SlideShare a Scribd company logo
1 of 43
An Industrial Oriented Project
On
Audio Cryptography System
Team Members
B.Raju
G.Pavan
Contents
 Introduction
 Project Features
 Project Purpose
 Existing System
 Proposed System
 System Modules
 System Analysis
 Design
 Testing
 UML Diagrams
 Screenshots
 Future Scope
 Conclusion
 Reference
Audio Cryptography System
INTRODUCTION
Cryptography
• Study of hiding the information.
• Method of storing and
transformation of data from source
to destination in particular form So
that whom intended they can only
read and process it.
Audio Cryptography System
Project Features
• Platform independent
• No need to download any software
• Provide high security
• Cipher text is embedded in the audio
wave file
• Secrecy in terms of message hiding.
• High Capacity of the audio file.
• Accurate Extraction.
• Resistance from external attacks.
Audio Cryptography System
Project Purpose
Provides
• Confidentiality
• Integrity
• Non-Repudiation
• Authentication
Audio Cryptography System
Existing System
 If a person sends sensitive information over the
insecure channels of the system then there may be a
chance of hacking it, they can alter the information
and sends it over the net.
 This problem has been solved by the proposed
system
Audio Cryptography System
Proposed System
 In the proposed system the above problem has been
solved by embedding the data into the audio file. Before
embedding it into the file, encryption operation will be
performed by using the encryption key which is provided by
the source.
 Then this audio file will be passed over the net, even if
hacker hacks it, can be able to see only an audio file. At the
destination side this data will be encrypted from audio file
and performs decryption to get original message
Audio Cryptography System
System Modules
There are two modules embedded in this
system they are
1. GUI Module
2. Encryption & Decryption Module
Audio Cryptography System
GUI Module
GUI is a Graphical User Interface and it is a type of user interface that allows
users to interact with electronic devices with images rather than text
commands
Basically GUI module is built by
1. AWT
2. Components
3. Swings
1.AWT:
AWT is a Abstract Window Toolkit, A class library is provided by the Java
programming language which is known as Abstract Window Toolkit (AWT) for
writing graphical programs. The AWT contains several graphical widgets which
can be added and positioned to the display area with a layout manager. AWT
uses system peers object for constructing graphical widgets
2.Components:
A graphical user interface is built of graphical elements called
Components. A component is an object having a graphical
representation that can be displayed on the screen and that can
interact with the user. Components allow the user to interact with
the program and provide the input to the program.
3.Swings:
Swing is important to develop Java programs with a graphical
user interface (GUI). There are many components which are used for
the building of GUI in Swing. The Swing Toolkit consists of many
components for the building of GUI. These components are also
helpful in providing interactivity to Java applications.
Audio Cryptography System
Encryption & Decryption Module
 During encryption, audio file will be created and in this audio file.
 In this audio file LSB of the each byte will be replaced by the
encrypted data which is generated by the combination of the
encryption key and the plain text i.e., the original message.
 Then this audio file will be sent to the recipient. At recipient side
this encrypted data will be extracted from each LSB and performs
decryption operation on it and gives original information.
Audio Cryptography System
LSB Coding:
Least significant bit (LSB) coding is the simplest way to embed
information in a
digital audio file.
By substituting the
least significant
bit of each
sampling point
with a binary
Message LSB
coding allows for
a large amount of
data to be
encoded. The
following diagram
illustrates how
the message 'HEY'
is encoded in a
16-bit CD quality
sample using the
LSB method.
Audio Cryptography System
Powerful Encryption Algorithm :
This is used to enhance the security further. The following
steps are used to encrypt the message
a) Converting the message into its ASCII code.
b) Making the 64 bits blocks of the message.
c) Generating an encryption key.
d) Performing permutations and logical operations to the bit
pattern.
Encoding:-The process of hiding the message in the audio file.
Decoding:- Is a process of retrieving the message from the audio
file.
Audio Cryptography System
Message
Output File
Audio File
LSB of
each
byte
Encryption
Algorithm
Encoding
Key
Yes
ENCODING FLOW CHART
Encoded Audio
LSB of
each
byte
Decode
Decrypt
Message
Key
DECODING FLOW GRAPH
Hardware Requirements
• Processor: Pentium-III (or) Higher
• Ram: 64MB (or) Higher
• Hard disk: 50GB
Software Requirements
• Server Side Technology : AWT & Swings
• Operating System: WindowsNT/2000
• Languages: Java 2 Standard Edition
System Analysis
Audio Cryptography System
Design
System Architecture
Audio Cryptography System
Working Flow Of the System
1) First we will take an audio file and perform sampling on it. We will
sample the file in 8 bits per frame.
2) Input the message file which we want to transmit. Then encrypt it
using the RSA algorithm by the use of public key.
3) After encryption we will embed the encrypted data in the audio file.
Here for embedding we will use multiple LSB algorithm. The above
operations will be performed at the transmitter end.
4) After that the stego audio is transmitted to the intended receiver
5) The intended receiver will extract the encrypted data using steps of
extraction from the multiple LSB algorithm.
6) Then receiver will use the private key for decryption to get the
original message.
Testing
 Software testing is a critical element of software quality
assurance and represents the ultimate review of specification,
design and code generation
Test Case Design
1.White Box Testing
2.Balck Box Testing
Audio Cryptography System
Tests at various levels
1. Unit Testing
2. Integration Testing
3. Validation Testing
4. System Testing
Audio Cryptography System
UML Diagrams
 Class Diagram
 Use Case Diagram
 Activity Diagram
Audio Cryptography System
Class Diagram
Audio Cryptography System
Use Case Diagram
Use case diagram for send and receive a audio file
Audio Cryptography System
Select audio file
Select output
directory
Encrypt
message
Select message
to embed
Verify details
Enter key
Use case diagram for embedding/encoding
Audio Cryptography System
Select embed
audio file
Enter secret key
Decrypt
message
Select retrieve
to view file
Verify details
Enter key
Use case diagram for extracting/decoding
Audio Cryptography System
Activity Diagram
Encrypt
Encrypt or Decrypt
Take Audio
Get Text
Decrypt Message
Enter Key
Get Audio
Decrypt
Enter Key
Enter Text
Save or Send
Encrypt Message
Start
Stop
Screenshots:
Run the batch file from the bin folder
Then click on file and select embed message
Then it will shows this automatically
Then select any audio file from the simple music.
 After selecting the audio file it ask about the destination path
to store that audio file(better to give another path).Then give
name as u like
After giving the destination file name then automatically shows
Then click on encrypt checkbox then it will ask about the password and
enter some secret message.
Then click on go button
Then your data is encrypted behind the destination audio file.
Then it shows like
If your want to see the data content which is encrypted behind
destination audio file then you can click on retrieve file.
Then you can select the saved destination audio file
Then it will shows
Then click on go button then it will ask for password
Enter that old password to decrypt the data, then it shows our text file
Future Scope
 Though it is a well built system, it has been limited to
some restrictions. Quality of the sound depends upon the
size of the audio file selected by the user and the length
of the message to be hidden. There are a number of ways
that this project can be extended.
 Its performance can be upgraded to higher levels by
using a better algorithm for encoding and decoding.
Instead of having a common secret key for encryption
and decryption, a public-private key pairs can be used.
Audio Cryptography System
Conclusion
 Placing the machine to be protected behind physical walls.
However, physical security is not always an option due to cost
and/or efficiency considerations. Instead, most computers are
interconnected with each other openly, thereby exposing them
and the communication channels that they use.
 This proposed system is to provide a good, efficient method
for hiding the data from hackers and sent to the destination in
a safe manner.
Audio Cryptography System
Reference
Advanced Java Programming - Dietel and Dietel
Mastering JAVA 2 - John Zukowski
Java Server Programming - Apress
Software Engineering - Roger S Pressman
Análysis & Design of InformationSystems – Senn
Websites:
www.eci.gov.in
www.google.com
www.apeci.com
www.askjeeves.com
Audio Cryptography System
Audio Cryptography System
Audio Cryptography System

More Related Content

What's hot

SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
Kamonasish Hore
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
Jitu Choudhary
 
Lecture 8 audio compression
Lecture 8 audio compressionLecture 8 audio compression
Lecture 8 audio compression
Mr SMAK
 

What's hot (20)

Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanisms
 
Cryptography
CryptographyCryptography
Cryptography
 
VIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHYVIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHY
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
Convolutional Codes And Their Decoding
Convolutional Codes And Their DecodingConvolutional Codes And Their Decoding
Convolutional Codes And Their Decoding
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Steganography
SteganographySteganography
Steganography
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
digital-watermarking-and-steganography syllabus . . . . . . .
digital-watermarking-and-steganography syllabus . . . . . . . digital-watermarking-and-steganography syllabus . . . . . . .
digital-watermarking-and-steganography syllabus . . . . . . .
 
Steganography
SteganographySteganography
Steganography
 
Email Security : PGP & SMIME
Email Security : PGP & SMIMEEmail Security : PGP & SMIME
Email Security : PGP & SMIME
 
Steganography(Presentation)
Steganography(Presentation)Steganography(Presentation)
Steganography(Presentation)
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
 
Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
Lecture 8 audio compression
Lecture 8 audio compressionLecture 8 audio compression
Lecture 8 audio compression
 
steganography
steganographysteganography
steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 

Similar to Audio Cryptography System

File transfer using cryptography techniques
File transfer using cryptography techniquesFile transfer using cryptography techniques
File transfer using cryptography techniques
miteshkumar82
 
Internet security evaluation system documentation nikitha
Internet security evaluation system documentation nikithaInternet security evaluation system documentation nikitha
Internet security evaluation system documentation nikitha
Susmitha Reddy
 
Robust video data hiding using forbidden data hiding
Robust video data hiding using forbidden data hidingRobust video data hiding using forbidden data hiding
Robust video data hiding using forbidden data hiding
nandhu_m08
 

Similar to Audio Cryptography System (20)

Audio video steganography using forensic techniquefor data security
Audio video steganography using forensic techniquefor data securityAudio video steganography using forensic techniquefor data security
Audio video steganography using forensic techniquefor data security
 
Data Security Using Steganography
Data Security Using Steganography Data Security Using Steganography
Data Security Using Steganography
 
Atm Security System Using Steganography Nss ptt by (rohit malav)
Atm Security System Using  Steganography Nss ptt by (rohit malav)Atm Security System Using  Steganography Nss ptt by (rohit malav)
Atm Security System Using Steganography Nss ptt by (rohit malav)
 
Audio Steganography java project
Audio Steganography java projectAudio Steganography java project
Audio Steganography java project
 
Enhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyEnhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio Steganography
 
File transfer using cryptography techniques
File transfer using cryptography techniquesFile transfer using cryptography techniques
File transfer using cryptography techniques
 
E-Fraud Prevention based on self-authentication of e-documents
E-Fraud Prevention based on self-authentication of e-documentsE-Fraud Prevention based on self-authentication of e-documents
E-Fraud Prevention based on self-authentication of e-documents
 
A04020107
A04020107A04020107
A04020107
 
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
 
Access control in decentralized online social networks applying a policy hidi...
Access control in decentralized online social networks applying a policy hidi...Access control in decentralized online social networks applying a policy hidi...
Access control in decentralized online social networks applying a policy hidi...
 
Internet security evaluation system documentation nikitha
Internet security evaluation system documentation nikithaInternet security evaluation system documentation nikitha
Internet security evaluation system documentation nikitha
 
Access control in decentralized online social networks applying a policy hidi...
Access control in decentralized online social networks applying a policy hidi...Access control in decentralized online social networks applying a policy hidi...
Access control in decentralized online social networks applying a policy hidi...
 
Multimedia
MultimediaMultimedia
Multimedia
 
secure Audio Data Transfer Over Internet Using Steganography
secure Audio Data Transfer Over Internet Using Steganographysecure Audio Data Transfer Over Internet Using Steganography
secure Audio Data Transfer Over Internet Using Steganography
 
Secure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok PanwarSecure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok Panwar
 
Secure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and SteganographySecure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and Steganography
 
IMPLEMENTATION TWOFISH ALGORITHM FOR DATA SECURITY IN A COMMUNICATION NETWOR...
IMPLEMENTATION TWOFISH ALGORITHM FOR DATA  SECURITY IN A COMMUNICATION NETWOR...IMPLEMENTATION TWOFISH ALGORITHM FOR DATA  SECURITY IN A COMMUNICATION NETWOR...
IMPLEMENTATION TWOFISH ALGORITHM FOR DATA SECURITY IN A COMMUNICATION NETWOR...
 
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
 
Robust video data hiding using forbidden data hiding
Robust video data hiding using forbidden data hidingRobust video data hiding using forbidden data hiding
Robust video data hiding using forbidden data hiding
 
Andromark_Shalabh10103435
Andromark_Shalabh10103435Andromark_Shalabh10103435
Andromark_Shalabh10103435
 

Recently uploaded

DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 

Recently uploaded (20)

data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Air Compressor reciprocating single stage
Air Compressor reciprocating single stageAir Compressor reciprocating single stage
Air Compressor reciprocating single stage
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 

Audio Cryptography System

  • 1. An Industrial Oriented Project On Audio Cryptography System Team Members B.Raju G.Pavan
  • 2. Contents  Introduction  Project Features  Project Purpose  Existing System  Proposed System  System Modules  System Analysis  Design  Testing  UML Diagrams  Screenshots  Future Scope  Conclusion  Reference Audio Cryptography System
  • 3. INTRODUCTION Cryptography • Study of hiding the information. • Method of storing and transformation of data from source to destination in particular form So that whom intended they can only read and process it. Audio Cryptography System
  • 4. Project Features • Platform independent • No need to download any software • Provide high security • Cipher text is embedded in the audio wave file • Secrecy in terms of message hiding. • High Capacity of the audio file. • Accurate Extraction. • Resistance from external attacks. Audio Cryptography System
  • 5. Project Purpose Provides • Confidentiality • Integrity • Non-Repudiation • Authentication Audio Cryptography System
  • 6. Existing System  If a person sends sensitive information over the insecure channels of the system then there may be a chance of hacking it, they can alter the information and sends it over the net.  This problem has been solved by the proposed system Audio Cryptography System
  • 7. Proposed System  In the proposed system the above problem has been solved by embedding the data into the audio file. Before embedding it into the file, encryption operation will be performed by using the encryption key which is provided by the source.  Then this audio file will be passed over the net, even if hacker hacks it, can be able to see only an audio file. At the destination side this data will be encrypted from audio file and performs decryption to get original message Audio Cryptography System
  • 8. System Modules There are two modules embedded in this system they are 1. GUI Module 2. Encryption & Decryption Module Audio Cryptography System
  • 9. GUI Module GUI is a Graphical User Interface and it is a type of user interface that allows users to interact with electronic devices with images rather than text commands Basically GUI module is built by 1. AWT 2. Components 3. Swings 1.AWT: AWT is a Abstract Window Toolkit, A class library is provided by the Java programming language which is known as Abstract Window Toolkit (AWT) for writing graphical programs. The AWT contains several graphical widgets which can be added and positioned to the display area with a layout manager. AWT uses system peers object for constructing graphical widgets
  • 10. 2.Components: A graphical user interface is built of graphical elements called Components. A component is an object having a graphical representation that can be displayed on the screen and that can interact with the user. Components allow the user to interact with the program and provide the input to the program. 3.Swings: Swing is important to develop Java programs with a graphical user interface (GUI). There are many components which are used for the building of GUI in Swing. The Swing Toolkit consists of many components for the building of GUI. These components are also helpful in providing interactivity to Java applications. Audio Cryptography System
  • 11. Encryption & Decryption Module  During encryption, audio file will be created and in this audio file.  In this audio file LSB of the each byte will be replaced by the encrypted data which is generated by the combination of the encryption key and the plain text i.e., the original message.  Then this audio file will be sent to the recipient. At recipient side this encrypted data will be extracted from each LSB and performs decryption operation on it and gives original information. Audio Cryptography System
  • 12. LSB Coding: Least significant bit (LSB) coding is the simplest way to embed information in a digital audio file. By substituting the least significant bit of each sampling point with a binary Message LSB coding allows for a large amount of data to be encoded. The following diagram illustrates how the message 'HEY' is encoded in a 16-bit CD quality sample using the LSB method. Audio Cryptography System
  • 13. Powerful Encryption Algorithm : This is used to enhance the security further. The following steps are used to encrypt the message a) Converting the message into its ASCII code. b) Making the 64 bits blocks of the message. c) Generating an encryption key. d) Performing permutations and logical operations to the bit pattern. Encoding:-The process of hiding the message in the audio file. Decoding:- Is a process of retrieving the message from the audio file. Audio Cryptography System
  • 14. Message Output File Audio File LSB of each byte Encryption Algorithm Encoding Key Yes ENCODING FLOW CHART
  • 16. Hardware Requirements • Processor: Pentium-III (or) Higher • Ram: 64MB (or) Higher • Hard disk: 50GB Software Requirements • Server Side Technology : AWT & Swings • Operating System: WindowsNT/2000 • Languages: Java 2 Standard Edition System Analysis Audio Cryptography System
  • 18. Audio Cryptography System Working Flow Of the System 1) First we will take an audio file and perform sampling on it. We will sample the file in 8 bits per frame. 2) Input the message file which we want to transmit. Then encrypt it using the RSA algorithm by the use of public key. 3) After encryption we will embed the encrypted data in the audio file. Here for embedding we will use multiple LSB algorithm. The above operations will be performed at the transmitter end. 4) After that the stego audio is transmitted to the intended receiver 5) The intended receiver will extract the encrypted data using steps of extraction from the multiple LSB algorithm. 6) Then receiver will use the private key for decryption to get the original message.
  • 19. Testing  Software testing is a critical element of software quality assurance and represents the ultimate review of specification, design and code generation Test Case Design 1.White Box Testing 2.Balck Box Testing Audio Cryptography System
  • 20. Tests at various levels 1. Unit Testing 2. Integration Testing 3. Validation Testing 4. System Testing Audio Cryptography System
  • 21. UML Diagrams  Class Diagram  Use Case Diagram  Activity Diagram Audio Cryptography System
  • 23. Use Case Diagram Use case diagram for send and receive a audio file Audio Cryptography System
  • 24. Select audio file Select output directory Encrypt message Select message to embed Verify details Enter key Use case diagram for embedding/encoding Audio Cryptography System
  • 25. Select embed audio file Enter secret key Decrypt message Select retrieve to view file Verify details Enter key Use case diagram for extracting/decoding Audio Cryptography System
  • 26. Activity Diagram Encrypt Encrypt or Decrypt Take Audio Get Text Decrypt Message Enter Key Get Audio Decrypt Enter Key Enter Text Save or Send Encrypt Message Start Stop
  • 27. Screenshots: Run the batch file from the bin folder
  • 28. Then click on file and select embed message
  • 29. Then it will shows this automatically
  • 30. Then select any audio file from the simple music.  After selecting the audio file it ask about the destination path to store that audio file(better to give another path).Then give name as u like
  • 31. After giving the destination file name then automatically shows
  • 32. Then click on encrypt checkbox then it will ask about the password and enter some secret message.
  • 33. Then click on go button Then your data is encrypted behind the destination audio file. Then it shows like
  • 34. If your want to see the data content which is encrypted behind destination audio file then you can click on retrieve file.
  • 35. Then you can select the saved destination audio file
  • 36. Then it will shows
  • 37. Then click on go button then it will ask for password
  • 38. Enter that old password to decrypt the data, then it shows our text file
  • 39. Future Scope  Though it is a well built system, it has been limited to some restrictions. Quality of the sound depends upon the size of the audio file selected by the user and the length of the message to be hidden. There are a number of ways that this project can be extended.  Its performance can be upgraded to higher levels by using a better algorithm for encoding and decoding. Instead of having a common secret key for encryption and decryption, a public-private key pairs can be used. Audio Cryptography System
  • 40. Conclusion  Placing the machine to be protected behind physical walls. However, physical security is not always an option due to cost and/or efficiency considerations. Instead, most computers are interconnected with each other openly, thereby exposing them and the communication channels that they use.  This proposed system is to provide a good, efficient method for hiding the data from hackers and sent to the destination in a safe manner. Audio Cryptography System
  • 41. Reference Advanced Java Programming - Dietel and Dietel Mastering JAVA 2 - John Zukowski Java Server Programming - Apress Software Engineering - Roger S Pressman Análysis & Design of InformationSystems – Senn Websites: www.eci.gov.in www.google.com www.apeci.com www.askjeeves.com Audio Cryptography System