2. Contents
Introduction
Project Features
Project Purpose
Existing System
Proposed System
System Modules
System Analysis
Design
Testing
UML Diagrams
Screenshots
Future Scope
Conclusion
Reference
Audio Cryptography System
3. INTRODUCTION
Cryptography
• Study of hiding the information.
• Method of storing and
transformation of data from source
to destination in particular form So
that whom intended they can only
read and process it.
Audio Cryptography System
4. Project Features
• Platform independent
• No need to download any software
• Provide high security
• Cipher text is embedded in the audio
wave file
• Secrecy in terms of message hiding.
• High Capacity of the audio file.
• Accurate Extraction.
• Resistance from external attacks.
Audio Cryptography System
6. Existing System
If a person sends sensitive information over the
insecure channels of the system then there may be a
chance of hacking it, they can alter the information
and sends it over the net.
This problem has been solved by the proposed
system
Audio Cryptography System
7. Proposed System
In the proposed system the above problem has been
solved by embedding the data into the audio file. Before
embedding it into the file, encryption operation will be
performed by using the encryption key which is provided by
the source.
Then this audio file will be passed over the net, even if
hacker hacks it, can be able to see only an audio file. At the
destination side this data will be encrypted from audio file
and performs decryption to get original message
Audio Cryptography System
8. System Modules
There are two modules embedded in this
system they are
1. GUI Module
2. Encryption & Decryption Module
Audio Cryptography System
9. GUI Module
GUI is a Graphical User Interface and it is a type of user interface that allows
users to interact with electronic devices with images rather than text
commands
Basically GUI module is built by
1. AWT
2. Components
3. Swings
1.AWT:
AWT is a Abstract Window Toolkit, A class library is provided by the Java
programming language which is known as Abstract Window Toolkit (AWT) for
writing graphical programs. The AWT contains several graphical widgets which
can be added and positioned to the display area with a layout manager. AWT
uses system peers object for constructing graphical widgets
10. 2.Components:
A graphical user interface is built of graphical elements called
Components. A component is an object having a graphical
representation that can be displayed on the screen and that can
interact with the user. Components allow the user to interact with
the program and provide the input to the program.
3.Swings:
Swing is important to develop Java programs with a graphical
user interface (GUI). There are many components which are used for
the building of GUI in Swing. The Swing Toolkit consists of many
components for the building of GUI. These components are also
helpful in providing interactivity to Java applications.
Audio Cryptography System
11. Encryption & Decryption Module
During encryption, audio file will be created and in this audio file.
In this audio file LSB of the each byte will be replaced by the
encrypted data which is generated by the combination of the
encryption key and the plain text i.e., the original message.
Then this audio file will be sent to the recipient. At recipient side
this encrypted data will be extracted from each LSB and performs
decryption operation on it and gives original information.
Audio Cryptography System
12. LSB Coding:
Least significant bit (LSB) coding is the simplest way to embed
information in a
digital audio file.
By substituting the
least significant
bit of each
sampling point
with a binary
Message LSB
coding allows for
a large amount of
data to be
encoded. The
following diagram
illustrates how
the message 'HEY'
is encoded in a
16-bit CD quality
sample using the
LSB method.
Audio Cryptography System
13. Powerful Encryption Algorithm :
This is used to enhance the security further. The following
steps are used to encrypt the message
a) Converting the message into its ASCII code.
b) Making the 64 bits blocks of the message.
c) Generating an encryption key.
d) Performing permutations and logical operations to the bit
pattern.
Encoding:-The process of hiding the message in the audio file.
Decoding:- Is a process of retrieving the message from the audio
file.
Audio Cryptography System
18. Audio Cryptography System
Working Flow Of the System
1) First we will take an audio file and perform sampling on it. We will
sample the file in 8 bits per frame.
2) Input the message file which we want to transmit. Then encrypt it
using the RSA algorithm by the use of public key.
3) After encryption we will embed the encrypted data in the audio file.
Here for embedding we will use multiple LSB algorithm. The above
operations will be performed at the transmitter end.
4) After that the stego audio is transmitted to the intended receiver
5) The intended receiver will extract the encrypted data using steps of
extraction from the multiple LSB algorithm.
6) Then receiver will use the private key for decryption to get the
original message.
19. Testing
Software testing is a critical element of software quality
assurance and represents the ultimate review of specification,
design and code generation
Test Case Design
1.White Box Testing
2.Balck Box Testing
Audio Cryptography System
20. Tests at various levels
1. Unit Testing
2. Integration Testing
3. Validation Testing
4. System Testing
Audio Cryptography System
21. UML Diagrams
Class Diagram
Use Case Diagram
Activity Diagram
Audio Cryptography System
23. Use Case Diagram
Use case diagram for send and receive a audio file
Audio Cryptography System
24. Select audio file
Select output
directory
Encrypt
message
Select message
to embed
Verify details
Enter key
Use case diagram for embedding/encoding
Audio Cryptography System
25. Select embed
audio file
Enter secret key
Decrypt
message
Select retrieve
to view file
Verify details
Enter key
Use case diagram for extracting/decoding
Audio Cryptography System
26. Activity Diagram
Encrypt
Encrypt or Decrypt
Take Audio
Get Text
Decrypt Message
Enter Key
Get Audio
Decrypt
Enter Key
Enter Text
Save or Send
Encrypt Message
Start
Stop
30. Then select any audio file from the simple music.
After selecting the audio file it ask about the destination path
to store that audio file(better to give another path).Then give
name as u like
37. Then click on go button then it will ask for password
38. Enter that old password to decrypt the data, then it shows our text file
39. Future Scope
Though it is a well built system, it has been limited to
some restrictions. Quality of the sound depends upon the
size of the audio file selected by the user and the length
of the message to be hidden. There are a number of ways
that this project can be extended.
Its performance can be upgraded to higher levels by
using a better algorithm for encoding and decoding.
Instead of having a common secret key for encryption
and decryption, a public-private key pairs can be used.
Audio Cryptography System
40. Conclusion
Placing the machine to be protected behind physical walls.
However, physical security is not always an option due to cost
and/or efficiency considerations. Instead, most computers are
interconnected with each other openly, thereby exposing them
and the communication channels that they use.
This proposed system is to provide a good, efficient method
for hiding the data from hackers and sent to the destination in
a safe manner.
Audio Cryptography System
41. Reference
Advanced Java Programming - Dietel and Dietel
Mastering JAVA 2 - John Zukowski
Java Server Programming - Apress
Software Engineering - Roger S Pressman
Análysis & Design of InformationSystems – Senn
Websites:
www.eci.gov.in
www.google.com
www.apeci.com
www.askjeeves.com
Audio Cryptography System