Вы находитесь на странице: 1из 32

File Transfer in Audio Stegnography

Digital documentation is a method by which a company can convert paper

documents into digital format. An electronic image of the original paper document is

created which can be viewed on a computer. There are many benefits of converting paper

into digital format and that is why it has been seen that more and more companies are

converting their files, manuals, catalogues, brochures - in short all data which is on paper

into a digital image. Data recording systems are systems designed to faithfully capture

digital and analogue data, using a variety of standard and non-standard electronic interfaces

and protocols, in such a way that the captured data can be analyzed, reproduced, and

replayed as a number of time-synchronized streams of data.

It has been developed for the purpose of making several security-based

transactions. The confidential or important information, which sent with

normal format, there might, may be a chance of happening misuse cases.

These can be avoided by making use of this system. The mechanism, which

is used to hide the digital file in the image files, is known as

Stegnography.in this steganography key generated using TRIPLE-DES

This Project is developed in .NET Platform and base language is VB.NET. Because

Vb.NET is very effective language to write, understand easily also user friendly to both

Programmer and user compare to all other web technologies. Data communication has

become a fundamental part of computing and data networks. Visual Basic .NET comes with

enhanced visual designers, increased application performance, and a powerful integrated

development environment (IDE).


1. INTRODUCTION

This chapter outlines the profile of the organization at which the project is
developed and specifies the system environment

1.1 ORGANIZATION PROFILE

OVERVIEW OF THE PROJECT:

It Contains following Modules,

Modules:

file Sending

File Receiving

Hide File

Extract File

Convert to Digital Format

Digital documentation is a method by which a company can convert Text documents into
digital format. An electronic conversion of the original Text document is created which can be
viewed on a computer. There are many benefits of converting Text into digital format and that is
why it has been seen that more and more companies are converting their files, manuals, catalogues,
brochures - in short all data which is on Text into a digital Format.

File Sending and Receiving


File Sending and Receiving is one of the most useful features for transferring files
using sockets. This feature allows you to share all kinds of information with other people
share on Remote system.

This utility will transfer a file between two computers using a TCP port of your choosing.
One computer uses Passive mode and listens on a port for a connection from the other computer,
which will use Active mode to connect to the first computer via its IP address. Regardless of the
selection of which computer will use Passive mode and which will use Active mode, files can be
sent in either direction.

HIDE FILE

This module is used to hide picture in data file. It has the following
process like, Image Location, Save File Location, Encryption Key is
provided by the user to hide picture file in the saved data file location.

Image location

The Image file, which is already, exists in the system. User has to
open the file from the open dialog box.

Save File Location

This is also Image file, which is generated by the user. User has to
save this new file in any location according to their wish. This file is used
to embed the picture file in the data file .

Encryption Key

This key is the public key. This is confidential key between sender
and receiver. This is also embedding the picture file with data file.this key
generated by using triple des algorithm

Validation code
This is actual file size of the image location. This is in bytes. The
picture file is added to the saved image location after this last byte.

Hide

It is used to hide the data file into saved picture file. Picture file

VIEW FILE

This module is used to display the picture files embed with data
file. Forms, Filename, validation code are displayed in the list. The receiver
can download the selected file by right click the list view box. The
downloaded file is stored in c:\download folder in the client machine from
server.

EXTRACT FILE

This module is used to extract files.

Image Location

Downloaded images by the user are given as input in this text box.

Encryption key

The key used to extract the file. This is a secret key. Receiver
should know this key to retrieve message.

Validation Code

This is the offset of the file where actually the picture file is
resided.

Extract File

When receiver clicks this button the picture file is shown to the
receiver. Encrypted files are decrypted and then shown in the text box.
1.3 SYSTEM ENVIRONMENT:

HARDWARE CONFIGURATION:

PROCESSOR : PENTIUM IV
HARD DISK CAPACITY : 40 GB
MONITOR : 14 “SAMTRON MONITOR
FLOPPY DISK DRIVE : 1.44 MB
PRINTER : TVS 80 COLOR
INTERNAL MEMORY CAPACITY : 128 MB
KEYBOARD : LOGITECH OF 104 KEYS
CPU CLOCK : 1.08 GHz
MOUSE : LOGITECH MOUSE

SOFTWARE CONFIGURATION:

OPERATING SYSTEM : WINDOWS 2000


FRONT END : VB.NET
SOFTWARE FEATURES:

The system is developed using Visual Basic. NET, which


is a very popular Microsoft Product developed by Microsoft Corporation. This
is one of the improved languages from basic language. Visual basic. NET
includes a variety of open active controls for user interfaces to design
application forms.

VB.NET is the multiple document inter face format


(MDI).The user interface is the part of the program that responds to the key
press and mouse clicks. The action is referred to as events of the form and
controls in the form. VB.NET provides vast properties and methods for each
control, which helps to utilize all those, functions for record manipulations.

Menu driven is one of the most effective controls in the


VB.NET.In this menu driven the menu names in a program appear in the menu
bar when the user selects a menu, that menu open. Each menu usually contains
items arranged in a vertical list.

These items are often grouped into functional groups with


menu separaters.When the user selects a menu item, that item appears
highlighted; pressing enter or releasing the mouse button opens that item. Each
item should have a unique access character for users to choose commands with
keyboards. The user reaches the menu or menu item by pressing alt key and
access character. Short cuts are also useful to the user these keys are faster than
access character in that the user only needs to enter a shortcut to execute the
corresponding menu item.
2.2 OVER VIEW OF .NET FRAMEWORK

The .NET framework is a new computing platform that simplifies


application development in the highly distributed environment of the internet.
The .NET framework is designed to fulfill the following objectives.
 To provide a consistent object –oriented programming
environment whether object code is stored and executed
locally, but internet-distributed, or executed remotely.
 To provide a code execution environment that minimizes
software deployment and versioning conflict.
 To provide a code execution environment that guarantees safe
execution of code, including code created by an unknown or
semi trusted third party.
 To provide a code-execution environment that eliminates the
performance problems of scripted or interpreted
environments.
 To make the developer experience consist ant across widely
varying types of applications, such as windows-based
applications and web-based applications.
 To build all communication on industry standards to ensure
that code based on the .NET framework can integrate with
any other code.

The .NET framework has two main components


 Common Language Runtime (CLR).
 NET framework class library.
2.2.1 Common Language Runtime (CLR).

 The common language runtime is the foundation of the .NET


framework .you can think of the runtime as an agent that
manages code at execution time, providing core services such
as memory management and thread management while also
enforcing strict type safety and other forms of code accuracy
that ensure security and robustness.

 In fact, the concept of code management is a fundamental


principal of the runtime .Code that targets the runtime is
known as managed code, while code that dose not target the
runtime is known as unmanaged code.

 The .NET framework can be hosted by unmanaged


components that load the common language runtime into their
processes and initiate the execution of managed code, thereby
creating a software environment that can explicit both managed
and unmanaged features. The .NET framework not only
provides several runtime hosts, but also supports the
development of third-party runtime hosts.

 Internet explore is an example of an unmanaged application


that runtime (in the form of a mime type extension).Using
internet explorer to host the runtime enables you to embed
managed components or windows from controls in the HTML
documents.
The Components Of CLR Are:

 CTS =>Common Type System.


 CLS =>Common Language Specification
 CLS =>Common Language Specification
 CIL =>Common Intermediate Language
 JIT =>Just In Time Compiler
 VES =>Virtual Execution System

2.2.1.1 CTS –Common Type System

This is the range of types that the .NET runtime understands, and
therefore that .NET application can use. The common type system supports
both object oriented programming like java as well as procedural languages
like ‘c’ .It deals with two kinds of entities such objects and values.

2.2.1.2 CLS-Common Language Specification

This is a subset of the CTS that all .NET languages are expected to
support. The idea is the any program that uses CLS-compliant types can
interoperate with any .NET program written in any language. If a component
written in one language (say c#) is to be used from another language (say
VB.NET) then the component writer must adhere to type and structures
defined by CLS.
2.2.1.3 CIL-Common Intermediate Language

All compilers complying with CLR must generate an intermediate


language representation called common intermediate language (CIL). The CIL
uses this intermediate language to either generate native code or use just in
compiler (JIT) complication to execute the intermediate code on the fly.

2.2.1.4 JIT-Just In Time Compiler

The JIT or just in time compiler is the part of the runtime execution
environment, which is used to convert the intermediate language contained in
the execution file, called assemblies , into native executable code. The security
policy settings are referred at this to decide if code being compiled needs to be
type safe.

2.2.1.5 VES-Virtual Execution System

Virtual execution system (VES) is more or less equivalent to the JVM


(Java Virtual Machine).VES loads, links and runs the programs written
for common language infrastructure contained in portable executable (PE)
files.VES fulfill it’s loader function by using information contained in the
metadata and uses late binding (or linking) to integrate modules compiled
separately, which may even be written in different languages

2.2.2 .NET Framework Class Library

The .NET framework library is a collection of reused


types that tightly with the common language runtime (CLR). The class library
is object oriented, providing type from which your own managed code can
derive functionality. Managed codes are intermediate language codes along
with metadata contained in portable executable (PE) files.This not only makes
the .NET framework type easy to use, but also reduces the associated with
learning new features of the .NET framework.
In addition, third –party components can integrate seamlessly with
classes in the .NET framework .for example ,the .NET framework collection
classes implement a set of interfaces that you can use to develop you r own
collection classes .your collection classes will blend seamlessly with the
classes in the .NET framework.
One can use the .NET framework to develop the following types of
application and services.
 Console application
 Scripted and hosted application
 Windows GUI application (windows forms)
 VB.NET application
 XML web service.

2.3 Visual Basic .Net

Visual basic .NET preserves VB’s general approach to programming


with a SDK development environment and click through forms to get at the
underlying code. The Visual Basic IDE is made up of a number of components
given below:

 Forms
 Toolbox
 Tabs
 Properties windows
 Solution explorer
 Output windows
 Task list window

2.3.1 Forms

A form is one of the most basic objects in which the application code and
acts as a container for the controls placed on it thus providing a visual
interface. VB.NET initially includes a default form; form1 file in each new
project .Every form object has its properties, events and methods associated
with it.
2.3.2 Toolbox

The toolbox is an important window, which contains a set of controls. It


contains the controls to create our forms non-graphical components such as
database connections and code fragments that can be dragged directly from the
toolbox into the code window.
2.3.3 Tabs
Different tabs are organized in the toolbox. Some of the tabs are

 Data : Contains components that provide


access to data and data sources.
 Components : Contains various components such as
reporting, message queuing etc.
 Clipboard ring : Contains a list of the last few items that
is copied to the system clipboard.
 General : Empty by default, this is a place for us to
store general controls, components, and
code fragments.
 Win forms : Containing windows form controls is
automatically available when windows
forms project is included in the project.
 Web forms : Contains server side web form controls
that are used to create web pages.
 HTML tab : Contains controls that correspond to the
standard HTML tags.

2.3.4 Properties Window

The properties window appears beneath the solution explorer on the


right-hand of the VS.NET main window. It displays the properties for the
currently selected object in the main window. Pressing key F4 also displays the
properties window for the selected object.

2.3.5 Solution Explorer

Solution explorer window is similar to the project explorer window in


the Bathe solution explorer is a bit more advanced, since it allows us to
construct solutions out of several different projects – including those written in
different languages.

2.3.6 Class View


The class view window is somewhat similar to the solution explorer, in
the it provides a view into our solution and project. A view of classes,

methods and properties rather than a view of files are provided by the class
view in the world of object-oriented world of .NET.

2.3.8 Output Window

The output window is similar to the immediate window available in the


previous version of visual basic. The immediate window is used to view debug
output from the application, and to interact with the environment by entering
bits of code or even calling procedures within the user’s code.
2.3.9 Task List Window

Task list window is a feature that is used to provide a quick list of all the
current build and syntax errors in our application. The main advantage of using
the task list is that by double-clicking on an error listed in the window will
take us right to the troublesome point in our code.

2.4 Difference between visual basic 6.0 and visual basic.NET

 Visual basic.NET is object oriented, but visual basic 6.0 is object


based.
 Multithreading is possible in a better way in .NET than in Visual
Basic 6.0.
 .NET supports ASP.NET.
 A new concept name space is introduced.
 Visual basic.NET is a platform independent.
 Even the data types are considered as objects in visual basic.NET
 In .NET structured error handling is possible.
 Option have statement is removed (all array are zero based)
 Unary operators are available.
 Instead of COM components there is .NET components in visual
basic.NET.But it support COM components of visual basic 6.0.

2.5 SPECIAL FEATURES IN VB.NET:

 VB.NET is an ideal programming language for developing


sophisticated professional application for Microsoft windows

 It makes use of the graphical user interface for creating powerful


applications, which enables the user to interact easily within an
application.

 VB.NET provides many aspects such as easier comprehension,


user friendliness and faster application development, which help
the developer to design the application more effectively.

 VB.NET provides the facilities such as log in dialog form,


browser form, query form ,option dialog form and wizard from
which enable the developer design the application more
effectively
.
 MDI form facilitates the relationship between the parent and the
child
3. SYSTEM ANALYSIS

In this chapter, concepts associated with term structured system and how
they are implemented in the project has been dealt with the tools used for structure
system analysis are,

 System Flow Diagram

System Flow Diagram:


A Process Flow Diagram - PFD - (or System Flow Diagram - SFD) shows
relationships between major components in a system. A PFD also tabulate process design
values for the components in different operating modes, typical minimum, normal and
maximum values. A PFD does not show minor components, the piping systems, piping
ratings and designations. All information systems manage the flow of data introduced into
the system. The visualization of data flows represents the activity of data moving and
transforming as it moves through a defined business system. A flow diagram is a graphical
means of presenting, describing, or analyzing a process. This is done by drawing small
boxes which represent steps or decisions in a chain of steps or decisions.

Graphical representation of a process, such as a manufacturing operation or a


computer operation, indicating the various steps taken as the product moves along the
production line or the problem moves through the computer. Individual operations can be
represented by closed boxes, with arrows between boxes indicating the order in which the
steps are taken and divergent paths determined by variable results.

A Process Flow Diagram - PFD - should include:

 process piping
 major equipment symbols, names and identification numbers
 control, valves and valves that affect operation of the system
 interconnection with other systems
 major bypass and recirculation lines
 system ratings and operational values as minimum, normal and maximum flow,
temperature and pressure
 composition of fluids
SYSTEM FLOW DIAGRAM
4. SYSTEM DESIGN

System design is the process of planning a new system to complement or altogether


replace the old system. The purpose of the design phase is the first step in moving from the
problem domain to the solution domain. The design of the system is the critical aspect that
affects the quality of the software. System design is also called top-level design. The design
phase translates the logical aspects of the system into physical aspects of the system.

3.2 INPUT DESIGN

Input design is one of the most important phase of the system design. Input design is
the process where the input received in the system are planned and designed, so as to get
necessary information from the user, eliminating the information that is not required. The
aim of the input design is to ensure the maximum possible levels of accuracy and also
ensures that the input is accessible that understood by the user.
The input design is the part of overall system design, which requires very careful
attention. if the data going into the system is incorrect then the processing and output will
magnify the errors.

The objectives considered during input design are:


 Nature of input processing.
 Flexibility and thoroughness of validation rules.
 Handling of properties within the input documents.
 Screen design to ensure accuracy and efficiency of the input
relationship with files.
 Careful design of the input also involves attention to error handling,
controls, batching and validation procedures.

Input design features can ensure the reliability of the system and produce result from
accurate data or they can result in the production of erroneous information. The input design
of the system includes the following
OUTPUT DESIGN

Output design is very important concept in the computerized system, without

reliable output the user may feel the entire system is unnecessary and avoids using it. The

proper output design is important in any system and facilitates effective decision-making.

The output design of this system includes various reports.

Computer output is the most important and direct source of information the user.

Efficient, intelligible output design should improve the system’s relationships with the user

and help in decision making. A major form of output is the hardcopy from the printer.

Output requirements are designed during system analysis. A good starting point for

the output design is the data flow diagram. Human factors reduce issues for design involved

addressing internal controls to ensure readability.

CODE DESIGN

Code is an order collection of symbols designed to provide unique identification of

an entry or attribute. Sometimes used in the place of name of the item they can be specified

all object’s physical or performances characteristics or operational instructions. They can

also show inter relationship and may some time be used to achieve secrecy or

confidentiality.

Most computer systems are stable from the compiler down to the execution of

binary instructions. Therefore, it's natural to think of "product" as the artifact just above that

base. That's language source code. The system that produces that artifact is still quite

unpredictable, so it's not likely we'll shift our orientation. Artifacts more abstract, be they

whatever, will constitute a nebulous range of "designs" or "specifications". I think it's the

lack of a direct and strictly repeatable translation of these artifacts that characterizes them.
5. TESTING AND IMPLEMENTATION
5.1 TESTING

Testing is a series of different tests that whose primary purpose is to fully

exercise the computer based system. Although each test has a different purpose, all work

should verify that all system element have been properly integrated and performed allocated

function. Testing is the process of checking whether the developed system works according

to the actual requirement and objectives of the system.

The philosophy behind testing is to find the errors. A good test is one that has a

high probability of finding an undiscovered error. A successful test is one that uncovers the

undiscovered error. Test cases are devised with this purpose in mind. A test case is a set of

data that the system will process as an input. However the data are created with the intent of

determining whether the system will process them correctly without any errors to produce

the required output.

Types of Testing:

 Unit testing
 Integration testing
 Validation testing
 Output testing
 User acceptance testing
5.1unit Testing
All modules were tested and individually as soon as they were completed and were
checked for their correct functionality.
5.2 Integration Testing

The entire project was split into small program; each of this single programs gives a
frame as an output. These programs were tested individually; at last all these programs
where combined together by creating another program where all these constructors were
used. It give a lot of problem by not functioning is an integrated manner.
The user interface testing is important since the user has to declare that the
arrangements made in frames are convenient and it is satisfied. when the frames where
given for the test, the end user gave suggestion. Based on their suggestions the frames
where modified and put into practice.

Validation Testing:
At the culmination of the black box testing software is completely assembled as a

package. Interfacing errors have been uncovered and corrected and a final series of test i.e.,

Validation succeeds when the software function in a manner that can be reasonably

accepted by the customer.

5.3 Output Testing

After performing the validation testing the next step is output testing of the proposed
system. Since the system cannot be useful if it does not produce the required output. Asking
the user about the format in which the system is required tests the output displayed or
generated by the system under consideration. Here the output format is considered in two
ways. one is on screen and another one is printed format. The output format on the screen is
found to be corrected as the format was designed in the system phase according to the user
needs. And for the hardcopy the output comes according to the specifications requested by
the user.
User Acceptance System

An acceptance test as the objective of selling the user on validity and


reliability of the system. It verifies that the procedures operate to system specification and
mat the integrity of vital is maintained.

Performance Testing

This project is a application based project, and the modules are interdependent with
the other modules, so the testing cannot be done module by module. So the unit testing is
not possible in the case of this driver. So this system is checked only with their performance
to check their quality.

QUALITY ASSURANCE

Quality assurance consists of the auditing and reporting functions of management.


The goal of quality assurance is to provide management with the data entries necessary to
be informed about the product quality thereby gaining the goal of insight and confidence
that the product quality is meeting

Greater emphasis on quality in organization requires quality assurance. To be an


integral part of the information system development .The development process must include
checks throughout the process to ensure that the final product meets the original user
requirements.

Quality assurance thus becomes an important component of the development


process, It’s included in the industry standard (IEEE 1993) On the development process
quality assurance process is integrated into a linear development cycle through validation
and verification performed at crucial system development steps .The goals of the
management is to institute and monitor a quality assurance program with in the
development process

Quality assurance induces

1. Validation of the system against requirements


2. Checks for errors in design documents and in the system itself
3. Quality assurance for usability

Quality assurance Goals:

Correctness: The extent to which the program meets the system specifications and user
objectives
Reliablility: The degree to which the system performs its intended functions overtime
Efficiency: The amount of computer resources required by a program to perform a
function
Usability: The effort required learning and operating a system
Maintainability: To use with which program errors are located and corrected
Testability: The effort required a testing a program to ensure its correct performance
Portability: To ease of transporting a program from hardware configuration to another
Accuracy: The required position in input editing computation and output

6.2.1 GENERIC RISKS.

Risk identification is the systematic attempt to specify threats to the project plan
(estimates the schedule resource overloading etc.). By identifying know and predictable risk
the first step is to avoiding them. When possible and controlling them when necessary there
are two types of risks
 Generic Risk
 Product specific risk

Generic risks are potential threats to every software project. Only those with a clear
understanding of technology can identify product specific risk The people and the
environment that is specific to the project at a hand and to identify the product specific risk
and the project the plan and the software statement of scope are examined and answer to the
following question is developed.
What special characteristics of this product may threaten the project
plan one method for identifying risk is to create a risk item and checklists. The checklist can
be used for risk identification and focus on some subset to know and predictable risk in the
following sub categories.
 Product risk
 Risk associated with overall size of software to built or
modified
 Business imparts
 Risk associated with constraints imposed with management
 Customer characteristics

Risk associated with sophisticated of the customer and developers ability to communicate
with the customer in a timely manner.
Different categories of risks are considered

Project Risks
It identify a potential budgetary, schedule, personnel like staffing, organizing,
resource, customer requirement, problems and their impact on a software project

Technical risks
Technical risks identify potential design implementation interface, verification, and
maintenance problems.

SYSTEM IMPLEMENTATION:

System implementation is stage in the project where the theoretical design is

turned into the working system. The most crucial stage is giving the users confidence that

the new system will work effectively and efficiently.


The performance of reliability of the system is tested and it gained acceptance.

The system was implemented successfully. Implementation is a process that means

converting a new system in to operation.

Proper implementation is essential to provide a reliable system to meet

organization requirements. During the implementation stage a live demon was undertaken

and made in front of end-users. The various features provided in the system were discussed

during implementation

The purpose of System Implementation can be summarized as follows:

It making the new system available to a prepared set of users (the deployment), and

positioning on-going support and maintenance of the system within the Performing

Organization (the transition). At a finer level of detail, deploying the system consists of

executing all steps necessary to educate the Consumers on the use of the new system,

placing the newly developed system into production, confirming that all data required at the

start of operations is available and accurate, and validating that business functions that

interact with the system are functioning properly. Transitioning the system support

responsibilities involves changing from a system development to a system support and

maintenance mode of operation, with ownership of the new system moving from the Project

Team to the Performing Organization.

List of System implementation is the important stage of project when the theoretical design

is tuned into practical system. The main stages in the implementation are as follows:

 Planning
 Training
 System testing and
 Changeover Planning

Planning is the first task in the system implementation. Planning means deciding on
the method and the time scale to be adopted. At the time of implementation of any system
people from different departments and system analysis involve. They are confirmed to
practical problem of controlling various activities of people outside their own data
processing departments. The line managers controlled through an implementation
coordinating committee. The committee considers ideas, problems and complaints of user
department, it must also consider;

 The implication of system environment


 Self selection and allocation form implementation tasks
 Consultation with unions and resources available
 Standby facilities and channels of communication
The following roles are involved in carrying out the processes of this phase. Detailed

descriptions of these roles can be found in the Introductions to Sections I and III.

_ Project Manager

_ Project Sponsor

_ Business Analyst

_ Data/Process Modeler

_ Technical Lead/Architect

_ Application Developers

_ Software Quality Assurance (SQA) Lead

_ Technical Services (HW/SW, LAN/WAN, TelCom)

_ Information Security Officer (ISO)

_ Technical Support (Help Desk, Documentation, Trainers)

_ Customer Decision-Maker

_ Customer Representative

_ Consumer
The purpose of Prepare for System Implementation is to take all possible steps to

ensure that the upcoming system deployment and transition occurs smoothly, efficiently,

and flawlessly. In the implementation of any new system, it is necessary to ensure that the

Consumer community is best positioned to utilize the system once deployment efforts have

been validated. Therefore, all necessary training activities must be scheduled and

coordinated. As this training is often the first exposure to the system for many individuals, it

should be conducted as professionally and competently as possible. A positive training

experience is a great first step towards Customer acceptance of the system.

During System Implementation it is essential that everyone involved be absolutely

synchronized with the deployment plan and with each other. Often the performance of

deployment efforts impacts many of the Performing Organization’s normal business

operations. Examples of these impacts include:

_ Consumers may experience a period of time in which the systems that they depend on to

perform their jobs are temporarily unavailable to them. They may be asked to maintain

detailed manual records or logs of business functions that they perform to be entered into

the new system once it is operational.

_ Technical Services personnel may be required to assume significant implementation

responsibilities while at the same time having to continue current levels of service on other

critical business systems.

_ Technical Support personnel may experience unusually high volumes of support

requests due to the possible disruption of day-to-day processing.

Because of these and other impacts, the communication of planned deployment

activities to all parties involved in the project is critical. A smooth deployment requires

strong leadership, planning, and communications. By this point in the project lifecycle, the
team will have spent countless hours devising and refining the steps to be followed. During

this preparation process the Project Manager must verify that all conditions that

must be met prior to initiating deployment activities have been met, and that the final ‘green

light’ is on for the team to proceed. The final process within the System Development

Lifecycle is to transition ownership of the system support responsibilities to

the Performing Organization. In order for there to be an efficient and effective transition, the

Project Manager should make sure that all involved parties are aware of the transition plan,

the timing of the various transition activities, and their role in its execution.

Due to the number of project participants in this phase of the SDLC, many of the

necessary conditions and activities may be beyond the direct control of the Project Manager.

Consequently, all Project Team members with roles in the implementation efforts must

understand the plan, acknowledge their responsibilities, recognize the extent to which other

implementation efforts are dependent upon them, and confirm their commitment.

System Maintenance:
Maintenance is necessary to eliminate errors in the system during its working life and to
tune the system to any variations in its working environment. It has been seen that there are
always some errors found in the system that must be noted and corrected. It also means the
review of the system from time to time. The review of the system is done for:

 knowing the full capabilities of the system


 knowing the required changes or the additional requirements
 studying the performance

If a major change to a system is needed, a new project may have to be set up to carry out the
change. The new project will then proceed through all the above life cycle phases.
CONCLUSION

The “File Transfer in Audio Stegnography” has been developed to satisfy all

proposed requirements. The system is highly scalable and user friendly. Almost all the

system objectives have been met. The system has been tested under all criteria. The system

minimizes the problem arising in the existing manual system and it eliminates the human

errors to zero level.

The software executes successfully by fulfilling the objectives of the project. Further

extensions to this system can be made required with minor modifications. The invention can

be implemented in digital electronic circuitry, or in computer hardware, firmware, software,

or in combinations of them. Apparatus of the invention can be implemented in a computer

program product tangibly embodied in a machine-readable storage device for execution by a

programmable processor; and method steps of the invention can be performed by a

programmable processor executing a program of instructions to perform functions of the

invention by operating on input data and generating output


Scope for Future Enhancement

There is a wide scope for future development of the software. The world of

computer fields is not static it is always subject to change. The technology which is famous

today will become outdated very next day. To keep abstract of technical improvements, the

system may be refinement. So it is not concluded. Yet it will improve with further

enhancements.

It is essential to change the software when a new software arrives with more

advanced feathers. So it is much necessary for further development. Further enhancements

can be done in an efficient manner with disruption to the system.


BIBLIOGRAPHY

 .Elias Awath, “SYSTEM ANALYSIS AND DESIGN”,Tata Mc Graw Hill

Publication, Sixth Edition,2003

 .S.Ramachandran,”COMPUTER AIDED DESIGN”, Air Walk Publication,

Third Edition,2003

 .Richard Fairley,”SOFTWARE ENGINEERING CONCEPTS”,Tata Mc

Graw Hill Publication, Second Edition,1997

 .Distributed .NET Programming in VB .NET by Tom Barnaby

 Professional VB.NET, 2nd Edition by Fred Barwell, et al

 The .NET Languages: A Quick Translation Guide by Brian Bischof

 Programming VB.NET: A Guide for Experienced Programmers

by Gary Cornell, Jonathan Morrison

 Learning Visual Basic.NET Through Applications by Clayton Crooks

II

 Visual Basic .NET How to Program (2nd Edition) by Harvey M.

Deitel, Paul J. Deitel, Tem R. Nieto

Вам также может понравиться