Secret Painter
-
Upload
fazil-puthussery-fzl -
Category
Documents
-
view
222 -
download
0
Transcript of Secret Painter
-
7/28/2019 Secret Painter
1/10
Software Requirements
Specification
for
Secret Painter
Prepared by
Anand Krishna AM.EN.P3MCA10003 [email protected]
Shyam Mohan AM.EN.P3MCA10049 [email protected] Franklin AM.EN.P3MCA10040 [email protected]
Guide Name : Ms Resmi T. R.
Course : Master Of Computer Applications (MCA)
Date : 18-9-2012
-
7/28/2019 Secret Painter
2/10
SoftwareRequirements Specification for Page ii
Contents
1 INTRODUCTION......................................................................................................................................................1
2 OVERALL DESCRIPTION.....................................................................................................................................1
3 SPECIFIC REQUIREMENTS.................................................................................................................................4
4 OTHER NON-FUNCTIONAL REQUIREMENTS...............................................................................................6
-
7/28/2019 Secret Painter
3/10
SoftwareRequirements Specification for Secret Painter Page 1
1 Introduction
1.1 Document Purpose
This document aims at providing a detailed description of the application titled Secret Painter. Thisdocument will provide information about the functionalities, technologies inovolved, targeted usersand various other aspects of this application. This document is intended to provide an authoritataiveand detailed outline regarding all aspects of the Secret Painter application such as operatingenvironment, design and implementation constraints, functional requirements of the application etc.
1.2 Product Scope
The main purpose of this project is to develop a secure and efficient way to encode confidential textdocuments in images. This type of encryption is referred to as Stenganography in this technique,
textual data are encoded as colored pixels and placed at various points on an image. This can later bedecoded at the receiver side using the same application ie Secret Painter to retrieve the originaltextual data encoded in each image. The main benefit of this application is that the image withencoded text will appear as a normal image itself. This increases the security of the encoded text.
1.3 Definitions, Acronyms and Abbreviations
Steganography is a technology that hides a message within an object, a text, or a picture. It is oftenconfused with cryptography, not in name but in appearance and usage. The easiest way todifferentiate the two is to remember steganography conceals not only the contents of the message butalso the mere existence of a message.
1.4 Document Conventions
In general this document follows the IEEE formatting requirements. Italics have been used forcomments. Each subsection of a major heading has been named in the format of 1.1, 1.2, 1.3 etc. Alltitles and major heading have been written in bold for easier identification.
2 Overall Description
2.1 Product Perspective
The product perspective of this application is the technique of steganography, in this method; datacan encoded within an image. This image can later be decoded at the receiver side using the same
-
7/28/2019 Secret Painter
4/10
SoftwareRequirements Specification for Secret Painter Page 2
application ie Secret Painter to retrieve the original data in each image after providing the requiredauthentication.
2.2 Product Functionality
The application allows a great deal of flexibility to the user, he can choose the text file that he wantsto encode, he can choose the image file which will carry the encoded hidden data, he can even setpassword for that individual image in order to increase the level of security. Some of thefunctionalities offered by Secret Painter are:
Allows user to select the text file that needs to be encoded
Allows the user to select any image to be the carrier for the previously selected text file
Enables the image to be password authenticated so that image cannot be easily decoded by a
third-party using the Secret application. This increases the level of protection.
o Users and Characteristics
There is only a single type of user in Secret Painter application, also called as the artist. It canoperate in two different modes.
Pirate Mode
In this mode the user will select the text file that he wants to be encoded, hespecifies the image which will be the carrier (ie the image within which thetext file will be hidden.). He can also specify and set authenticationparameters like passwords for that image.
Saviour Mode
In this the user will be able to decode the image received to recover theoriginal data after providing necessary authentication details. He can thenview, edit the original data.
-
7/28/2019 Secret Painter
5/10
SoftwareRequirements Specification for Secret Painter Page 3
o Operating Environment
2.4.1 Hardware requirementso
Processor : Intel Pentium IV or highero Main Memory : 512 MB or highero Hard Disk : 160 GBo Display : 15 color monitor or more
2.4.2 Software requirementso Operating System : Windows XP or higher.o Language Used : Javao Tools : Net Beans IDE
o Design and Implementation Constraints
TheDesign Constraints for Secret Painter is that the application should be extremely user friendlyso that any first time user can easily understand the working of the application. The user interfaceshould be developed and designed in such a way that it is very intuitive and easy to operate. All thisshould be achieved while masking the complexity of the program logic from the user.Some of theImplementation Constraints in this application are as follows:
This system can only be used correctly if both parties at receiver and sender sides has thesame application as Secret Painter
The application will work only with images in the .jpeg format. The application will not be able to recover the original data if, the carrier image has been
edited in other applications or corrupted before being received at the destination. The carrier image cannot carry data in other forms such as video or audio or other images.
o User Documentation
After the developmental stage of the application is over, a step by step manual with screenshots ofeach step will be created to educate the users on how to use the application. The manual will coverall operational aspects of the application.
o Assumptions and Dependencies
Some of the major assumptions and dependencies are: Both sides use the same application Both machines have sufficient hardware capability to support this application The carrier image is not modified in any way before reaching the destination. The user will not try to encode more than one text file in a carrier image.
-
7/28/2019 Secret Painter
6/10
SoftwareRequirements Specification for Secret Painter Page 4
3 Specific Requirements
3.1 External Interface Requirements
3.1.1 User Interfaces
As mentioned earlier, the users in Secret painter can operate in two different modes for specificfunctionalities the interfaces in each mode will have the following buttons and features namely
Pirate mode (Encoding Mode)
In this mode, the interface will assume a dark background and will have options to selectand upload the text file to be hidden. Specific options for selecting the image which will bethe carrier. This mode will also have button which will enable user to set the password forauthentication.
Saviour mode (Decoding Mode)
In this, the interface will assume a light background and the user will be able to decodethe image received to recover the original data after providing necessary authenticationdetails. He can then view or edit the original data in any text editor.
3.1.2 Hardware Interfaces
Since this project is a system based application all activities regarding the project takes place withinthe system with minimal interfaces to the hardware components of the system.
3.1.3 Communications Interfaces
Secret Painter is a system based application in which the encoded data is carried from source todestination by the user in storage devices like USB drives , or SD cards there is no need ofcommunication protocols like HTTP etc for the implementation of this project. The only requirementis that the Secret painter application should be available at source and destination.
-
7/28/2019 Secret Painter
7/10
SoftwareRequirements Specification for Secret Painter Page 5
Functional Requirements
3.1.4 Use Case View
-
7/28/2019 Secret Painter
8/10
SoftwareRequirements Specification for Secret Painter Page 6
4 Other Non-functional Requirements
4.1 Performance Requirements
The performance requirements identified for the Secret Painter application are as follows:
The application should correctly hide and encode the textual data in a selected carrier imagewithout corrupting the original data of the text.
The encoding process should take as less time as possible. If the encoding process is interrupted , both carrier image and text data should be reverted to
their original forms The carrier image should be decoded at the receiver side correctly and, in the shortest time
possible. The application should also be extremely reliable with a small resource usage footprint on
the system.
4.2 Safety and Security Requirements
Since this application is based on the concept of steganography, the application needs to beimplemented using secure and efficient codes. The application should also be immune toattacks from malicious software etc. The hidden password authentication for carrier imagesshould securely protect the hidden file within the image. This field should become visible onlywhen it is accessed via the Secret Painter application. This feature is also part of the safety
and security requirements of this project
4.3 Software Quality Attributes
This application needs to have all attributes Reliability, Efficiency, Security, Maintainability and Size.Software quality measurement quantifies to what extent a software or system rates along each ofthese five dimensions. The Secret Painter application must satisfy all these constraints
-
7/28/2019 Secret Painter
9/10
SoftwareRequirements Specification for Secret Painter Page 7
Appendix A Data Dictionary
-
7/28/2019 Secret Painter
10/10
SoftwareRequirements Specification for Secret Painter Page 8
Appendix B - Group Log