Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
AudioSTEGANOGRAPHY
STEGANOGRAPHY                                   No one apart                                      from the    Art and     ...
STEGANOGRAPHY TECHNIQUE  www.company.com
Embedded  Data              Hidden             MESSAGEAudio File      MESSAGE
Audio
AUDIO TERMS• Sampling is the process in whichthe analogue values are only captured at regulartime intervals.• Quantization...
Audio File Types                  File Format     Uncompressed                     Compressed                             ...
WHY .WAV ?Most popular Audio formatDon’t lose any quality in recordingEasier format for DevelopmentNo Compression!!  www.c...
WAVE FILE FORMAT www.company.com
WAVE FILE FORMATHEX Values of WaveFile Size Chunk           Length of Format Data Chunk               Audio Attributes    ...
Steganography  Techniques
TYPES OF STEGANOGRAPHY            LSB CODING          PHASE CODING           ECHO HIDING                   SPREAD  www.com...
WHY LSB?Low computational complexityEasier ImplementationVariation in choosing LSB  www.company.com
LSB ALGORITHM                             Step 2                                    Step 4• Receives the                  ...
CONT. ALGORITHM : CHANGING BITS www.company.com
CONT. ALGORITHM : CHANGING BITS            RC4 Algorithm www.company.com
RC4 ALGORITHM                        RC4                                 The pseudo-          The key-                    ...
RC4 ALGORITHM•   The key-scheduling algorithm (KSA)    •   initialize the permutation in the array "S    •    Array "S" is...
RC4 ALGORITHM•   The pseudo-random generation algorithm (PRGA)    •   Used as many iterations as are needed         www.co...
Live Demo
QUESTIONSwww.company.com
RESOURCES•   Source Code :    http://www.codeproject.com/Articles/6960/Steganography-    VIII-Hiding-Data-in-Wave-Audio-Fi...
Upcoming SlideShare
Loading in …5
×

Audio steganography - LSB

Related Books

Free with a 30 day trial from Scribd

See all
  • Be the first to comment

Audio steganography - LSB

  1. 1. AudioSTEGANOGRAPHY
  2. 2. STEGANOGRAPHY No one apart from the Art and A form of sender and science of security intendedwriting hidden through recipient, messages obscurity suspects the existence of the message www.company.com
  3. 3. STEGANOGRAPHY TECHNIQUE www.company.com
  4. 4. Embedded Data Hidden MESSAGEAudio File MESSAGE
  5. 5. Audio
  6. 6. AUDIO TERMS• Sampling is the process in whichthe analogue values are only captured at regulartime intervals.• Quantization converts each input value into one of a discrete value.• Popular sampling rates for audio include 8 kHz, 9.6 kHz, 10kHz, 12 kHz, 16 kHz, 22.05 kHz and 44.1 kHz www.company.com
  7. 7. Audio File Types File Format Uncompressed Compressed Lossy Loseless WAV AIEF ALAC, FlAC, Mp3, AAC, WMA WavPackwww.company.com
  8. 8. WHY .WAV ?Most popular Audio formatDon’t lose any quality in recordingEasier format for DevelopmentNo Compression!! www.company.com
  9. 9. WAVE FILE FORMAT www.company.com
  10. 10. WAVE FILE FORMATHEX Values of WaveFile Size Chunk Length of Format Data Chunk Audio Attributes www.company.com
  11. 11. Steganography Techniques
  12. 12. TYPES OF STEGANOGRAPHY LSB CODING PHASE CODING ECHO HIDING SPREAD www.company.com SPECTRUM
  13. 13. WHY LSB?Low computational complexityEasier ImplementationVariation in choosing LSB www.company.com
  14. 14. LSB ALGORITHM Step 2 Step 4• Receives the • Check which LSB • Replaces the LSB audio file • Each character to Replace By bit from audio convert it into bit in the message is RC4 Algorithm with LSB bit from pattern. converted into character in the bit pattern. message. Step1 Step 3 www.company.com
  15. 15. CONT. ALGORITHM : CHANGING BITS www.company.com
  16. 16. CONT. ALGORITHM : CHANGING BITS RC4 Algorithm www.company.com
  17. 17. RC4 ALGORITHM RC4 The pseudo- The key- random scheduling generation algorithm (KSA) algorithm (PRGA)www.company.com
  18. 18. RC4 ALGORITHM• The key-scheduling algorithm (KSA) • initialize the permutation in the array "S • Array "S" is initialized to the identity permutation • Swap values of S[i] and S[j]. www.company.com
  19. 19. RC4 ALGORITHM• The pseudo-random generation algorithm (PRGA) • Used as many iterations as are needed www.company.com
  20. 20. Live Demo
  21. 21. QUESTIONSwww.company.com
  22. 22. RESOURCES• Source Code : http://www.codeproject.com/Articles/6960/Steganography- VIII-Hiding-Data-in-Wave-Audio-Files• Other Online • http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.88.9413& rep=rep1&type=pdf • deepaldhariwal.weebly.com/uploads/4/9/0/9/4909109/report.docx • http://en.wikipedia.org/wiki/RC4 www.company.com

×