Sei sulla pagina 1di 7

VISHWAKARMA INSTITUTE OF TECHNOLOGY, PUNE-37

Department of Computer engineering

TY. B. Tech.

CS 3001: Software Engineering Laboratory

Assignment No: 1

Steganography Binder

Project Statement of Work


03/02/2020

VERSION 0.1

Project Group Information


Roll. No. Gr. No. Name Roles
33 182044 Patil Yashkumar Sunil System Analyst
66 1710675 Suryawanshi Vijay Ganesh System Analyst
69 1710969 Tarwadi Dhruv Vilas System Developer
70 182063 Tate Vivek Shravan Project Manager
80 182142 Vivek Wani Project Learder
Approved By: Prof. Mahesh R. Dube

Academic Year: 2019-20


Semester: I

1 2019-20-S-II
VISHWAKARMA INSTITUTE OF TECHNOLOGY, PUNE-37
Department of Computer engineering

Table of Contents

Sr. No. Title Page


1 Title 03
2 Background 03
3 Objective 04
4 Definitions and Applicable Documents 05
5 Business and Technical Environment 06
6 Description and Scope Of Work 06
7 Deliverables 07
8 Contractor Resource Requirements and Qualifications (If Required) 07
9 Approach and Methodology 07

2 2019-20-S-II
VISHWAKARMA INSTITUTE OF TECHNOLOGY, PUNE-37
Department of Computer engineering

1. TITLE

Steganography Binder is a android application. Steganography is a special method of writing hidden


messages in such a way that no one apart from the sender and the receiver can even realize that there
is a hidden message. The purpose of this work is to implement Image Steganography on any format of
image files for Android devices. The extent of steganography can be stretched to even embedding
some voice or image or text in any host file which may be of any media file type.

1.1. Steganography is a special method of writing hidden messages in such a way that no one apart
from the sender and the receiver can even realize that there is a hidden message.
1.2. The levels of security provided to the users is increased by encrypting the messages to be
embedded.
1.3. Encrypt the entered message using the polyalphabetic substitution algorithm developed, with
the key entered by the user.
1.4. Images are composed of digital data (pixels), which describes what’s inside the picture, usually
the colors of all the pixels. Since we know every image is made up of pixels and every pixel
contains 3-values (red, green, blue).
1.5. The purpose of this work is to implement Image Steganography on any format of image files for
Android devices.advance.

2. BACKGROUND

If you were to use steganography in the same situation, you would hide the letter inside a pair of socks
that you would be gifting the intended recipient of the letter. To those who don’t know about the
message, it would look like there was nothing more to your gift than the socks. But the intended
recipient knows what to look for, and finds the message hidden in them.
Similarly, if two users exchanged media files over the internet, it would be more difficult to determine
whether these files contain hidden messages, than if they were communicating using cryptography.

2.1. Steganography is closely related to the problem of “hidden channels” secure operating system
design, a term which refers to all communication paths that cannot easily be restricted by
access control mechanisms.
2.2. Steganographic technologies are a very important part of the future of Internet security and
privacy on open systems such as the Internet.
2.3. Steganography can be used to hide important data inside another file so that only the parties
intended to get the message even knows a secret message exists.
2.4. Steganography is the practice of concealing a file, message, image within another file, message,
image.
2.5. Steganography includes the concealment of information within computer files.
2.6. In digital steganography, electronic communications may include steganographic coding inside
of a transport layer, such as a document file, image file, program or protocol.

3 2019-20-S-II
VISHWAKARMA INSTITUTE OF TECHNOLOGY, PUNE-37
Department of Computer engineering

2.7. The growing use of the Internet has led to a continuous increase in the amount of data that is
being exchanged and storage in various digital media. This has led to some unexpected cases
involving both benevolent and malevolent usage of digital data. Security and authentication
techniques like steganographic methods and other data embedding algorithms have
contributed much to enhance the various security features and to preserve the intellectual
property.
2.8. In this respect, steganographic techniques have been the most successful in supporting hiding
of critical information in ways that prevent the detection of hidden messages. While
cryptography scrambles the message so that it cannot be understood, steganography hides the
data so that it cannot be observed.

3. OBJECTIVE

The Software helps the users to hide thier messages with an undecodeable format which increase
the security of the data.The Motive of the software is to hide the existence of communication.

3.1. Requirement of this Steganography system is that the hider message carried by stego-media
should not be sensible to human beings.
3.2. The other goals of steganography is to avoid drawing suspicion to the existence of a hidden
message.
3.3. This approach of information hiding technique has recently became important in a number of
applocation areas.
3.4. To perform steganography for keeping it in secrete pattern. 

4. DEFINITIONS AND APPLICABLE DOCUMENTS

4.1. Least Significant Bit –


The least significant bit is the lowest bit in a series of numbers in binary. It is either the leftmost
or rightmost bit in a binary number, depending on the computer's architecture. If the LSB is on
the right, the architecture is called "little-endian." If the LSB is on the left, the architecture is
called "big-endian."

4.2. Android Studio –


Android Studio is the official integrated development environment (IDE) for Google's Android
operating system, built on JetBrains' IntelliJ IDEA software and designed specifically for Android
development.It is available for download on Windows, macOS and Linux based operating
systems.It is a replacement for the Eclipse Android Development Tools (ADT) as the primary IDE
for native Android application development.

4 2019-20-S-II
VISHWAKARMA INSTITUTE OF TECHNOLOGY, PUNE-37
Department of Computer engineering

4.3. Encryption –
In cryptography, encryption is the process of encoding a message or information in such a way
that only authorized parties can access it and those who are not authorized cannot. Encryption
does not itself prevent interference but denies the intelligible content to a would-be
interceptor. In an encryption scheme, the intended information or message, referred to as
plaintext, is encrypted using an encryption algorithm–a cipher–generating ciphertext that can
be read-only if decrypted.

4.4. Encoding -
Encoding is the process of converting data from one form to another. While "encoding" can be
used as a verb, it is often used as a noun, and refers to a specific type of encoded data. There
are several types of encoding, including image encoding, audio and video encoding, and
character encoding

4.5. Decoding –
Decoding is the process of translating print into speech by rapidly matching a letter or
combination of letters (graphemes) to their sounds (phonemes) and recognizing the patterns
that make syllables and words. There is an area in the brain that deals with language processing
and does this process automatically.

4.6. Steganography –
Steganography is a method of hiding secret data, by embedding it into an audio, video, image or
text file. It is one of the methods employed to protect secret or sensitive data from malicious
attacks.

5. BUSINESS AND/OR TECHNICAL ENVIRONMENT

5.1. Optimized For All Android Devices -


Android Studio provides a unified environment where you can build apps for Android phones,
tablets, Android Wear, Android TV, and Android Auto.
5.2. Fast And Feature-Rich Emulator -
The Android Emulator installs and starts your apps faster than a real device and allows you to
prototype and test your app on various Android device configurations: phones, tablets, Android
Wear, and Android TV devices.
5.3. Large Number Of Testing Tools And Framework -
Android Studio provides extensive tools to help you test your Android apps with JUnit 4 and
functional UI test frameworks.
5.4. Robust And Flexible System -
Android Studio offers build automation, dependency management, and customizable build
configurations.
5.5. Support Of C++, Java And Python -
Android Studio fully supports editing C/C++ project files so you can quickly build JNI
components in your app.

5 2019-20-S-II
VISHWAKARMA INSTITUTE OF TECHNOLOGY, PUNE-37
Department of Computer engineering

6. DESCRIPTION AND SCOPE OF WORK

Android Studio is the official Integrated Development Environment (IDE) for Android app development,
based on IntelliJ IDEA.

6.1. Project structure –

Figure 1. The project files in Android view.


6.2. Each project in Android Studio contains one or more modules with source code files and
resource files.
6.3. Types of modules include –
Android app modules
Library modules
Google App Engine modules

6 2019-20-S-II
VISHWAKARMA INSTITUTE OF TECHNOLOGY, PUNE-37
Department of Computer engineering

7. DELIVERABLES

The system is in the initial stage of development and some of the deliverables may vary as the system
continues to develop into a product. Amongst the contract deliverables are the core concepts of the
project which will not change in any case. The system will stay true to its vision and the only changes
may be seen are the ones in the User Interface.
These are some of the deliverables that team can outline at this stage of development. Each stage has
its own challenges and will be given apt importance by the contractor.

No. Details
1 Statement of Work
2 Feature Set
3 SRS Document
4 Feasibility Study and Project Plan using AGILE
5 Sprint level planning activity
6 Sprint Plan and Sprint Design
7 Software Configuration Management Plan (SCMP)
8 Sprint Execution
9 Sprint Review and Sign- offs

8. APPROACH AND METHODOLOGY

8.1. The project working will begin with the suitable planning of the software documentary.
8.2. In the meantime, using different sources of information like Wikipedia ,Documentation of the
Libraries, Youtube, geeks for geeks ,etc.
8.3. The major part is encoding and decoding of the image , So different suitable algorithms will be
studied, checked and the best will be used .
8.4. The project will follow the agile model and all the necessary steps will be taken as per the
organization standards.
8.5. A Software Configuration Management Plan (SCMP) will be presented to ensure consistency of
the product’s performance, functional and physical attributes with its requirements and
operational information throughout its life.
8.6. The software will be reviewed and tested by the target organization based on which this
software has been created , feedbacks will be taken by them.
8.7. Upon resolving all the issues and bugs in the program, a final and formal sign-off will be
undertaken.

7 2019-20-S-II

Potrebbero piacerti anche