Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

of

Audio Steganography synopsis Slide 1 Audio Steganography synopsis Slide 2 Audio Steganography synopsis Slide 3 Audio Steganography synopsis Slide 4 Audio Steganography synopsis Slide 5 Audio Steganography synopsis Slide 6 Audio Steganography synopsis Slide 7 Audio Steganography synopsis Slide 8 Audio Steganography synopsis Slide 9 Audio Steganography synopsis Slide 10 Audio Steganography synopsis Slide 11 Audio Steganography synopsis Slide 12 Audio Steganography synopsis Slide 13 Audio Steganography synopsis Slide 14 Audio Steganography synopsis Slide 15 Audio Steganography synopsis Slide 16
Upcoming SlideShare
Steganography in android to hide applications
Next
Download to read offline and view in fullscreen.

2 Likes

Share

Download to read offline

Audio Steganography synopsis

Download to read offline

Synopsis report on AUDIO STEGANOGHAPHY which can be used by final year btech students of computer science & engineering Branch

Related Books

Free with a 30 day trial from Scribd

See all

Related Audiobooks

Free with a 30 day trial from Scribd

See all

Audio Steganography synopsis

  1. 1. A SYNOPSIS ON “AUDIO STEGANOGRAPHY” Submitted in partial fulfillment of the requirements For the degree of BACHELOR OF TECHNOLOGY in Computer Science & Engineering Submitted by KUMAR KARTIKEYA UPADHYAY KM. NEHA RANI MANVI GUPTA RAJU RAJPUT Under the Supervision of Mr. SURYA PRAKASH SHARMA Noida Institute of Engineering &Technology, Greater Noida (UP) -201306 Uttar Pradesh Technical University, Lucknow 2014 - 2015
  2. 2. DECLARATION We hereby declare that this submission is our own work and that, to the best of my knowledge and belief, it contains no material previously published or written by another person nor material which to a substantial extent has been accepted for the award of any other degree of the university or other institute of higher learning, except where due acknowledgement has been in the text. Signature- Name- Kumar Kartikeya Upadhyay Roll No. - (1113310103) Date- 19-11-2014 Signature- Name- Km. Neha Rani Roll No. - (1113310099) Date- 19-11-2014 Signature- Name- Manvi Gupta Roll No. - (1113310112) Date- 19-11-2014 Signature- Name- Raju Rajput Roll No. - (1113310163) Date- 19-11-2014
  3. 3. CERTIFICATE This is to certify that the synopsis entitled “AUDIO STEGANOGRAPHY” submitted by KUMAR KARTIKEYA UPADHYAY (1113310103) , KM. NEHA RANI (1113310099) , MANVI GUPTA (1113310112) & RAJU RAJPUT (1113310163) in the partial fulfillment of the requirements for award of Bachelor of Technology in Computer Science and Engineering from Uttar Pradesh Technical University, Lucknow under my supervision. The synopsis embodies result of original work and studies carried out by the student’s their self and the contents of the synopsis do not form the basis for the award of any other degree to the candidate or to anybody else from this or any other University/Institution. Mr. SURYA PRAKASH SHARMA Assistant Professor (CSE) NIET, Greater Noida
  4. 4. ABSTRACT Embedding secret message into digital sound is called audio steganography. Audio Steganography is presented where the bits of a secret message are embedded into the coefficients of a cover audio. Steganography is the art and science of secret communication. In this project a new scheme for digital audio steganography is presented where the bits of a secret message are embedded into the coefficients of a cover audio. Each secret bit is embedded into the selected position of a cover coefficient. The position for insertion of a secret bit is selected from the 0th (Least Significant Bit) to 8th LSB based on the upper three MSB (Most Significant Bit). This scheme provides high audio quality, robustness and lossless recovery from the cover Audio.
  5. 5. ACKNOWLEDGEMENT This synopsis is by far the most significant accomplishment in our life and it would be impossible without people who supported us and believed us. We would like to extend our gratitude and our sincere thanks to our honorable, esteemed guide Mr. SURYA PRAKASH SHARMA(Assistant Professor (CSE), Department of Computer Science and Engineering, NIET, Greater Noida for their immeasurable guidance and valuable time that he devoted for synopsis. We sincerely thank for their exemplary guidance and encouragement. His trust and support inspired us in the most important moments of making right decisions and we are glad to work with him. We would also like to give very special thanks to Dr. RAJDEV TIWARI HOD (CSE). Also we would also like to give thanks to our teachers for their support, help and encouragement during this work. We would like to thank all our friends and for all the thoughtful and mind stimulating discussions we had, which prompted us to think beyond the obvious. We have enjoyed their companionship so much during us stay at NIET, Greater Noida. We would like to thank all those who made my stay in NIET, Greater Noida an unforgettable and rewarding experience. We dedicate this work to them.
  6. 6. TABLE OF CONTENTS i. Declaration ii. Certificate iii. Abstract iv. Acknowledgement 1. Introduction 1.1Project Objective 1.2Project Benefit 1.3Project Scope 2. Algorithm 2.1 Traditional LSB Technique 2.2 Proposed Scheme 2.2.1 Encoding Scheme 2.2.2 Decoding Scheme 3. Flow Chart 4. Use Case Diagram 5. Data Flow Diagram 5.1 0-level DFD 5.2 1-Level DFD 6. References
  7. 7. 1. Introduction 1.1 Project Objective The objective of this project is to make software which can help to hide the secret message inside a audio file which can help to provide security and safety to the secret and confidential information. In this project we’ll implement a system which will embed a secret text message in a audio file we’ll use an algorithm (which is given in next chapter) for implementing this. 1.2 Project Benefit By hiding the secret message using a cover file like audio as a wrapper, the existence of the secret message is concealed during transmission, which provides security when you want to send secret message over any network. 1.3 Project Scope Finding a message will only be possible with knowledge of the key that is required to uncover it. The main advantage of this proposed algorithm is that the insertion position is totally unknown to anyone who wants to hack the secret message. In traditional algorithm the insertion of the secret bit value is sequential so a hacker can easily decode the secret message. So this method is more secure than the traditional one as it do not use any traditional algorithm but a new more secure algorithm. So when this embedded audio will be sent over any network no hacker will ever come to know about the existence of the secret message and in case this somehow they come to know about the existence this position of the bits of secret message will remain unknown forever.
  8. 8. 2. Algorithm 2.1 Traditional LSB Coding Technique A very popular methodology is the LSB (Least Significant Bit) algorithm, which replaces the least significant bit in some bytes of the cover file to hide a sequence of bytes containing the hidden data. That's usually an effective technique where the LSB substitution doesn't cause significant quality degradation. In computing, the least significant bit (LSB) is the bit position in a binary integer giving the units value, that is, determining whether the number is even or odd. The LSB is sometimes referred to as the right-most bit, due to the convention in positional notation of writing less significant digit further to the right. It is analogous to the least significant digit of a decimal integer, which is the digit in the ones (right-most) position. 1 0 0 1 0 1 0 1 Figure 1: Binary representation of decimal 149 The binary representation of decimal 149, with the LSB highlighted. The MSB in an 8-bit binary number represents a value of 128 decimal. The LSB represents a value of 1. For example, to hide the letter "a" (ASCII code 97, which is 01100001) inside eight bytes of a cover, you can set the LSB of each byte like this: 10010010 01010011 10011011 11010010 10001010 00000010 01110010 00101011 The application decoding the cover reads the eight Least Significant Bits of those bytes to recreate the hidden byte— that is 0110001—the letter "a." As you may realize, using this technique let you hide a byte every eight bytes of the cover. Note that there's a fifty percent chance that the bit you're replacing is the same as its replacement, in other words, half the time, the bit doesn't change, which helps to minimize quality degradation. Fig 2 illustrates how the message 'HEY' is encoded in a 16-bit CD quality sample using the LSB method. Here the secret information is ‘HEY’ and the cover file is audio file. HEY is to be embedded inside the audio file. First the secret information ‘HEY’ and the audio file are converted into bit stream. The least significant column of the audio file is replaced by the bit stream of secret information ‘HEY’. The resulting file after embedding secret information ‘HEY’ is called Stego-file.
  9. 9. Figure 2: LSB coding example 2.2 Proposed Scheme In our proposed scheme we will use the traditional LSB algorithm as the base algorithm and will work by taking help of the LSB algorithm but as the traditional scheme is old and outdated so, it is less secure and it will not be able to give proper security as per today’s demand. Here, we’ll try to develop a new algorithm using some new logics which will provide more security to our project and the encoding and decoding techniques of the new proposed algorithm are given below. 2.2.1 Encoding Scheme An audio (WAV) file contains number of carrier audio sample (as shown in fig.3). Analog Signal Sampling Digital Signal Figure 3: Digital sampling of analog signal In traditional LSB algorithm, to hide the secrete message into the audio file, it requires to convert the secret message in binary format and replace each bit in sequenced manner. But in proposed algorithm the secret bit value to be inserted in a different manner unlike traditional way.
  10. 10. Initially the secrete message has to encrypted with some standard encryption algorithm with a key supplied by the sender and shared with the receiver. Then the position for insertion inside the sample of the carrier audio file has to be selected based on the decimal value of first 3 MSB bits. Suppose, first 3 MSB bits’ of a sample are 100 (decimal value is 4), then one bit of the secrete message has to be inserted at the 4th position of the corresponding sample of carrier audio file. After the decimal value for 3 MSB bits are considered for the next sample and similarly the next secrete bit has to be put at the decimal valued position and the process will be repeated for each bit in the secrete message till the full secrete message is hidden. The encoding example is as shown in fig. 4. Figure 4: Bits of a secret Message are embedded in a 16-bit CD quality sample using the proposed method The main advantage of this proposed algorithm is that the insertion position is totally unknown to anyone who wants to hack the secret message. In traditional algorithm the insertion of the secret bit value is sequential so a hacker can easily decode the secret message. So this method is more secure than the traditional one. The algorithm and process flow (fig 5) are as follows-
  11. 11. Algorithm for encoding Input: Audio file in WAV format to use as carrier and the Secret Message to hide as text file, a key for encryption Output: Stego Audio File containing hidden message The steps are as follows:- 1. The secrete message has to be encrypted using a key supplied by the sender and shared with the receiver. Consider the binary of the cipher text of the secrete message to be hidden. If the secret message is in text then convert it into the respective ASCII value and after that it will be converted into binary pattern. 2. Read a secret bit from the sequence to hide. 3. Convert each audio sample into a 16 bit sequence. 4. For each audio sample value Do , 4.1 From the carrier sample first (MSB) 3 bits to be read and converted into decimal value. That generated values is the insertion position of the secret bit inside that audio sample. 4.2 Insert a secret bit into a selected position which was determined by the previous step. 5. Repeat the steps until all the secret bit values are replaced. 6. Stop. Figure 5: The process of encoding 2.2.2 Decoding Scheme The same pattern, which was used to encode the audio, used to decode the modified wav file to get back the original (secrete) message. The message is first decoded and then decrypted by the same encryption key to get the message in its original form. Decoded algorithm and process (fig 6) are as follows-
  12. 12. Algorithm for decoding Input: Stego Audio File containing hidden message Output: Secret message The steps are as follows:- 1. First we have to select the random bits from the stego audio sample which was generated by the proposed way. 2. If the secret message is present into the audio file then recognize the random bit positions and Decrypt the values using proposed algorithm. 3. Repeat the previous step until we will get the whole secret message. 4. Display the message to the end user after decrypting 5. Stop. Figure 6: Process of decoding The decoding example is as shown in fig. 7 Figure 7: Decoding Example
  13. 13. 3. Flow Chart START Enter The Carrier Audio Signal(A) Enter The Secret Text Message(T) Is A>8T Display: Message is too large Enter The Secret Key Sequence Generation Encryption & Embedding Stego File Ready STOP
  14. 14. 4. Use Case Diagram
  15. 15. 5.Data Flow Diagram 5.1 0- Level DFD 5.2 Level 1 DFD Embedded stego file Encrypted secret msg Secret Message Audio File Steganographic system STEGNO FILE: Secret msg. + audio File SECRET MESSAGE STEGANOGRAPHIC ENCRYPTION PROCESS STEGO FILE: SECRET MSG + CARRIER FILE CARRIER FILE COMPRESSION PROCESS DECOMPRESSION PROCESS DECRYPTION SECRET MESSAGE
  16. 16. 6. References
  • nangnunuaye123

    Oct. 25, 2017
  • Mayookhakk

    Sep. 21, 2017

Synopsis report on AUDIO STEGANOGHAPHY which can be used by final year btech students of computer science & engineering Branch

Views

Total views

6,215

On Slideshare

0

From embeds

0

Number of embeds

3

Actions

Downloads

315

Shares

0

Comments

0

Likes

2

×