Text Steganography Information Security Project
Text Steganography Information Security Project
com
m
and password. After logging in, user can write text and encode it and can share
with the person whom he/she wants to send the secret message. This is how the
co
text steganography, hide text within text works.
a.
iy
un
D
ls
ria
to
Tu
Modules:
1. Admin:
Login: Admin can login in his personal account using id and password.
Add Counselor: Admin can add a new counselor with their details
and create login id and password.
m
Add Question: Admin can add new questions by specifying their
options and the correct answer.
co
View User: Admin can view all information about the user.
a.
View/Edit/Delete Question: System allows admin to
iy
view/edit/delete a question.
un
View/Delete Counselor: Admin can view Councilor info. In addition,
can delete a counselor if required.
D
ls
2. Councilor:
ria
View User/ Chat: A counselor can initiate a chat with the user
Tu
whenever required.
View Score: Councilor can view test scores of users.
Feedback: Councilor can give his feedback to the admin regarding
the working of system.
3. User:
Login: User can login his account using id and password.
Take a Test: User can take test on general knowledge questions and
select correct answer for the asked question.
View Score: User can view their own score history to know how they
scored previously.
View Counselor/Chat: User can view counselor and also can chat
with them if required.
Profile: Counselor can view their own profile and edit/update their
m
details like contact no., email id and age.
co
Change Password: User can change their current password with new
one whenever required.
a.
Feedback: Registered users can write a feedback message to notify
iy
the admin about the working of the system.
un
D
ls
ria
to
Tu
Project Lifecycle:
Description
The waterfall Model is a linear sequential flow. In which progress is seen as
flowing steadily downwards (like a waterfall) through the phases of software
implementation. This means that any phase in the development process begins
only if the previous phase is complete. The waterfall approach does not define the
m
process to go back to the previous phase to handle changes in requirement. The
co
waterfall approach is the earliest approach that was used for software
development.
a.
iy
un
D
ls
ria
to
Tu
.Net
Hardware Requirement:
m
Hard Drive: 50 GB
co
Monitor
Internet Connection
a.
Software Requirement:
iy
un
Windows 7 or higher
D
Visual Studio
ls
SQL Server
ria
Advantages
It is safe to login.
It has multifactor authentication.
It encodes and decode text.
Limitation
It only works on internet
m
Application
co
This system can be used by the multiple peoples to get the
a.
counselling sessions online.
iy
un
Reference
https://shsu-ir.tdl.org/shsu-
D
ir/bitstream/handle/20.500.11875/1164/0781.pdf?sequence=1
ls
https://ieeexplore.ieee.org/document/6208293/
ria
https://ieeexplore.ieee.org/document/4679917/
to
Tu