Text Based Steganography



Yüklə 0,67 Mb.
səhifə1/22
tarix14.01.2018
ölçüsü0,67 Mb.
#37796
  1   2   3   4   5   6   7   8   9   ...   22




TEXT BASED STEGANOGRAPHY

R. J. Lockwood

BSc (Hons) Computer Science

School of Computing and Intelligent Systems

University of Ulster Magee

lockwood-r@email.ulster.ac.uk




Table of Contents

Table of Figures 3

Table of Tables 4

Abstract 5

Introduction 6

Acknowledgements 7

Declaration 7

Acronyms and Definitions 9

1 Steganography 11

1.1 Image Based Steganography 11

1.1.1 File Format Manipulation Methods 12

1.1.2 LSB Encoding Schemes 12

1.1.3 Other Methods 13

1.2 Video/Animation Based Steganography 13

1.2.1 Frame Manipulation 13

1.2.2 Time Manipulation 13

1.3 Executable File Formats and Binary Execution 13

1.4 Audio Steganography 14

1.5 Suitability Matrix 14

2 Text Based Steganography 16

2.1 Format Based Systems 16

2.1.1 Punctuation Amendment 16

2.1.2 Spelling Misappropriation 16

2.1.3 Open Space 17

2.1.4 Line Spacing 17

2.1.5 Font Manipulation 17

2.2 Random and Statistical Generation 18

2.2.1 Markov Chains 18

2.2.2 Context Free Grammar 19

2.3 Linguistic Steganography 19

2.3.1 Synonym Replacement (Lexical Substitution) 19

2.3.2 Sentence Modification 20

3 IEEE System Requirements Specification 22

3.1 Introduction 22

3.1.1 Purpose 22

3.1.2 Definitions 22

3.1.3 Scope 23

3.1.4 Overview 23

3.2 Overall Description 23

3.2.1 Product Perspective 23

3.2.2 System Interfaces 29

3.2.3 User Interfaces 29

3.2.4 Hardware interfaces 33

3.2.5 Software interfaces 34

3.2.6 Communication Interfaces 34

3.2.7 Memory Constraints 34

3.2.8 Operations 35

3.2.9 Site Adaptation Requirements 36

3.2.10 Product functions 36

3.2.11 User characteristics 36

3.2.12 Constraints, assumptions and dependencies 37

3.3 Specific Requirements 38

3.3.1 External interface requirements 38

3.3.2 Functional requirements 38

3.3.3 Performance requirements 39

3.3.4 Design constraints 39

3.3.5 Standards Compliance 39

3.3.6 Logical database requirement 39

3.3.7 Logical class diagram 40

3.3.8 Reliability 41

3.3.9 Availability 41

3.3.10 Security 41

3.3.11 Maintainability 42

3.3.12 Portability 43

3.3.13 Other requirements 43

4. Project Plan Overview 44

4.1 Introduction 44

4.2 Work Packages 44

4.3 Milestones and Deliverables 44

4.3.1 M1 – Report Findings (Interim Report) 45

4.3.2 M2 – Application Design Specification 45

4.3.3 M3 – Implementation 45

4.4 Project Plan 45

4.5 Time Management 47

4.6 Meeting Plan 48

4.7 Risk Management 48

4.7.1 Event Driven Risks 48

4.7.2 Evolving Risks 49

4.7.3 Critical Contingency 49

4.7.3.1 Loss of Data 49

4.7.3.2 Time Delays 49

5 IEEE Software Design Description 50

5.1 Revision History 50

5.2 System Architectural Design 50

1.2.1 System Description 51

5.2.2 System Architecture 52

5.2.3 Design Constraints 55

5.2.3.1 General Constraints 55

5.2.3.2 Hardware Constraints 55

5.2.3.3 Software Constraints 55

5.3 Components Description 55

5.3.1 Decomposition Description 56

5.3.1.1 User 56

5.3.1.2 Group 58

5.3.1.3 Steganographic Plugin Manager 59

5.3.1.4 Setting 60

5.3.1.5 Mail 61

5.3.1.6 Data Plugin Manager 65

5.3.1.7 StegoText 66

5.3.2 Class Diagram 67

5.4 External Interfaces 68

5.4.1 User Interfaces 68

5.4.1.1 Login 69

5.4.1.2 Main Menu 70

5.4.1.3 Encode Text 71

5.4.1.4 Decode Text 72

5.4.1.5 Send Mail 73

5.4.1.6 Receive Mail 74

5.4.1.7 Settings 75

5.4.2 External System Interfaces 76

5.4.2.1 Steganographic Plugin 76

5.4.2.2 Data Plugin 78

5.5 Data Description 83

6 Implementation 87

6.1 Compilation Guidelines 87

6.1.1 Target Environments 87

6.1.2 System Requirements 87

6.1.3 Compilation Guidelines 89

6.1.3.1 Ubuntu™ Host and Target 89

6.1.3.2 Microsoft® Windows™ Host and Target 93

6.2 System Implementation 95

6.2.1 Splash Screen 95

6.2.2 Authentication 97

6.2.3 Main Menu 97

6.2.4 Encode Text 98

6.2.5 Decode Text 100

6.2.6 Receiving Encoded Messages 101

6.2.6 Sending Encoded Messages 102

6.2.7 System Administration 103

6.2.7.1 General Settings 103

6.2.7.2 Groups 103

6.2.7.3 Users 104

6.2.7.4 Libraries 104

6.7.2.5 Mail 105

7 IEEE Software Test Plan 106

7.1 Revision History 106

7.2 Introduction 106

7.3 Test Items 106

7.4 Tests Not Carried Out 107

7.5 User Interface Tests (Graphical User Interface) 108

7.6 Test Result Execution 108

8 Critical Evaluation 109

8.1 Steganographic Methods 110

8.1.1 Open Space Encoding 111

8.1.2 Synonym Replacement 112

8.1.3 English Diversity 113

8.1.4 Wayner’s Mimic Functions 114

8.2 Application Issues and Future Recommendations 118

8.2.1 Unknown Encoding 118

8.2.2 Library Not Registered 118

8.2.3 Path Execution 119

8.2.4 Other Future Enhancements 119

8.3 User Evaluations 119

8.3.1 Icons 119

8.3.2 Colours 120

8.3.3 Interface Sizing 120

8.3.4 Other usability issues 120

9 Conclusions 123

References 125

Appendix 128

Appendix 1 Class Diagram 128

Appendix 2 HTML Help 130

Appendix 3 Class Identifiers 138

Appendix 4 Licensing 140

Appendix 5 Test Case Plan 141

Appendix 6 Test Execution 150

Appendix 7 User Evaluations 168






Yüklə 0,67 Mb.

Dostları ilə paylaş:
  1   2   3   4   5   6   7   8   9   ...   22




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©muhaz.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin