Professional Documents
Culture Documents
INTRODUCTION
3.1 Object Oriented Analysis ( OOA ) approach consists of the following steps :
This is the first step in the analysis process . The problem statement should be
refined and redefined in terms of computer system engineering that could suggest a
computer based solution . The problem statement should be stated , as far as possible , in
a single , grammatically correct sentence . The problem statement provides the basis for
drawing the requirements specification of both the user and the software .
Therefore the problem statement is
Various interactive inputs that take the user through the different
stages encountered during the execution of the application .
What processes are involved to produce these outputs ?
Processor : Pentium.
RAM : 64 MB.
Hard Disk : 2 GB.
Cache : 512 KB.
Monitor : SVGA Color Monitor.
Keyboard : 101 keys.
Mouse : 2 buttons.
3.2.3 TOOLS
MICROSOFT VISUAL C++ 6.0 ,MS ACCESS
3.3 Identification of objects :
Objects can often be identified in terms of the real world objects as well as the
abstract objects . Their applications can be best analyzed by using the data flow diagrams.
Design is concerned with the mapping of objects in the problem space into
objects in the solution space and creating an overall structure and computational
models for the system . This stage normally uses the bottom - up approach to build the
structure of the system and the top- down functional decomposition approach to
design the class member functions that provides services .
The steganographic process basically involves encoding , decoding and checking if
encodable . These are the basic functions of the class codec and the pic codec class .
The encryption process is handled by the crypt and objects .The remaining objects are
the various dialogs for display and interaction with the user .
The user should be able to pick out the image file he wants to use in the hiding
process.
The format of the image files which can be used for the hiding process should be
24-bit bitmap.
User should be able to transfer the image freely without any problems. I.e. he
should be able to copy the new image file. Send or trade it with others without any
special hardware requirements other than the normal communication systems
available with a computer.
There should be a encryption process to encrypt the text for better security.
The user must be able to save the image in which the message is hidden in any
desired folder.
The user should be able to select and view the picture from which to decode.
When the decode is demanded the encryption key should be demanded and when
entered the decrypted text displayed.
The picture inside picture option should have all the above qualities like view
both, compare and decide whether to proceed, and also have an option to save the
new image where the user chooses.
To retrieve the picture the user must be able to view it, and then retrieve and
save the picture
USE CASE DIAGRAM