Secret Painter

download Secret Painter

of 10

Transcript of Secret Painter

  • 7/28/2019 Secret Painter

    1/10

    Software Requirements

    Specification

    for

    Secret Painter

    Prepared by

    Anand Krishna AM.EN.P3MCA10003 [email protected]

    Shyam Mohan AM.EN.P3MCA10049 [email protected] Franklin AM.EN.P3MCA10040 [email protected]

    Guide Name : Ms Resmi T. R.

    Course : Master Of Computer Applications (MCA)

    Date : 18-9-2012

  • 7/28/2019 Secret Painter

    2/10

    SoftwareRequirements Specification for Page ii

    Contents

    1 INTRODUCTION......................................................................................................................................................1

    2 OVERALL DESCRIPTION.....................................................................................................................................1

    3 SPECIFIC REQUIREMENTS.................................................................................................................................4

    4 OTHER NON-FUNCTIONAL REQUIREMENTS...............................................................................................6

  • 7/28/2019 Secret Painter

    3/10

    SoftwareRequirements Specification for Secret Painter Page 1

    1 Introduction

    1.1 Document Purpose

    This document aims at providing a detailed description of the application titled Secret Painter. Thisdocument will provide information about the functionalities, technologies inovolved, targeted usersand various other aspects of this application. This document is intended to provide an authoritataiveand detailed outline regarding all aspects of the Secret Painter application such as operatingenvironment, design and implementation constraints, functional requirements of the application etc.

    1.2 Product Scope

    The main purpose of this project is to develop a secure and efficient way to encode confidential textdocuments in images. This type of encryption is referred to as Stenganography in this technique,

    textual data are encoded as colored pixels and placed at various points on an image. This can later bedecoded at the receiver side using the same application ie Secret Painter to retrieve the originaltextual data encoded in each image. The main benefit of this application is that the image withencoded text will appear as a normal image itself. This increases the security of the encoded text.

    1.3 Definitions, Acronyms and Abbreviations

    Steganography is a technology that hides a message within an object, a text, or a picture. It is oftenconfused with cryptography, not in name but in appearance and usage. The easiest way todifferentiate the two is to remember steganography conceals not only the contents of the message butalso the mere existence of a message.

    1.4 Document Conventions

    In general this document follows the IEEE formatting requirements. Italics have been used forcomments. Each subsection of a major heading has been named in the format of 1.1, 1.2, 1.3 etc. Alltitles and major heading have been written in bold for easier identification.

    2 Overall Description

    2.1 Product Perspective

    The product perspective of this application is the technique of steganography, in this method; datacan encoded within an image. This image can later be decoded at the receiver side using the same

  • 7/28/2019 Secret Painter

    4/10

    SoftwareRequirements Specification for Secret Painter Page 2

    application ie Secret Painter to retrieve the original data in each image after providing the requiredauthentication.

    2.2 Product Functionality

    The application allows a great deal of flexibility to the user, he can choose the text file that he wantsto encode, he can choose the image file which will carry the encoded hidden data, he can even setpassword for that individual image in order to increase the level of security. Some of thefunctionalities offered by Secret Painter are:

    Allows user to select the text file that needs to be encoded

    Allows the user to select any image to be the carrier for the previously selected text file

    Enables the image to be password authenticated so that image cannot be easily decoded by a

    third-party using the Secret application. This increases the level of protection.

    o Users and Characteristics

    There is only a single type of user in Secret Painter application, also called as the artist. It canoperate in two different modes.

    Pirate Mode

    In this mode the user will select the text file that he wants to be encoded, hespecifies the image which will be the carrier (ie the image within which thetext file will be hidden.). He can also specify and set authenticationparameters like passwords for that image.

    Saviour Mode

    In this the user will be able to decode the image received to recover theoriginal data after providing necessary authentication details. He can thenview, edit the original data.

  • 7/28/2019 Secret Painter

    5/10

    SoftwareRequirements Specification for Secret Painter Page 3

    o Operating Environment

    2.4.1 Hardware requirementso

    Processor : Intel Pentium IV or highero Main Memory : 512 MB or highero Hard Disk : 160 GBo Display : 15 color monitor or more

    2.4.2 Software requirementso Operating System : Windows XP or higher.o Language Used : Javao Tools : Net Beans IDE

    o Design and Implementation Constraints

    TheDesign Constraints for Secret Painter is that the application should be extremely user friendlyso that any first time user can easily understand the working of the application. The user interfaceshould be developed and designed in such a way that it is very intuitive and easy to operate. All thisshould be achieved while masking the complexity of the program logic from the user.Some of theImplementation Constraints in this application are as follows:

    This system can only be used correctly if both parties at receiver and sender sides has thesame application as Secret Painter

    The application will work only with images in the .jpeg format. The application will not be able to recover the original data if, the carrier image has been

    edited in other applications or corrupted before being received at the destination. The carrier image cannot carry data in other forms such as video or audio or other images.

    o User Documentation

    After the developmental stage of the application is over, a step by step manual with screenshots ofeach step will be created to educate the users on how to use the application. The manual will coverall operational aspects of the application.

    o Assumptions and Dependencies

    Some of the major assumptions and dependencies are: Both sides use the same application Both machines have sufficient hardware capability to support this application The carrier image is not modified in any way before reaching the destination. The user will not try to encode more than one text file in a carrier image.

  • 7/28/2019 Secret Painter

    6/10

    SoftwareRequirements Specification for Secret Painter Page 4

    3 Specific Requirements

    3.1 External Interface Requirements

    3.1.1 User Interfaces

    As mentioned earlier, the users in Secret painter can operate in two different modes for specificfunctionalities the interfaces in each mode will have the following buttons and features namely

    Pirate mode (Encoding Mode)

    In this mode, the interface will assume a dark background and will have options to selectand upload the text file to be hidden. Specific options for selecting the image which will bethe carrier. This mode will also have button which will enable user to set the password forauthentication.

    Saviour mode (Decoding Mode)

    In this, the interface will assume a light background and the user will be able to decodethe image received to recover the original data after providing necessary authenticationdetails. He can then view or edit the original data in any text editor.

    3.1.2 Hardware Interfaces

    Since this project is a system based application all activities regarding the project takes place withinthe system with minimal interfaces to the hardware components of the system.

    3.1.3 Communications Interfaces

    Secret Painter is a system based application in which the encoded data is carried from source todestination by the user in storage devices like USB drives , or SD cards there is no need ofcommunication protocols like HTTP etc for the implementation of this project. The only requirementis that the Secret painter application should be available at source and destination.

  • 7/28/2019 Secret Painter

    7/10

    SoftwareRequirements Specification for Secret Painter Page 5

    Functional Requirements

    3.1.4 Use Case View

  • 7/28/2019 Secret Painter

    8/10

    SoftwareRequirements Specification for Secret Painter Page 6

    4 Other Non-functional Requirements

    4.1 Performance Requirements

    The performance requirements identified for the Secret Painter application are as follows:

    The application should correctly hide and encode the textual data in a selected carrier imagewithout corrupting the original data of the text.

    The encoding process should take as less time as possible. If the encoding process is interrupted , both carrier image and text data should be reverted to

    their original forms The carrier image should be decoded at the receiver side correctly and, in the shortest time

    possible. The application should also be extremely reliable with a small resource usage footprint on

    the system.

    4.2 Safety and Security Requirements

    Since this application is based on the concept of steganography, the application needs to beimplemented using secure and efficient codes. The application should also be immune toattacks from malicious software etc. The hidden password authentication for carrier imagesshould securely protect the hidden file within the image. This field should become visible onlywhen it is accessed via the Secret Painter application. This feature is also part of the safety

    and security requirements of this project

    4.3 Software Quality Attributes

    This application needs to have all attributes Reliability, Efficiency, Security, Maintainability and Size.Software quality measurement quantifies to what extent a software or system rates along each ofthese five dimensions. The Secret Painter application must satisfy all these constraints

  • 7/28/2019 Secret Painter

    9/10

    SoftwareRequirements Specification for Secret Painter Page 7

    Appendix A Data Dictionary

  • 7/28/2019 Secret Painter

    10/10

    SoftwareRequirements Specification for Secret Painter Page 8

    Appendix B - Group Log