Project Report on Mailing System using Steganography Submitted in partial fulfillment of the requirement for the degree of Bachelor of Technology in Computer Science By Pankhuri Kaushik (0709510042) Rohit Gupta (0709510047) Namita Chakravarty(0709510033) Under the Supervision of Mr. Mohammad Asim Mahatma Gandhi Mission’s College of Engineering and Technology, Noida Gautam Buddh Technical University
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Project Report on
Mailing System using Steganography
Submitted in partial fulfillment of the requirement for the degree of
Bachelor of Technology
in Computer Science
By
Pankhuri Kaushik (0709510042)
Rohit Gupta (0709510047)
Namita Chakravarty(0709510033)
Under the Supervision of
Mr. Mohammad Asim
Mahatma Gandhi Mission’s College of Engineering and Technology, Noida
Email system is like an electronic post card. If someone wants to copy, intercept or
even alter your emails, they can do it with relative ease. Though there may exist
encryption in the hop going from client to the server, no matter how unbreakable but
still arouse suspicion. Therefore, keeping this in mind we have developed a mailing
system with steganography implementation at the back end. Steganography hide the
messages in such a way that no one, apart from the sender and intended recipient,
suspects the existence of the message. Steganography is more effective than
encryption when used in right way. We have named our mailing system as
“StegMail”. StegMail uses the text to text steganography approach to keep the mails
safe from malicious security incidents, so that there will be no longer worry about
sensitive information being shared with unauthorized individuals. Text to text
steganography involves that both the secret information and the carrier file behind
which this information has to be hidden should be in text format. That is what was
required for providing the security in emails as carrier file as image, audio or video
would arouse suspicion and also unnecessarily will increase the size of the mail.
5.2.2 Product Functionality
To carry out the proposed work we have followed a systematic approach. Firstly
steganalizing the mail provides two fold securities. One is by encrypting the real
message with the password both of which are requested from the user. Encryption is
carried out by applying XOR between the real message and the password. Second is
to hide this encrypted text behind the fake message provided by the user.
De-steganalizing involves the coded message and the password as input from the
receiver and it finally gives the secret information.
17
5.2.3 Operating Environment
Hardware Specification
Pentium III or higher
128MB RAM(512MB recommended)
1 GB hard disk space (minimum)
Software Specification
Windows XP Service Pack 2 or above
Microsoft Visual Studio 2008
5.2.4 Design and Implementation Constraints
The proposed project should have a simple and user friendly interface such that any
of the users who are not having extensive knowledge of computers can use it.
Also the security consideration is the main constraint which cannot be neglected at
all. Reliability and portability of the project are some other issues which should be
kept in mind. Cost is also a constraint from the point of view of services that are to
be made available.
5.3 Specific Requirements
NON-FUNCTIONAL REQUIRMENTS:
It specifies the criteria based on which we can judge the operation of the proposed
system. It defines how a system is supposed to be.
(i) High Security (iv) Portability
(ii) Reliability (v) Efficiency
(iii) Usability (iv) Extensibility
Table 5.1
18
FUNCTIONAL REQUIRMENTS:
It consists of the specific functionality that defines what a system is supposed to
accomplish.
(i) Any of the existing Gmail ids can be used to send the mail from the proposed
system named “StegMail”.
(ii) Proposed system will also receive the mails by logging in their respective ids
and will show in their full inbox.
(iii) Security through obscurity – i.e. the security which even hides the existence
of secret message from eavesdropper.
(iv) Facility of file attachments in mailing system
(v) Email notifications of “mail sent” and “mail not sent”
(vi) More secured than the existing systems
(vii) Technique of the text to text steganography should be carefully chosen
Table 5.2
19
CHAPTER 6
DESIGN
20
DESIGN
6.1 High Level Design
High Level Design (HLD) is the overall system design. It describes the relation
between various modules and functions of the system. Data flow, flow charts and
data structures are covered under HLD.
6.1.1 Data Flow Diagrams
21
Senders Email
Receivers Email
Senders Password
Subject
Key
Real Message
Fake Message
Sender
Receivers Email
Receivers’ password
KeyReceiver
Steganalized Mail
Real message
STEG MAIL
Figure 6.1 Context level diagram (Level 0)
22
6.1.2 Sequence Diagrams
Encrypt Sender Send
DecryptReceiver
Receive
Fake Message
Real Message
Key
Senders Mail
Receivers Mail
Senders Password
Subject
Steganalized Mail
Mail
Steganalized Mail
Receivers Email
Receivers passwordKey
Real Message
Inbox Database Gmail Database
If Valid
Download Inbox
Request
RequestResponse
Response
Figure 6.2 Level 1 Data Flow diagram
Figure 6.3 Sequence Diagram for Steganalizing and Sending
23
Sender Form1 Steganalize Send Receiver
To ,From ,Password
Subject
Message
Fake Message
Key
Message
Coded Message
Coded Message
To ,From ,Password
Subject
Mail
Figure 6.4 Sequence Diagram for De-Steganalizing and Receiving
24
Username ,Password
Mail
Stego Object
key
Message
De-Steg Receiver Form1 Receive
6.1.3 Activity Diagrams (Activity Diagram of Steganalizing and Mailing)
Figure 6.5
25
Start Start
Get Real msg
Start
Get Real msg
Get Fake msg and key
Encryption
Store Stego-Object
Get Login Details
Mail Sent
Rejected
Validation
Start Start
Get Real msg
Start
Get Real msg
Get Fake msg and key
Encryption
Store Stego-Object
Get Login Details
Mail Sent
Rejected
Validation
(Activity Diagram of De-Steganalizing and Receiving)
Figure 6.6
26
Start Start
Get Real msgEnter Login Details
De-steganalize
Enter Key
Connect to inbox
Select Required msg
Get Real Msg
Rejected
Validation
6.2 Low Level Design
Low Level Design (LLD) is like detailing the HLD. It defines the actual logic for
each and every component of the system. Class diagrams with all the methods and
relation between classes comes under LLD.
6.2.1 Class Diagrams
Figure 6.7 Class Diagram For Mailing System
Figure 6.8 Class Diagram For Steganography
27
6.2.2 Procedure Tables
Send Mail Module
Method Name Parameters Description
SendMessageWithAttachment
SendTo It calls the
ValidateEmailAddress
method so that
validation is applied
before sending the mail
and then sends the email
using SMTP.
SendFrom
SendSubject
SendMessage
attachments
Pass
Combo
ValidateEmailAddress emailAddress
It validates the Email
address passed to it as a
parameter.
Table 6.1
Message Steganalyzing Module
Function Name Parameters Description
encrypter1
Key It first encrypts the secret
message with the key &
then hides this encrypted
msg behind the fake msg.
SecretMessage
FakeMessage
StegnalisedMessage
Table 6.2
28
Message De-Steganalyzing Module
Function Name Parameters Description
decrypter
SourceText It decrypts the source text
using key to finally give
the secret message.
Key
SecretMessage
Table 6.3
Receive Mail Module
Function Name Parameters Description
Connect_Click ___
It checks whether
connected to internet or
not.
CheckInputValidationForPop Username It checks the username
and passwordPassword
ReceiveEmails ___
It retrieves Emails from
the receivers mail
address.
DownloadAttachment_Click
___
It downloads the
attachment and also
gives the option to save
the file.
Disconnect_Click ___ It disconnects with the
server.
Table 6.4
29
CHAPTER 7
TESTING
30
TESTING
The basic levels of testing are:-
7.1 Unit Testing
In our project each service can be thought of a module. There are so many modules
like sending mail, receiving mail etc. Each module has been tested by giving
different sets of input. When developing the module as well as finishing the
development process, the module works without any error. The inputs are also
validated when accepting them from the user and it prompts the user to enter the
correct value for the particular field making it more users friendly.
7.2 Integration Testing
In this program units are combined and tested as groups in multiple ways. In our
project we carried out the integration testing in an iterative manner i.e. after
developing one module it is integrated with the previous one and then tested by
giving different sets of input. Various improvements were carried out such as while
integrating sending and the encryption module certain buttons have to be disabled
while encrypting and then after its completion they were enabled. All the modules
were then tested after integrating them and were working without any error.
7.3 System Testing
Here the entire software system was tested. The reference document in this process
was requirement document and the goal was to see if the software meets its
requirement. The system was tested by giving different sets of input and observing
whether the output of the system was as expected by the requirements. While
executing the system it was working without any error.
7.4 Test Case
A test case is a set of conditions or variables under which a tester determines whether
the project is working correctly or not. Test summary is as follows:
31
S.No. Bench-Mark Test Inputs and Observations
Expected Output
1.Checking functionality of send mail module
Unfilled secret message textbox & click on Encrypt button
Generates a message box that secret message empty.
2.Checking functionality of send mail module
Unfilled sender’s email textbox & click on Send button
Generates a message box that sender’s Email empty.
3.
Checking functionality of send mail module
Unfilled sender’s password textbox & click on Send button
Generates a message box that sender’s password empty.
4.Checking functionality of send mail module
Unfilled receiver’s email textbox & click on Send button
Generates a message box that receiver’s email empty.
5.Checking functionality of send mail module
Click on Send button before steganalizing
Nothing happens as send button is disabled at that time.
6.Checking functionality of message steganalizing module
Unfilled key textbox & Click on steganalize button
Generate a message box that key empty.
7.Checking functionality of message steganalizing module
If length of fake message is empty or shorter than expected
Generates a message box that fake message not enough
8.Checking functionality of Receive mail module
Unfilled username password & click on Connect
Generates a message box that username password empty
9.Checking functionality of Receive mail module
Invalid username password & click on Connect
Generates a message box that cannot connect (Invalid username & password)
10.Checking functionality of message de-steganalizing module
Unfilled source or key & click on de-steganalize
Generates a message box that source or key empty.
Table 7.1
32
CHAPTER 8
SNAPSHOTS
33
SNAPSHOTS
Initial page
34
Receive mail interface
35
De-Steganalizing
36
Sending mail interface after Steganalizing
37
Mail sent successfully
38
De-Steganalized successfully
39ADVANTAGE AND DISADVANTAGE
Advantages
Mails are securely sent using steganography
Steganography is a more secure technique than cryptography as it does not arouse suspicion of some hidden secret information to the eavesdropper as was the case in cryptography.
Disadvantages
The Existing Email accounts containing a very large number of files in their inbox will take a large amount of time in the receiving process.
If the real confidential message entered by the user is large, then the fake message acting as carrier file should also be very large.
Only text can be concealed and no image or audio file can be concealed.
40
FUTURE ENHANCEMENTS
In future our system can be extended to a web application.
Information other than text can be concealed such as an image, an audio file
etc.
Users other than Gmail account users could also send the mail using our
system.
41CONCLUSION
The project “Mailing system using steganography” that was designed to provide
security to the user’s information that travels through the web has been successfully
developed. It can be concluded that the project is working correctly in the way it was
intended to behave. As well as it is competent enough as along with providing
security to information, it also provides the facility to send and receive emails.
All and all it could be commented that the project works as been desired and the