This is the final presentation for project named "Audio Steganography" for btech final year computer science students, and without the screenshots of the progress this can b used as a synopsis presentation.
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
Audio steganography project presentation
1. 1
A
Project Presentation on
Secure Transmission of Information using
Audio Steganography
Submitted in partial fulfillment of award of
BACHELOR OF TECHNOLOGY
Degree
In
COMPUTER SCIENCE & ENGINEERING
By
KUMAR KARTIKEYA UPADHYAY
KM. NEHA RANI
MANVI GUPTA
RAJU RAJPUT
2011-2015
GUIDE
SURYA PRAKASH SHARMA
ASSISTANT PROFFESOR
NOIDA INSTITUTE OF ENGINEERING &
TECHNOLOGY, GREATER NOIDA(U.P.)
3. Introduction
Secure Transmission
It refers to the transfer of data such as
confidential information.
TLS and SSL are cryptographic protocols that
provide secure communication on the internet.
3
4. Steganography
The process of hiding the messages so that the presence of
message itself is hidden , often by writing them in places
where they may not be found.
Select Host
audio
Secret bits
(message)
Secret
message
Preprocessin
g
System
Extract secret
bits from
coefficient
Embedding
bits by location
selection
Select
location in
each
coefficient
Network
4
5. EXAMPLE
Since everybody can read, encoding
text, in natural sentences in doubtfully
effective.
Since Everybody Can Read, Encoding
Text, In Natural Sentences In Doubtfully
Effective.
‘SECRET INSIDE’
5
6. Audio Steganography
Embedding secret message into
digital sound is called audio
steganography.
Audio Steganography is presented
where the bits of a secret message
are embedded into the coefficients of
a cover audio.
6
7. Modules
Take an audio input from the user.
Convert audio bits into binary format.
Embed the secret message with binary bits
using MSB.
Decode the message with the same
procedure as applied in embedding.
Now original message can be viewed by
the receiver.
7
23. Advantages
Avoiding communication in well-known
forms greatly reduces the risk of
information being leaked in transit.
It can also enhance individual privacy.
23
24. Applications
Usage in modern printers
Defense Applications
Confidential communication and secret
data storing
Media Database systems
Protection of data alteration.
24
26. CONCLUSION
Hiding information may introduce enough
visible noise to raise suspicion. Therefore the
carrier or cover audio must be carefully
selected.
This proposed system is to provide a good,
efficient method for hiding the data from
hackers and sent to the destination in a safe
manner.
This proposed system will not change the
size of the file even after encoding and also
suitable for any type of audio file format.
Encryption and Decryption techniques have
been used to make the security system
robust. 26