Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
140 views17 pages

Prototype Submission Template

This document provides a prototype report for a steganography application developed by a student project team. The report includes an introduction describing the application, a navigation flow diagram, screenshots of the application's core modules including login, encryption, and decryption. It also lists next steps for the next prototype iteration.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
140 views17 pages

Prototype Submission Template

This document provides a prototype report for a steganography application developed by a student project team. The report includes an introduction describing the application, a navigation flow diagram, screenshots of the application's core modules including login, encryption, and decryption. It also lists next steps for the next prototype iteration.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 17

BIE 3453 • Major Project 2

Prototype Report

Faculty: Information and Communication Technology

Date:

<STEGANOGRAPHY PROJECT>

<GROUP MEMBERS>
1. NthabisengRasetsoto 901010103 [email protected]
57108295
2. Ts’eaneMapeshoane 901008779 [email protected]
59875929
3. Polo Mohlominyane 901009918 [email protected]
50027488
4. MotoaiHlafelang 901009479 [email protected]
50084481
<Team members and roles of each here>
1. Motoai was responsible for searching for suitable programming languages to be
used for this project He found that java and C Sharp are really complex, but most
appropriate for the project. However, he came with the conclusion that it is for the
best to use these languages due to the end result of their functionalities.
However, at this juncture there were none challenges met other than to install the
precise version of the netbeans and Visual Studio.
2. Mapeshoane was responsible for the use of techniques and algorithm for
encoding and decoding of texts in the image. He then found that Least Significant
Bit is the best technique to be used for this project so the team agreed to use that
technique based on the information they read. The challenges were the
implementation of LSB (Least Significant Bit) algorithm to hide files in an image.
To overcome this challenge, the team applied source code from different
tutorials.331201
3. Nthabiseng and Polo were accountable of studying about tutorials for
steganography application. Without any coincidence they hardly found such
instances. So they decided to tell the supervisor about that challenge who then
urged them not to make an application but rather study more on tools used to
hide texts so that the team will be able to hide the messages and files in storage.
Version History

Date Version New Changes made Rationale behind the


functionalit from past change
y prototype
<week  <login in >
 
1>
<week  <encryptio  
2> n module>
<week  Decryptio  
3> n module
<week   
4>
  
  
Table of Contents

Version History................................................................................................................ii
Table of Contents...........................................................................................................iii
Table of Tables................................................................................................................iv
Table of Figures...............................................................................................................v

1. Introduction................................................................................................................1

1.1 Purpose of the prototype report.....................................................................1

1.2 Status of the prototype....................................................................................1

2. Navigation Flow..........................................................................................................2

3. Prototyped Core Modules.........................................................................................3

4. The Next Prototype shall include.............................................................................4


Table of Tables

Table 1: Screenshot name-1.............................................................................................3

Table 2: Volunteer Clock Out Page..................................Error! Bookmark not defined.


Table of Figures

Figure 1: Navigation Flow of Steganography Application.................................................2

Figure 2: screenshot name 1............................................Error! Bookmark not defined.

Figure 3: Clock-out page..................................................Error! Bookmark not defined.


1. Introduction

The steganography application has been developed in web application with an easy to
use interface and is designed in such a way that a user can expand it easily if they wish
to enter new steganography techniques. It is with mentioning that the following design
patterns were use; Factory, Request- Action, Wrapper. Some additional features of the
application are that it employs encoding of secret data, that to be encoded secret data
by using encoding + hiding methods.

The project team proposed a desktop based application named as “Stego Application”,
which encodes secret message into an image in such a way that quality of cover image
will not be affected and secret message is protected in the cover image, attaching the
secret key. In this proposed application, the existence of the hidden secret message
into an image file is unidentified.
The project team has developed an application using this technique to securely hide
any crucial information in the form of text in image without having to be anxious about
intruder attack. This provides security against the intruder.LSB algorithm has been
applied; it is undeniably considered an efficient algorithm in image steganography.
Image of JPEG, BMP and PNG type can be used in our application as cover image and
as an input secret image. This application did not change the type of original image after
hiding secret information within that image.
Advantage of proposed model:
• Execution time is fast.
• Information hidden in cover image cannot be detected from steganalysis attack.
• Hide large size of text in cover image.
• Hide smaller image into larger cover image.
• Sender can protect secret information in image by setting password on cover image.
• Woks on all version of operating system.
Application run successfully and perform it’s require functionality.

1
1.1.1 Purpose of the prototype report

Based on the proposed application design, a prototype web based application in the C-
Sharp and visual Studio programming language development environment is build.

Stego image as the output of the system can be extracted and provide textual
description of the object. The process can be extended to update data which will update
the inserted description. An application is design to implement method for insertion of
data description in text format into a digital image, for purpose of efficient
documentation in data storing and sharing. It formulizes two separated data in different
format, image and text, into one. The embedded information in images can be extracted
and updated so that no lost information during storing, sharing, or sending process.

This report is aimed to provide advanced and guaranteed security measures, keeping
the secret information for the destined parties; that is, enforcing maintenance
procedures on organizational significant data.

1.1.2 Status of the prototype


The application is divided into four modules; log-in module, encryption module,
decryption module and analysis.
1. Log-in module: the user to either register or enter password if already registered
to have access to the application.
2. Encryption module: The user can encrypt any file by browsing any kind of image
and enter the secret key and the same key can be used for encryption process.
3. Decryption module: This process can be done by entering the previously entered
key during the encryption process. If the key is wrong, the message will not be
retrieved.
4. Analysis module:

2
3
1.2. Navigation Flow

Below is the first screen that shows


the log- in tab option.It gives the user
access to two tab options – one is
Encrypt Image for encryption and
another is Decrypt image for
decryption.

4
<<This section should show presents the prototype navigation flow. By end, all core
capabilities, screenshot should be included in this document and presented to your
lecturer. All other non-core capabilities screenshot maybe included later. The
screenshots presented in this document should follow the same order as the navigation
flow.

In the first version or early round of prototyping, if the navigation flow is not the critical
point of your project, you can skip this section with rationale provided.

Encryption

5
1. For Encryption select Encrypt Image tab option.
2. For load image click on button “Browse” that is next to the Load Image
textbox. The file open dialog box will displays as follows, select the Image file,
which you want to use hide information and click on Open button.
3. The image file will opened and is displays as follows. Next, click on “Browse”
button that is next to the Load File textbox.
4. Again the file open dialog box will appear, select any type of file whatever you
want to hide with the image and click on ok button.
5. The next step is to encrypt the file. Now click on “Encrypt” button, it will open
the save dialog box which ask you to select the path to save the New image
file and the Image file name. The default format of image file is BMP.

6
Decryption

7
1. Select the Decryption Image tab option.
2. Next click on the “Browse” button, which open the Open file dialog box, here you
have to select the image which is Encrypted and has hidden information file.
Select the image file and click on Open button.
3. The image file displayed as follows:
4. Now click on “Browse” button which is next to “Save file to” textbox. It will open a
dialog box that is “Browse for folder”. It ask you to select the path or folder, where
you want to extract the hidden file. Select the folder and click on Ok button.
5. Now click on Decrypt button, it will decrypt the image, the hidden file and image
file is saved into selected folder. The message for successful decryption is
displayed on the status bar which is places at bottom of the screen.
6.

Figure 1: Navigation Flow of Steganography Application

8
1.3. Prototyped Core Modules

User needs to log in with the password to be accessed in running the application. The
user has two tab options – encrypt and decrypt. If user select encrypt, an application
presents the screen to browse and select the image file, information file and option to
save the image file. If user selects decrypt, application gives the screen to select only
image file and ask path where user want to save the secret file embedded in the image.

This project has two modules – Encrypt and Decrypt modules. In encryption module, the
secrete information is hiding in with any type of image file while decryption module is
getting the secrete information from image file.

Table 1: Screenshot name-1

Description <<Briefly describe what this screenshot is about.>>

Related <<Capability name / Capability Goal >>


Capability
Pre-condition <<Which screen shot leads to this screen shot? What condition will
lead to this screenshot?>>
Post <<What will happen in the system after processing this screenshot?
condition What’s next?>>

9
1.4. The Next Prototype shall include
<make mention of planned implementations ….>
<It is expected that these will be completed and submitted on….>

10

You might also like