Professional Documents
Culture Documents
Srs On Image Steganography
Srs On Image Steganography
for
Steganography
Version 1.2 approved
Prepared by
Table of Contents
1. Introduction...............................................................................................................................1
1.1 1.2 1.3 1.4 1.5 2.1 2.2 2.3 2.4 2.5 2.6 2.7 Purpose ..............................................................................................................................................1 Document Conventions......................................................................................................................1 Intended Audience and Reading Suggestions....................................................................................1 Project Scope......................................................................................................................................2 References..........................................................................................................................................2 Product Perspective............................................................................................................................3 Product Features.................................................................................................................................3 User Classes and Characteristics........................................................................................................4 Operating Environment......................................................................................................................4 Design and Implementation Constraints............................................................................................4 User Documentation...........................................................................................................................4 Assumptions and Dependencies.........................................................................................................5
2. Overall Description...................................................................................................................3
5. Other Requirements.................................................................................................................8
Revision History
Name Sorabh Tilak Date Jan 10,2007 April 15,2007 Reason For Changes New requirements like encryption had arisen The implemented system is more advanced then the proposed system Version 1.1 1.2
1. Introduction
1.1 Purpose
The proposed system is a product which is capable of hiding the information into other information. The hidden information can be a text file, image file, audio file, video file or simply a message. The Carrier file can also be one of text file, image file, audio file, and video file. The product (software) should also support encryption and compression.
1.5 References
Wikipedia: 1. http://en.wikipedia.org/wiki/Steganography 2. http://en.wikipedia.org/wiki/StegoText Andrews S Tenanbaum (Computer Networks)
2. Overall Description
2.1 Product Perspective
Steganography is a very old technique of hiding the data. This software is all about hiding the data. This software is made according to the modern need of hiding data. It uses various new techniques for hiding the data. The basic advantage of this product is that it is not specific for a particular type of either hidden file or carrier file.
Recommended Conf.: 256mb RAM or higher, 10mb Disk space Screen Resolution: 1024x768
5. Other Requirements
The class path should be set properly. Other wise the software will automatically set the classpath but that will take time, due to which the performance decreases considerably. There are no further requirements other than the specified in this SRS under different headings.
Appendix A: Glossary
Carrier File/Object : A Carrier file or Carrier object is the source file onto which the data to be hide is written in such a way the output file resembles the initial source file to naked eye and to the normal applications which are associated to the source file. Secret File/Object: This object can be message, image file, text file, audio file, and video file. It is intended to be hidden in the Carrier File. Hidden File/Object: it is same as Secret File/Object. Output File: This is the file produced as a result of stenographic operation. It should resemble the Source file.