Anda di halaman 1dari 5

Software Requirement Specification Document

Table of Contents
1.Introduction
1.1 Purpose
1.2 Document Conventions
1.3 Intended Audience and Reading Suggestions
1.4 Product Scope
1.5 References
2. Overall Description
2.1 Product Perspective
2.2 Product Functions
2.3 User Classes and Characteristics
2.4 Operating Environment
2.5 Design and Implementation Constraints
2.6 User Documentation
2.7 Assumptions and Dependencies

3. External Interface Requirements


3.1 User Interfaces
3.2 Hardware Interfaces
3.3 Software Interfaces
3.4 Communications Interfaces

4. System Features
4.1 System Feature 1

4.2 System Feature 2 (and so on

5. Other Nonfunctional Requirements


5.1 Performance Requirements

5.2 Safety Requirements


5.3 Security Requirements.
5.4 Software Quality Attributes
5.5 Business Rules

1. Introduction

1.1 Purpose
Steganography is basically a process through which one can encrypt any
plain text directly into an audio file, a video file or a picture. The main
purpose of this project is to provide an easy and accessible program to
encrypt this data as discretely as possible.
1.2 Scope

The main intend of this SRS is to provide a simple description of the


application to the client, about the behavior of the system. The entire
package consists of the following parts:-

1. System Software:- The software will allow the encryption of the plain
text that the user enters along with the image.
2. Software Documentation:- A document will be provided to the client
in order for the future maintenance of the system.
3. Operation Manual:- A User Manual is provided to the Client to give
information regarding the operation of the software and how the
software is to be used.
4. User Manual:- After the user has registered his/her details, they will
be given simple guidance on how to get started.
1.3 Definitions, Acronyms and abbreviations

Steganography: It is the encryption of data using a media file,


where the last bit of every of every byte is replaced in an order to
store a short message inside the file.
piCrypt: The name of the software
Encryption: Conversion of plain text into cipher text
Decryption: Conversion of cipher text into plain text
MB (Mega byte):It is a unit of memory storage
SRD: Software Requirement Definition
SRS: Software Requirement Specification
1.4 References

Appendix A: Use Case Diagrams


Appendix B: Class Diagrams
Appendix C: User Interface Diagrams
1.5 Document Overview
The document has 3 major sections
1. Introduction Overview of the whole SRS document
2. General characteristics A description about the features of the
system
Introduction
Product perspective
Product functions
User characteristics
General constraints
Assumptions and dependencies
3. Specific requirements A description of specific requirements of
the system
Functional Requirements
External interface requirements
Performance requirements
Performance Requirements
Design Constraints
Non-functional requirements
Attributes
2. General Characteristics

2.1 Introduction
Through this section a description is given about the characteristics
about the entire system.

2.2 Product Perspective


piCrypt is mainly focused towards people who wants complete
discretion when they want to transfer encrypted data.

Anda mungkin juga menyukai