0% found this document useful (0 votes)
36 views6 pages

Text Steganography Information Security Project

Uploaded by

techkossa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views6 pages

Text Steganography Information Security Project

Uploaded by

techkossa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Download Information Security projects with Documentation from TutorialsDuniya.

com

Text Steganography Project

Steganography embeds a secret message inside an innocent looking cover


medium, stealthily, without creating any attention. The cover medium used can
be a text, image, audio, video, network packets, etc. In this desktop application
there are 3 interfaces: Registration, Login, encode & decode. User needs to
register first and he/she can login to the application while the user supposed to
enter a PIN as a multifactor authentication when he/she login’s with username

m
and password. After logging in, user can write text and encode it and can share
with the person whom he/she wants to send the secret message. This is how the

co
text steganography, hide text within text works.

a.
iy
un
D
ls
ria
to
Tu

Download Information Security projects with Documentation from TutorialsDuniya.com


Download Information Security projects with Documentation from TutorialsDuniya.com

 Modules:

The system comprises of 3 major modules with their sub-modules as follows:

1. Admin:
 Login: Admin can login in his personal account using id and password.
 Add Counselor: Admin can add a new counselor with their details
and create login id and password.

m
 Add Question: Admin can add new questions by specifying their
options and the correct answer.

co
 View User: Admin can view all information about the user.

a.
 View/Edit/Delete Question: System allows admin to
iy
view/edit/delete a question.
un
 View/Delete Counselor: Admin can view Councilor info. In addition,
can delete a counselor if required.
D
ls

2. Councilor:
ria

 Login: Councilor can login their personal account using id and


password, which is provided by the admin.
to

 View User/ Chat: A counselor can initiate a chat with the user
Tu

whenever required.
 View Score: Councilor can view test scores of users.
 Feedback: Councilor can give his feedback to the admin regarding
the working of system.

3. User:
 Login: User can login his account using id and password.

Download Information Security projects with Documentation from TutorialsDuniya.com


Download Information Security projects with Documentation from TutorialsDuniya.com

 Take a Test: User can take test on general knowledge questions and
select correct answer for the asked question.
 View Score: User can view their own score history to know how they
scored previously.
 View Counselor/Chat: User can view counselor and also can chat
with them if required.
 Profile: Counselor can view their own profile and edit/update their

m
details like contact no., email id and age.

co
 Change Password: User can change their current password with new
one whenever required.

a.
 Feedback: Registered users can write a feedback message to notify
iy
the admin about the working of the system.
un
D
ls
ria
to
Tu

Download Information Security projects with Documentation from TutorialsDuniya.com


Download Information Security projects with Documentation from TutorialsDuniya.com

Project Lifecycle:

Description
The waterfall Model is a linear sequential flow. In which progress is seen as
flowing steadily downwards (like a waterfall) through the phases of software
implementation. This means that any phase in the development process begins
only if the previous phase is complete. The waterfall approach does not define the

m
process to go back to the previous phase to handle changes in requirement. The

co
waterfall approach is the earliest approach that was used for software
development.

a.
iy
un
D
ls
ria
to
Tu

Download Information Security projects with Documentation from TutorialsDuniya.com


Download Information Security projects with Documentation from TutorialsDuniya.com

.Net

 Hardware Requirement:

 i3 Processor Based Computer or higher


 Memory: 1 GB

m
 Hard Drive: 50 GB

co
 Monitor
 Internet Connection

a.
 Software Requirement:
iy
un
 Windows 7 or higher
D

 Visual Studio
ls

 SQL Server
ria

 Google Chrome Browser


to
Tu

Download Information Security projects with Documentation from TutorialsDuniya.com


Download Information Security projects with Documentation from TutorialsDuniya.com

 Advantages
 It is safe to login.
 It has multifactor authentication.
 It encodes and decode text.

 Limitation
 It only works on internet

m
 Application

co
 This system can be used by the multiple peoples to get the

a.
counselling sessions online.
iy
un
 Reference
 https://shsu-ir.tdl.org/shsu-
D

ir/bitstream/handle/20.500.11875/1164/0781.pdf?sequence=1
ls

 https://ieeexplore.ieee.org/document/6208293/
ria

 https://ieeexplore.ieee.org/document/4679917/
to
Tu

Download Information Security projects with Documentation from TutorialsDuniya.com

You might also like