Audio steganography - LSB

17,790 views

Published on

1 Comment
11 Likes
Statistics
Notes
No Downloads
Views
Total views
17,790
On SlideShare
0
From Embeds
0
Number of Embeds
10
Actions
Shares
0
Downloads
1,155
Comments
1
Likes
11
Embeds 0
No embeds

No notes for slide
  • The key-scheduling algorithm is used to initialize the permutation in the array "S." "keylength" is defined as the number of bytes in the key and can be in the range 1 ≤ keylength ≤ 256, typically between 5 and 16, corresponding to a key length of 40 – 128 bits. First, the array "S" is initialized to the identity permutation. S is then processed for 256 iterations in a similar way to the main PRGA, but also mixes in bytes of the key at the same time.
  • or as many iterations as are needed, the PRGA modifies the state and outputs a byte of the keystream. In each iteration, the PRGA increments i, looks up the ith element of S, S[i], and adds that to j, exchanges the values of S[i] and S[j], and then uses the sum S[i] + S[j] (modulo 256) as an index to fetch a third element of S, (the keystream value K below) which is XORed with the next byte of the message to produce the next byte of either ciphertext or plaintext. Each element of S is swapped with another element at least once every 256 iterations.
  • Audio steganography - LSB

    1. 1. AudioSTEGANOGRAPHY
    2. 2. STEGANOGRAPHY No one apart from the Art and A form of sender and science of security intendedwriting hidden through recipient, messages obscurity suspects the existence of the message www.company.com
    3. 3. STEGANOGRAPHY TECHNIQUE www.company.com
    4. 4. Embedded Data Hidden MESSAGEAudio File MESSAGE
    5. 5. Audio
    6. 6. AUDIO TERMS• Sampling is the process in whichthe analogue values are only captured at regulartime intervals.• Quantization converts each input value into one of a discrete value.• Popular sampling rates for audio include 8 kHz, 9.6 kHz, 10kHz, 12 kHz, 16 kHz, 22.05 kHz and 44.1 kHz www.company.com
    7. 7. Audio File Types File Format Uncompressed Compressed Lossy Loseless WAV AIEF ALAC, FlAC, Mp3, AAC, WMA WavPackwww.company.com
    8. 8. WHY .WAV ?Most popular Audio formatDon’t lose any quality in recordingEasier format for DevelopmentNo Compression!! www.company.com
    9. 9. WAVE FILE FORMAT www.company.com
    10. 10. WAVE FILE FORMATHEX Values of WaveFile Size Chunk Length of Format Data Chunk Audio Attributes www.company.com
    11. 11. Steganography Techniques
    12. 12. TYPES OF STEGANOGRAPHY LSB CODING PHASE CODING ECHO HIDING SPREAD www.company.com SPECTRUM
    13. 13. WHY LSB?Low computational complexityEasier ImplementationVariation in choosing LSB www.company.com
    14. 14. LSB ALGORITHM Step 2 Step 4• Receives the • Check which LSB • Replaces the LSB audio file • Each character to Replace By bit from audio convert it into bit in the message is RC4 Algorithm with LSB bit from pattern. converted into character in the bit pattern. message. Step1 Step 3 www.company.com
    15. 15. CONT. ALGORITHM : CHANGING BITS www.company.com
    16. 16. CONT. ALGORITHM : CHANGING BITS RC4 Algorithm www.company.com
    17. 17. RC4 ALGORITHM RC4 The pseudo- The key- random scheduling generation algorithm (KSA) algorithm (PRGA)www.company.com
    18. 18. RC4 ALGORITHM• The key-scheduling algorithm (KSA) • initialize the permutation in the array "S • Array "S" is initialized to the identity permutation • Swap values of S[i] and S[j]. www.company.com
    19. 19. RC4 ALGORITHM• The pseudo-random generation algorithm (PRGA) • Used as many iterations as are needed www.company.com
    20. 20. Live Demo
    21. 21. QUESTIONSwww.company.com
    22. 22. RESOURCES• Source Code : http://www.codeproject.com/Articles/6960/Steganography- VIII-Hiding-Data-in-Wave-Audio-Files• Other Online • http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.88.9413& rep=rep1&type=pdf • deepaldhariwal.weebly.com/uploads/4/9/0/9/4909109/report.docx • http://en.wikipedia.org/wiki/RC4 www.company.com

    ×