Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
--The art of hiding secret message.
By
K.SHARATH REDDY
ECE Department
 STEGANOGRAPHY
 AUDIO STEGANOGRAPHY
 AUDIO STEGANOGRAPHIC SYSTEM
 AUDIO STEGANOGRAPHY TECHNIQUES
 ADVANTAGES AND DISA...
 STEGAN-O-GRAPHY
“The goal of steganography is to hide messages
in such a way that no one apart from the
intended recipient even knows tha...
Embedding secret messages into digital
sound is known as Audio Steganography.
Audio Steganography methods can embed
mess...
To embed data secretly onto digital audio
file there are few techniques introduced :
LSB Coding
Phase Coding
Parity Co...
 The message 'HEY' is encoded in a 16-bit CD
quality sample using the LSB method.
 Here the secret information is ‘HEY’ ...
The phase coding method works by substituting
the phase of an initial audio segment with a
reference phase that represents...
The phase difference between each adjacent
segment is calculated.
For segment S0, the first segment, an
artificial absol...
 The new phase and original magnitude are
combined to get a new segment, Sn.
 Finally, the new segments are concatenated...
 One of the prior works in audio data hiding
technique is parity coding technique.
 Instead of breaking a signal down in...
 If the parity bit of a selected region does not
match the secret bit to be encoded,
 This process flips the LSB of one ...
 The basic spread spectrum (SS) method attempts to spread
secret information across the frequency spectrum of the
audio s...
Potential capability to hide the existence of
confidential data
Hardness of detecting the hidden (i.e.,
embedded) data
...
The confidentiality of information is
maintained by the algorithms, and if the
algorithms are known then this technique i...
Confidential communication and secret data
storing
Protection of data alteration
Access control system for digital cont...
Steganography, though is still a fairly new idea.
There are constant advancements in the computer
field, suggesting advan...
The intent of this presentation was to cover some
of the more common methods of data hiding
using widespread file formats...
 S. William, Cryptography and Network Security:
Principles and Practice, 2nd edition, Prentice-Hall,
Inc., 1999 pp 23-50
...
QUERIES ?
Audio steganography
Audio steganography
Audio steganography
Audio steganography
Audio steganography
Audio steganography
You’ve finished this document.
Download and read it offline.
Upcoming SlideShare
Audio steganography - LSB
Next
Upcoming SlideShare
Audio steganography - LSB
Next
Download to read offline and view in fullscreen.

12

Share

Audio steganography

Download to read offline

This presentation gives the complete information regarding the Audio Steganography Technique.

Related Books

Free with a 30 day trial from Scribd

See all

Related Audiobooks

Free with a 30 day trial from Scribd

See all

Audio steganography

  1. 1. --The art of hiding secret message. By K.SHARATH REDDY ECE Department
  2. 2.  STEGANOGRAPHY  AUDIO STEGANOGRAPHY  AUDIO STEGANOGRAPHIC SYSTEM  AUDIO STEGANOGRAPHY TECHNIQUES  ADVANTAGES AND DISADVANTAGES  APPLICATIONS
  3. 3.  STEGAN-O-GRAPHY
  4. 4. “The goal of steganography is to hide messages in such a way that no one apart from the intended recipient even knows that a message has been sent.”  This can be achieve by concealing the existence of information within seemingly harmless carriers or cover.  It can be understand by the following figure.
  5. 5. Embedding secret messages into digital sound is known as Audio Steganography. Audio Steganography methods can embed messages in WAV, AU, and even MP3 sound files. The properties of the human auditory system (HAS) are exploited in the process of audio Steganography
  6. 6. To embed data secretly onto digital audio file there are few techniques introduced : LSB Coding Phase Coding Parity Coding Spread Spectrum
  7. 7.  The message 'HEY' is encoded in a 16-bit CD quality sample using the LSB method.  Here the secret information is ‘HEY’ and the cover file is audio file. HEY is to be embedded inside the audio file. First the secret information ‘HEY’ and the audio file are converted into bit stream.  The least significant column of the audio file is replaced by the bit stream of secret information ‘HEY’. The resulting file after embedding secret information ‘HEY’ is called Stego-file.
  8. 8. The phase coding method works by substituting the phase of an initial audio segment with a reference phase that represents the data. The procedure for phase coding is as follows:  The original sound sequence is broken into a series of N short segments.  A discrete Fourier transform (DFT) is applied to each segment, to break create a matrix of the phase and magnitude.
  9. 9. The phase difference between each adjacent segment is calculated. For segment S0, the first segment, an artificial absolute phase p0 is created. For all other segments, new phase frames are created.
  10. 10.  The new phase and original magnitude are combined to get a new segment, Sn.  Finally, the new segments are concatenated to create the encoded output
  11. 11.  One of the prior works in audio data hiding technique is parity coding technique.  Instead of breaking a signal down into individual samples, the parity coding method breaks a signal down into separate regions of samples  Encode each bit from the secret message in a sample region's parity bit
  12. 12.  If the parity bit of a selected region does not match the secret bit to be encoded,  This process flips the LSB of one of the samples in the region. Thus, the sender has more of a choice in encoding the secret bit, and the signal can be changed in a more unobtrusive fashion.
  13. 13.  The basic spread spectrum (SS) method attempts to spread secret information across the frequency spectrum of the audio signal.  This system is similar to a system which uses an implementation of the LSB that spreads the message bits randomly over the entire sound file.  Unlike LSB coding, the Spread Spectrum method spreads the secret information over the frequency spectrum of the sound file using a code which is independent of the actual signal.  As a result, the final signal occupies a bandwidth which is more than what is actually required for transmission.
  14. 14. Potential capability to hide the existence of confidential data Hardness of detecting the hidden (i.e., embedded) data Strengthening of the secrecy of the encrypted data
  15. 15. The confidentiality of information is maintained by the algorithms, and if the algorithms are known then this technique is of no use.  Password leakage may occur and it leads to the unauthorized access of data.
  16. 16. Confidential communication and secret data storing Protection of data alteration Access control system for digital content distribution Media Database systems Alleged use by intelligence services
  17. 17. Steganography, though is still a fairly new idea. There are constant advancements in the computer field, suggesting advancements in the field of steganography as well. In the future, it is hoped that the technique of Steganalysis will advance such that it will become much easier to detect even small messages within an audio file.
  18. 18. The intent of this presentation was to cover some of the more common methods of data hiding using widespread file formats and easily available tools as an introduction ,to the primary concepts of steganography. These discussions should serve as a starting point to the exploration of more complex steganographic techniques involving, for example, the use of network packets and unused hard disk space as cover medium, or the more complex methodologies used on our audio files.
  19. 19.  S. William, Cryptography and Network Security: Principles and Practice, 2nd edition, Prentice-Hall, Inc., 1999 pp 23-50  Bloom. A. et al., 2008. Digital watermarking and Steganography. 2nd edition  A. Westfield. "F5 - A Steganographic Algorithm: High Capacity Despite Better Steganalysis", Lecture Notes in Computer Science, vol. 2137, pp. 289-302, 2001.
  20. 20. QUERIES ?
  • NandeeshBS

    Jan. 3, 2021
  • TusharKadam49

    Oct. 12, 2020
  • SanthoshKumar2250

    Apr. 1, 2020
  • MadhuMinou

    Jul. 18, 2018
  • AnkitDekate2

    Jan. 18, 2018
  • DANALVAROFLORES

    Oct. 24, 2017
  • harshil9495

    Apr. 3, 2017
  • balajikaspate1

    Mar. 23, 2017
  • coral9consulting

    Feb. 19, 2017
  • AmbikaGupta14

    Feb. 4, 2017
  • ShreyanshiMasram

    Apr. 2, 2016
  • lemester

    Apr. 2, 2015

This presentation gives the complete information regarding the Audio Steganography Technique.

Views

Total views

8,013

On Slideshare

0

From embeds

0

Number of embeds

10

Actions

Downloads

377

Shares

0

Comments

0

Likes

12

×