Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Specification
for
Steganography
Prepared by
Sorabh
Tilak Raj Chandan
Table of Contents
1. Introduction...............................................................................................................................1
1.1 Purpose ..............................................................................................................................................1
1.2 Document Conventions......................................................................................................................1
1.3 Intended Audience and Reading Suggestions....................................................................................1
1.4 Project Scope......................................................................................................................................2
1.5 References..........................................................................................................................................2
2. Overall Description...................................................................................................................3
2.1 Product Perspective............................................................................................................................3
2.2 Product Features.................................................................................................................................3
2.3 User Classes and Characteristics........................................................................................................4
2.4 Operating Environment......................................................................................................................4
2.5 Design and Implementation Constraints............................................................................................4
2.6 User Documentation...........................................................................................................................4
2.7 Assumptions and Dependencies.........................................................................................................5
3. External Interface Requirements............................................................................................6
3.1 User Interfaces...................................................................................................................................6
3.2 Hardware Interfaces...........................................................................................................................6
3.3 Software Interfaces.............................................................................................................................6
4. Other Nonfunctional Requirements........................................................................................7
4.1 Performance Requirements................................................................................................................7
4.2 Safety Requirements..........................................................................................................................7
4.3 Security Requirements.......................................................................................................................7
5. Other Requirements.................................................................................................................8
Revision History
Name Date Reason For Changes Version
Sorabh Jan 10,2007 New requirements like encryption had arisen 1.1
Tilak April The implemented system is more advanced then 1.2
15,2007 the proposed system
Software Requirements Specification for Steganography
1. Introduction
1.1 Purpose
The proposed system is a product which is capable of hiding the information into other information.
The hidden information can be a text file, image file, audio file, video file or simply a message. The
Carrier file can also be one of text file, image file, audio file, and video file. The product (software)
should also support encryption and compression.
Secret File/Object: This object can be message, image file, text file, audio file, and video file. It is
intended to be hidden in the Carrier File.
Output File: This is the file produced as a result of stenographic operation. It should resemble the
Source file.
Developers: The SRS is also useful to the developers who wish to develop their own
implantations of Steganography. They can use SRS as directly to enhance the implemented
Software or may develop a new Software right from scratch.
Testers: Because the software is bulky and large in size, all the testers testing the Stegomagic
software should read SRS carefully to go through all the paths of the software during testing.
Students: The SRS is also knowledgeable for the students to get the information about
Steganography. They can refer our SRS, SDD and Project Report to get an overview of
Steganography.
Software Requirements Specification for Steganography
1.5 References
Wikipedia:
1. http://en.wikipedia.org/wiki/Steganography
2. http://en.wikipedia.org/wiki/StegoText
2. Overall Description
End User : They can perform the Steganographic task but have no control over the user
management
And log file.
The software does not check the size limit. As a result there may be a case that hidden object is
not fully consumed yet the software shows no error. This can be verified by extracting the hidden
object just after hiding it into the carrier file.
Output audio file is distorted considerably when both carrier and hidden objects are audio.
Login Screen : It is for security purpose. It asks the user to give its name and password. Only
authenticated user can use the software.
Main Form : It provides various features to user about the mode of use of software. User can
choose text, audio, video ,image option and can do work on it. It also provides various other
features like user management, compression, encryption, zip, log file.
Exit: Click on exit button on main form will shutdown the application.
Error Messages : Proper error messages will appear when any error is encountered.
5. Other Requirements
The class path should be set properly. Other wise the software will automatically set the classpath
but that will take time, due to which the performance decreases considerably.
There are no further requirements other than the specified in this SRS under different headings.
Software Requirements Specification for Steganography
Appendix A: Glossary
Carrier File/Object : A Carrier file or Carrier object is the source file onto which the data to be hide
is written in such a way the output file resembles the initial source file to naked eye and to the
normal applications which are associated to the source file.
Secret File/Object: This object can be message, image file, text file, audio file, and video file. It is
intended to be hidden in the Carrier File.
Output File: This is the file produced as a result of stenographic operation. It should resemble the
Source file.