2016
DOI: 10.1515/acss-2016-0014
|View full text |Cite
|
Sign up to set email alerts
|

Development of Requirements Specification for Steganographic Systems

Abstract: The paper focuses on development of requirements specification for steganographic systems. The main concepts and fields of use of steganography are briefly explained. Criteria that can be used for various non-functional requirements are grouped and their possible metrics are given with examples and sample requirements. The authors provide an original systematic approach to develop requirements for steganographic systems based on the field of use and the importance of each criterion in the selected field. The a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 13 publications
0
3
0
1
Order By: Relevance
“…For instance, when modifications are made to increase the capacity of a particular steganography method, it often negatively affects both robustness and imperceptibility. A steganographic approach is more compatible with classical steganography when its capacity is increased, while it is more compatible with secure steganography when its imperceptibility is increased, and it is more compatible with digital watermarking when its robustness is increased (Grībermans et al, 2016).…”
Section: Figure 1 General Diagram Of Data Hiding and Data Extraction ...mentioning
confidence: 99%
“…For instance, when modifications are made to increase the capacity of a particular steganography method, it often negatively affects both robustness and imperceptibility. A steganographic approach is more compatible with classical steganography when its capacity is increased, while it is more compatible with secure steganography when its imperceptibility is increased, and it is more compatible with digital watermarking when its robustness is increased (Grībermans et al, 2016).…”
Section: Figure 1 General Diagram Of Data Hiding and Data Extraction ...mentioning
confidence: 99%
“…Assessment of data hiding depends on the features of the algorithms themselves and the other factors such as the aim, implementation, and hiding environment [1,[9][10][11][12][13][14][15][16][17]. In [1,9,14], nearly a dozen of attributes are considered for characterizing data hiding techniques.…”
Section: Attributes Of Data Hiding Techniquesmentioning
confidence: 99%
“…Z punktu widzenia bezpieczeństwa informacyjnego, tak niewielka przepływność nadal stanowi wystarczające parametry do przekazania lub wycieku klucza szyfrującego, prywatnej części podpisu elektronicznego itp. Ponadto niewielka przepływność jest czynnikiem utrudniającym wykrycie kanału skrytego [3].…”
Section: äˁǜɂʁ ǘɂʁƭʊɡɂȭƞˁǖŭƌ˿ƕ °ʁ˘˿ʊ˘ǜɂnj ăř˹ǔƌǘǔƙ ǘʁ˘˿ʊ˘ǜɂnjɩʊř˹ǔƌǘǔź˹řǜɩƭƞˁɩɡǚunclassified