retrieve file from encrypted image in decryption state.

4.1 ENCRYPTION PROCESS

21
IMAGE FILE INFORMATION FILE

BMP FILE

4.2 DECRYPTION PROCESS

22
BMP FILE

INFORMATION FILE IMAGE FILE

CHAPTER V. DESIGN AND DEVELOPMENT

23
5.1 DESIGN PROCESS

5.1.1 INPUT DESIGN

The input design is the process of entering data to the system. The input design goal is
to enter to the computer as accurate as possible. Here inputs are designed effectively so
that errors made by the operations are minimized. The inputs to the system have been
designed in such a way that manual forms and the inputs are coordinated where the data
elements are common to the source document and to the input. The input is acceptable
and understandable by the users who are using it.

The quality of the system input determines the quality for system output. Input
specification describes the manner in which data entered the system processing.

Input design is the process of converting user-originated inputs to a computer-based


format input data are collected and organized into group of similar data. Once identified,
appropriate input media are selected for processing.

The input design also determines the user to interact efficiently with the system. Input
design is a part of overall system design that requires special attention because it is the
common source for data processing error. The goal of designing input data is to make
entry easy and free from errors.
Five objectives of the input design are:
 Effectiveness
 Accuracy
 Ease to use
 Consistency
 Attractiveness
The main objectives that are done during the input design are:
 Data are collected from the source
 Transfer of data to an input form is done

24
 Data is converted to a computer acceptable form
 The converted data are verified.
 Data are checked for its accuracy.
 Validation of input data are done
 Data collections are done to eliminate the error

5.1.2 OUTPUT DESIGN

The output design was done so that results of processing could be communicated to
the users. The various outputs have been designed in such a way that they represent the
same format that the office and management used to.

Computer output is the most important and direct source of information to the user.
Efficient, intelligible output design should improve the systems relationships with the
user and help in decision making. A major form of output is the hardcopy from the
printer.

Output requirements are designed during system analysis. A good starting point for
the output design is the Data Flow Diagram (DFD). Human factors educe issues for
design involves addressing internal controls to ensure readability.

Design is concerned with identifying software components specifying Relationships


among components. Specifying software structure and providing blue print for the
document phase.

Modularity is one the desirable properties of large systems. It implies that the system
is divided into several parts. In such a manner, the interaction between parts is minimal
clearly specified.
Design will explain software components in detail. This will help the implementation
of the system. Moreover, this will guide the further changes in the system to satisfy the
future requirements.

25
System design is described as a process of planning a new business system or more to
replace or to complement an existing system. The system design states how a system will
meet the requirements identified during the system analysis.

It describes a solution of approaching to the creation of new system. System design is


a transmission from a user-oriented document to a document oriented to programmers. It
goes through a logical and physical design.
The key points followed at the times of designing are:
 Preparing input and output specification
 Data flows and stores
 Preparing security and control specification
 Temporary and permanent collection of data
 A walk through before implementation
 Process

Reviewing the study phase activities and making decisions about which functions are
to be performed by the hardware, software, and human ware started in the design phase.
The output, input and file design for each of the programs was done. Finally, the
generalized systems were explained to the management for approval.

The steps involved in designing phase were:


a) The function to be performed is identified
b) The input, output and file design is performed
c) The system and component cost requirements is specified
d) The design phase report is generated.

CHAPTER VI. TESTING AND IMPLEMENTATION

26
6.1 SYSTEM TESTING

System testing is the process of exercising software with the intent of finding and
ultimately correcting errors. This fundamental philosophy does not change for web
applications, because web-based systems and applications resides on a network and
interoperate with many different operating systems, browsers, hardware platforms, and
communication protocols, the search for errors represents a significant challenge for web
applications.

The distributed nature of client-server environments, the performance issues


associated with transaction processing, the potential presence of number of different
hardware platform, the complexities of network communications, the need to serve
multiple clients from a centralized database and the requirements imposed on the server
all combine to make testing of client-server architectures.

TESTING ISSUES

 Client GUI considerations


 Target environment and platform diversity considerations
 Distributed processing considerations

6.2 TESTING METHODOLOGIES

User needs to run the application. The user has two tab options – encrypt and decrypt.
If user select encrypt, application give the screen to select image file, information file and
option to save the image file. If user select decrypt, application gives the screen to select
only image file and ask path where user want to save the secrete file.

This project has two methods – Encrypt and Decrypt.

27
In Encryption the secrete information is hiding in with any type of image file.

Decryption is getting the secrete information from image file. The objective of the
testing is to discover errors. To fulfill this objective a series of test step unit, integration,
validation and system tests were planned and executed. The test steps are:

6.2.1 UNIT TESTING


Unit is the testing changes made in an existing or new program. This test is carried out
during the programming and each module is found to be working satisfactory. In the
registration form user details are stored in database without any change.

6.2.2 INTEGRATION TESTING


A comprehensive integration testing is carried out using integrated test plans in the
design phase of the development as guide to ensure the behavior of functions with live
data. The administrator module can integrate with user module.

6.2.3 VALIDATION TESTING


Software validation is achieved through the series of tests that demonstrate
confirmative with requirement. Thus the proposed system and considerations has been
tested by validation and found to be working satisfactorily.

6.2.4 OUTPUT TESTING


Asking the user about the format required by them to test the output generated by the
system under considerations. It can be considered in two ways, one on the screen and the
other is printed format. The output format on the screen is found to be correct as the
format designed in the system design.

TESTING RESULTS

28
All tests should be traceable to customer requirements. The focus of testing will shift
progressively from programs. Exhaustive testing is not possible. To be more effective,
testing should be one, which has probability of finding errors.

The following are the attributes of good test:


 A good test has a high probability of finding an error.
 A good test is not redundant.
 A good test should be “best of breeds”.
 A good test should neither too simple nor too complex.

6.3 QUALITY ASSURANCE

Quality assurance consists of auditing and reporting functions of management. The


goal of quality assurance is to provide management with the data necessary to be
informed about product quality, thereby gaining insight and confidence that product
quality is meeting its goal.

QUALITY ASSURANCE GOALS

CORRECTNESS - The extent to which the program meets system specifications and
user objectives.

RELIABILITY - The degree to which the system performs Intended functions overtime.

EFFICIENCY - The amount of computer resources required by a program to perform a


function.

USABILITY - The effort required learning and operating a system.

MAINTAINABILITY - To use with which program errors are located and corrected.

29
TESTABILITY - The effort required testing a program to ensure its correct
performance.

PORTABILITY - The ease of transporting a program from one hardware configuration


to another.

ACCURACY - The required portion in input editing, computation and output.

6.3 SYSTEM IMPLEMENTATION

Implementation is the stage in the project where the theoretical design is turned a
working system. The most crucial stage is achieving a successful new system and giving
the user confidence in that the new system will work efficiently and effectively in the
implementation stage.

The stage consists of


 Testing the developed program with simple data.
 Detections and corrections.
 Creating whether the system is meets user requirements.
 Testing whether the system.
 Making necessary changes as desired by the user.
 Training user personnel.

6.4 IMPLEMENTATION PROCEDURES

30
The implementation phase is less creative than system design a system project
may be dropped at any time prior to implementation although it becomes more difficult
when it goes to the design phase.

The final report to the implementation phase includes procedural flow charts,
record layout, report layout and a workable plan for implementing the candidate system
include an operational one. Conversion is one aspect of implementation.

Several procedures of documents are unique to the conversion phase. They


include the following

 The conversion portion of the implementation plan is finalized and approved.


 Files are converted.
 Parallel processing between the existing and the new system of logged on the
special form.
 Assuming no problems, no parallel processing is discontinued.
 Implementation results for documented for reference.
 Conversion is completed. Plans for the post implementation review are prepared.
Following the review the new system is officially operational.

USER TRAINING

User training is designed to prepare the user for testing and converting the system.
There are several ways to train the user they are:
 User manual
 Help screens
 Training demonstration

TRAINING DEMONSTRATION

31
Another user training element is a training demonstration. Live demonstration with
personal contact is extremely effective for training users.

6.5 SYSTEM MAINTENANCE

Maintenance is actually the implementation of the review plan. As important as it is,


many programmers and analysts are to perform are identify themselves with the
maintenance effort. There are psychologist, personality and professional reasons, for this.

Analyst and programmers spend far more time to maintain the program. Then they do
writing them. Maintenance accounts for 50-80% of total system development.

Maintenance is expensive. One way to reduce maintenance cost is through


maintenance management and software modification audits.

Maintenance is not as rewarding as exciting as developing system. It is perceived as


required neither skill not experience.

User are not fully cognizant of the maintenance problem are its high cost.

Few tools and techniques are available for maintenance.

A good test plan is lacking.

Standard, procedures and guidelines are poorly defined and efforted.

Programs are often maintained without care for structure and documentation.

There are minimal standard for maintenance.

32
CONCLUSION

The project entitled “STEGANOGRAPHY” is developed in .Net at “MICROMATE


COMPUTERS”. The project is tested successfully. After successful completion of this it
has been tested with test data and found the result in a satisfactory manner.

The process of encryption and decryption are maintained more simple and easy. The
system is highly scalable, visible and user friendly. It is implemented and gone through
all validation. All phases of development were conceived using methodologies and now
the software executes successfully by fulfilling the objective of the project.

All the objective of the system has been met. The system minimizes the problem
arising in the existing manual system. It eliminates the human errors to zero level. Further
extensions to this system can be made as requirement is satisfies by the proposed system.

33
CHAPTER VII. SCOPE OF THE FUTURE DEVELOPMENT

This project is developed for hiding information in any image file. The scope of the
project is implementation of steganography tools for hiding information includes any
type of information file and image files and the path where the user wants to save Image
and extruded file.

Modification and enhancement can be made affecting any other part of the program
because of the user friendliness and understandability of the project.

The data screens can be upgraded and menus can be easily added when required.
Items can be added to the forms when there comes necessity of new data.

The system has much scope in the future an it can be developed to add more features
to satisfy the user‘s request and company’s request.

34
CHAPTER VIII. BIBLIOGRAPHY

WEBSITES

Following websites are referring to create this project reports.


• http://www.google.com
• http://www.codeproject.com
• http://www.asp.net
• http://www.asp123.com
• http://www.wikipedia.org

BOOKS

Following books and ebook are used to complete this project reports.
• .NET Black Book (Paperback)
• Professional ASP.NET (Paperback)
• MCAD/MCSD Self-Paced Training Kit: Developing Web Applications with
Microsoft® Visual Basic® .NET and Microsoft Visual C#® .NET, Second Edition
• MCAD/MCSE/MCDBA Self-Paced Training Kit: Microsoft SQL Server 2000
Database Design and Implementation, Exam 70-229, Second Edition

35
APPENDICES

A. SYSTEM FLOW DIAGAM (SFD):

Start
Application

Encryption Decryption

Message Image file


Image
f
file

BMP image
file

36
B. DATA FLOW DIAGRAM (DFD):

START

Main
Form

ENCRYPTION Choice DECRYPTION


Selectio
n

Load Encrypted
Image & File
File

DECRYP
ENCRYP T
T

Encrypted A Decrypted
File Image & File

37
A

Final Result

Stop

38
C. SCREEN OUTPUTS

39
ENCRYPTION

40
41
42
43
44
45
DECRYPTION

46
47
48
49
50
51

You might also like