31-05-2012, 01:52 PM
Network Security using Steganography
Network Security using Steganography.doc (Size: 108.5 KB / Downloads: 37)
Introduction
In today’s world communication is the backbone. Various users uses different means of communication with others. Commonly used modes of communications are the mails, chat, upload, download etc. In all these forms of communication data’s security is exposed. Any hacker can try to view the details and some tends to damage the data as well.
Today’s scenario deals with providing security by using technologies such as cryptography or steganography to protect the data from a hacker. These have their own merits and de-merits. CRC is used to detect damages or alterations in data during transmissions. All the above are independent technology each claiming to be better than the other.
The proposed system utilizes their strengths to combine the technologies to develop a user friendly single product that can address both the hackers. It protects as well as detects data corruption. An added strength would be to include compression and decompression to further strengthen the security.
PLAN FOR ACCOMPLISHMENT
The system to developed will be dealt across the following stages :
1. Analysis Study of the requirement and collection of raw data, 1 week.
2. Design Prepare the logical design diagrammatically to propose a solution, 10 days.
3. Implementation Develop the application using the .Net framework., 6 weeks
4. Testing Test the implementation., 1 week.
The implementation since uses the .net framework, it involves the OOPS methodology. A bottom up approach is used for the solution. The application revolves in the prototype model.
CONCLUSION
The application can be used by various types of users to prevent their data from being hacked. The users can have security in preventing the data from being read or visible at one end. It can also be used to verify the integrity of the data when transmitted across the network. The product can cater any of the users requirement.