SlideShare a Scribd company logo
1
Secret Communication
Through Audio For
Defense Applications
INTERNAL GUIDE
MRS.M.MADHURI LATHA
PRESENTED BY,
J.Prathima 09251A0482
S.Spandana 09251A04B0
E.Nikhila 09251AO475
B.Asritha 09251A04C0
2
The basic mechanisms for security of data are:
3
•Cryptography was concerned solely with message
confidentiality (i.e., encryption)
•Cryptography is secret writing. Anybody can see the
message, but nobody else can read it.
• Usually, this is because its letters have been re-
arranged, or replaced by different letters, according to
some scheme that only the sender and receiver know.
• Only those who possess a secret key can decrypt the
message into plain text
4
PROCESS OF
CRYPTOGRAPHY
5
STEGANOGRAPHY:
Steganography comes from the Greek
Word which means covered or secret message.
STEGAN-O-GRAPHY
COVERED + WRITING
6
• Steganography is a means of storing
information in such a way that it hides private
information and even the existence of the
information within the other medium.
• The goal of Steganography is “to hide
messages inside other harmless messages, in a
way that does not allow any enemy to detect
that there is a second secret message present”.
7
8
STEGANOGRAPHY CRYPTOGRAPHY
Unknown message passing Known message passing
Little known technology Common technology
Technology still being developed
for certain formats
Most of algorithms known by all
Steaganography does not alter the
structure of the secret message.
Cryptography alters the structure of
secret message.
9
A Steganography system
Message file
Cover fileCover file
Steg file
(with hidden data)
Steg file
(with hidden data)
Message file
Steganography ToolSteganography Tool Steganography ToolSteganography Tool
Hiding messages Extracting messages
10
BASIC TYPESBASIC TYPES OFOF STEGOSYSTEMSSTEGOSYSTEMS
Three basic types of stego systems
1. Secret-key stego systems
2. Public-key stego systems
3. Pure stego systems
10
.
11
STEGnOGrAPhY TYPESSTEGnOGrAPhY TYPES
oPHYSICAL
oDIGITAL
oNETWORK
oSUDOKO PUZZLES
11
.
12
13
oSteganography in Text
oSteganography in Images
oSteganography in Audio
Image steganography
14
15
AUDIO STEGANOGRAPHY
16
17
METHODS OF AUDIO
STEGANOGRAPHY
METHODS OF AUDIO
STEGANOGRAPHY
18
19
20
LSB CODINGLSB CODING
21
Variation in choosing LSBVariation in choosing LSB
22
TERMINOLOGY USED…TERMINOLOGY USED…
• Cover : The data that is visible to the world.
• Embedded: The data to be hidden (not visible to the
world).
• Stego: The data contains both cover and
embedded data.
• The data may be audio or video or image.
• In case of audio data the cover is also termed as host
signal, where as in case of image data the cover is
termed as container.
• The process of hiding the data is known as embedding.
23
24
WAV
• WAV files are short for waveform audio files.
• Microsoft and IBM first introduced the WAV file.
• The Audio data after the sampling is done is stored in
computer as a .wav file.
• The average song has a large file size from 35 and 50
megabytes.
• Most popular Audio Format.
• Don’t lose any quality in recording.
25
26
Stego
Audio
Embedding Process
LSB of the
Data Part
Alternate
Samples of
LSB Data
Audio
Input
Separate
Header
and Data
Secret Text
BLOCK DIAGRAM
EMBEDDING:
27
Convert
Binary
to ASCII
Extraction Process
Store LSB of
Data Part
Left Shift of
Previous bit
Stego
Audio
Separate
Header
and Data
Extracted
Text
Extracting:
28
LETERSWITH ASCII VALUESAND
CORRESPONDING BINARY VALUES
Letter ASCII Value Corresponding Binary Value
A 065 01000001
U 117 01110101
D 100 01100100
I 105 01101001
O 111 01101111
LETTERS WITHASCIIVALUES AND
CORRESPONDING BINARY VALUES
29
ALGORITHM (FOR EMBEDDING OF
DATA):
ALGORITHM (FOR EMBEDDING OF
DATA):
• Leave the header section of the audio file
untouched.
• Start from a suitable position of the data
bytes. (For the experiment purpose the
present start byte was the 51st byte). Edit
the least significant bit with the data that
have to be embedded.
• Take every alternate sample and change
the least significant bit to embed the whole
message.
30
SAMPLES OF AUDIO FILE WITH BINARY VALUES BEFORE ANDSAMPLES OF AUDIO FILE WITH BINARY VALUES BEFORE AND
AFTER EMBEDDINGAFTER EMBEDDING
Sample
No.
Binary values of
corresponding
sample
Binary value
to be
embedded
Binary values
after
modification
51 01110100 0 01110100
53 01011110 1 01011111
55 10001011 0 10001010
57 01111011 0 01111010
59 10100010 0 10100010
61 00110010 0 00110010
63 11101110 0 11101110
65 01011100 1 01011101
31
• Leave first 50 bytes.
• Start from the 51st byte and store the least
significant bit in a queue.
• Check every alternate sample and store the
least significant bit in the previous queue
with a left shift of the previous bit.
• Convert the binary values to decimal to get
the ASCII values of the secret message.
• From the ASCII find the secret message.
ALGORITHM (FOR
EXTRACTING OF DATA):
ALGORITHM (FOR
EXTRACTING OF DATA):
32
EXRACTION OF DATA FROM AUDIO FILE
Sample No. Binary values with
embedded secret data
Bits that are stored in
the
queue
51 01110100 0
53 01011111 01
55 10001010 010
57 01111010 0100
59 10100010 01000
61 00110010 010000
63 11101110 0100000
65 01011101 01000001
33
34
35
• Modern Printers:
o HP and Xerox brand colour laser printers
o Tiny yellow dots are added to each page.
o The dots are barely visible and contain
encoded printer serial numbers as well as
date and time stamps.
36
CorPorAte WorLd:
In business world audio data hiding can be used
to hide a secret chemical formula or plans for a
new invention.
ForensiC APPLiCAtions:
to hide evidence audio steganography is used
Anti-soCiAL eVents:
Terrorists can also use Audio data hiding to keep
their communications secret and to coordinate
attacks.
37
• Difficult to detect and only receiver can detect.
• Avoid ability of degradation and robustness for audio
signals.
• Protection of Intellectual digital works.
• Internet privacy.
• Secret communication between the organization like
border security force and organization.
38
• Once algorithm known- confidentiality of
information is lost.
• Hackers may misuse the technique.
• Due to distortion original signal may not be
obtained.
39
As EVERY COIN HAS TWO SIDES, this technology
besides
having many benefits to make the internet business
very safe and transmitting the defense messages
secretly, it is also a threat to the society if it is used by
anti social elements.
“It will be more helpful if this technology is used in
a proper way. The Steganography which we are seeing
today is just an ice cap, we have to wait until it melts
(ie. developed fully) to decide whether it is helpful to
the society or not.”
40
HANKY OUT!!!
THANK YOU
41

More Related Content

What's hot

Cryptography and Steganography
Cryptography and SteganographyCryptography and Steganography
Cryptography and Steganography
Kalyani Government Engineering College
 
Steganography
SteganographySteganography
SteganographySonam M
 
Hiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganographyHiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganographyAlexander Decker
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
sudip nandi
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptography
Avinash Mishra
 
Cryptography and Steganography with watermarking
Cryptography and Steganography with watermarkingCryptography and Steganography with watermarking
Cryptography and Steganography with watermarking
Garima Kulshreshtha
 
Data hiding in audio signals ppt
Data hiding in audio signals pptData hiding in audio signals ppt
Data hiding in audio signals ppt
jackkhush
 
Steganography Presentation
Steganography PresentationSteganography Presentation
Steganography Presentation
Zack Burt
 
“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.
Pradeep Vishwakarma
 
Enhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyEnhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio Steganography
IOSR Journals
 
Steganography
SteganographySteganography
Steganography
Daksh Verma
 
Survey Paper on Steganography
Survey Paper on Steganography Survey Paper on Steganography
Survey Paper on Steganography
IRJESJOURNAL
 
Steganography
SteganographySteganography
Steganography
Girish Chandra
 
Video Steganography
Video SteganographyVideo Steganography
Video Steganography
James Ridgway
 
Steganography
SteganographySteganography
Steganography
Pavninder
 

What's hot (20)

Cryptography and Steganography
Cryptography and SteganographyCryptography and Steganography
Cryptography and Steganography
 
Steganography
SteganographySteganography
Steganography
 
Hiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganographyHiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganography
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptography
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Cryptography and Steganography with watermarking
Cryptography and Steganography with watermarkingCryptography and Steganography with watermarking
Cryptography and Steganography with watermarking
 
Data hiding in audio signals ppt
Data hiding in audio signals pptData hiding in audio signals ppt
Data hiding in audio signals ppt
 
Steganography Presentation
Steganography PresentationSteganography Presentation
Steganography Presentation
 
“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.
 
Enhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyEnhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography (1)
Steganography (1)Steganography (1)
Steganography (1)
 
P0460594100
P0460594100P0460594100
P0460594100
 
Survey Paper on Steganography
Survey Paper on Steganography Survey Paper on Steganography
Survey Paper on Steganography
 
Steganography
SteganographySteganography
Steganography
 
Video Steganography
Video SteganographyVideo Steganography
Video Steganography
 
Steganography
SteganographySteganography
Steganography
 
digital steganography
digital steganographydigital steganography
digital steganography
 
Steganography
SteganographySteganography
Steganography
 

Similar to Finalmarch4 th

Steganography(Presentation)
Steganography(Presentation)Steganography(Presentation)
Steganography(Presentation)
Firdous Ahmad Khan
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
BSheghembe
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.ppt
NavyaChikki1
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
Ashwin Prasad
 
Multi-Level audio steganography
Multi-Level audio steganographyMulti-Level audio steganography
Multi-Level audio steganography
ARYA TM
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
Fatema Panvelwala
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganographyKamonasish Hore
 
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
iosrjce
 
F017253244
F017253244F017253244
F017253244
IOSR Journals
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONManush Desai
 
Pembahasan jurnal information hiding using audio
Pembahasan  jurnal information hiding using audioPembahasan  jurnal information hiding using audio
Pembahasan jurnal information hiding using audio
suwandi wandi
 
Ijetr042105
Ijetr042105Ijetr042105
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodDrubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
IOSRJECE
 
steganography
steganographysteganography
steganography
Manika Arora
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
misbanausheenparvam
 
Steganography
SteganographySteganography
Steganography
Madhani Harsh
 
art of Steganography
art of Steganography art of Steganography
art of Steganography
Joshpin Bala.B
 

Similar to Finalmarch4 th (20)

Steganography(Presentation)
Steganography(Presentation)Steganography(Presentation)
Steganography(Presentation)
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.ppt
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Multi-Level audio steganography
Multi-Level audio steganographyMulti-Level audio steganography
Multi-Level audio steganography
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
 
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
 
F017253244
F017253244F017253244
F017253244
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
 
Pembahasan jurnal information hiding using audio
Pembahasan  jurnal information hiding using audioPembahasan  jurnal information hiding using audio
Pembahasan jurnal information hiding using audio
 
30808010 report(1)
30808010 report(1)30808010 report(1)
30808010 report(1)
 
Ijetr042105
Ijetr042105Ijetr042105
Ijetr042105
 
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodDrubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
 
steganography
steganographysteganography
steganography
 
Steganography
SteganographySteganography
Steganography
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
 
Steganography
SteganographySteganography
Steganography
 
art of Steganography
art of Steganography art of Steganography
art of Steganography
 
Steganography
SteganographySteganography
Steganography
 

Recently uploaded

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 

Recently uploaded (20)

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 

Finalmarch4 th

  • 1. 1 Secret Communication Through Audio For Defense Applications INTERNAL GUIDE MRS.M.MADHURI LATHA PRESENTED BY, J.Prathima 09251A0482 S.Spandana 09251A04B0 E.Nikhila 09251AO475 B.Asritha 09251A04C0
  • 2. 2 The basic mechanisms for security of data are:
  • 3. 3 •Cryptography was concerned solely with message confidentiality (i.e., encryption) •Cryptography is secret writing. Anybody can see the message, but nobody else can read it. • Usually, this is because its letters have been re- arranged, or replaced by different letters, according to some scheme that only the sender and receiver know. • Only those who possess a secret key can decrypt the message into plain text
  • 5. 5 STEGANOGRAPHY: Steganography comes from the Greek Word which means covered or secret message. STEGAN-O-GRAPHY COVERED + WRITING
  • 6. 6 • Steganography is a means of storing information in such a way that it hides private information and even the existence of the information within the other medium. • The goal of Steganography is “to hide messages inside other harmless messages, in a way that does not allow any enemy to detect that there is a second secret message present”.
  • 7. 7
  • 8. 8 STEGANOGRAPHY CRYPTOGRAPHY Unknown message passing Known message passing Little known technology Common technology Technology still being developed for certain formats Most of algorithms known by all Steaganography does not alter the structure of the secret message. Cryptography alters the structure of secret message.
  • 9. 9 A Steganography system Message file Cover fileCover file Steg file (with hidden data) Steg file (with hidden data) Message file Steganography ToolSteganography Tool Steganography ToolSteganography Tool Hiding messages Extracting messages
  • 10. 10 BASIC TYPESBASIC TYPES OFOF STEGOSYSTEMSSTEGOSYSTEMS Three basic types of stego systems 1. Secret-key stego systems 2. Public-key stego systems 3. Pure stego systems 10 .
  • 12. 12
  • 13. 13 oSteganography in Text oSteganography in Images oSteganography in Audio Image steganography
  • 14. 14
  • 16. 16
  • 18. 18
  • 19. 19
  • 21. 21 Variation in choosing LSBVariation in choosing LSB
  • 22. 22 TERMINOLOGY USED…TERMINOLOGY USED… • Cover : The data that is visible to the world. • Embedded: The data to be hidden (not visible to the world). • Stego: The data contains both cover and embedded data. • The data may be audio or video or image. • In case of audio data the cover is also termed as host signal, where as in case of image data the cover is termed as container. • The process of hiding the data is known as embedding.
  • 23. 23
  • 24. 24 WAV • WAV files are short for waveform audio files. • Microsoft and IBM first introduced the WAV file. • The Audio data after the sampling is done is stored in computer as a .wav file. • The average song has a large file size from 35 and 50 megabytes. • Most popular Audio Format. • Don’t lose any quality in recording.
  • 25. 25
  • 26. 26 Stego Audio Embedding Process LSB of the Data Part Alternate Samples of LSB Data Audio Input Separate Header and Data Secret Text BLOCK DIAGRAM EMBEDDING:
  • 27. 27 Convert Binary to ASCII Extraction Process Store LSB of Data Part Left Shift of Previous bit Stego Audio Separate Header and Data Extracted Text Extracting:
  • 28. 28 LETERSWITH ASCII VALUESAND CORRESPONDING BINARY VALUES Letter ASCII Value Corresponding Binary Value A 065 01000001 U 117 01110101 D 100 01100100 I 105 01101001 O 111 01101111 LETTERS WITHASCIIVALUES AND CORRESPONDING BINARY VALUES
  • 29. 29 ALGORITHM (FOR EMBEDDING OF DATA): ALGORITHM (FOR EMBEDDING OF DATA): • Leave the header section of the audio file untouched. • Start from a suitable position of the data bytes. (For the experiment purpose the present start byte was the 51st byte). Edit the least significant bit with the data that have to be embedded. • Take every alternate sample and change the least significant bit to embed the whole message.
  • 30. 30 SAMPLES OF AUDIO FILE WITH BINARY VALUES BEFORE ANDSAMPLES OF AUDIO FILE WITH BINARY VALUES BEFORE AND AFTER EMBEDDINGAFTER EMBEDDING Sample No. Binary values of corresponding sample Binary value to be embedded Binary values after modification 51 01110100 0 01110100 53 01011110 1 01011111 55 10001011 0 10001010 57 01111011 0 01111010 59 10100010 0 10100010 61 00110010 0 00110010 63 11101110 0 11101110 65 01011100 1 01011101
  • 31. 31 • Leave first 50 bytes. • Start from the 51st byte and store the least significant bit in a queue. • Check every alternate sample and store the least significant bit in the previous queue with a left shift of the previous bit. • Convert the binary values to decimal to get the ASCII values of the secret message. • From the ASCII find the secret message. ALGORITHM (FOR EXTRACTING OF DATA): ALGORITHM (FOR EXTRACTING OF DATA):
  • 32. 32 EXRACTION OF DATA FROM AUDIO FILE Sample No. Binary values with embedded secret data Bits that are stored in the queue 51 01110100 0 53 01011111 01 55 10001010 010 57 01111010 0100 59 10100010 01000 61 00110010 010000 63 11101110 0100000 65 01011101 01000001
  • 33. 33
  • 34. 34
  • 35. 35 • Modern Printers: o HP and Xerox brand colour laser printers o Tiny yellow dots are added to each page. o The dots are barely visible and contain encoded printer serial numbers as well as date and time stamps.
  • 36. 36 CorPorAte WorLd: In business world audio data hiding can be used to hide a secret chemical formula or plans for a new invention. ForensiC APPLiCAtions: to hide evidence audio steganography is used Anti-soCiAL eVents: Terrorists can also use Audio data hiding to keep their communications secret and to coordinate attacks.
  • 37. 37 • Difficult to detect and only receiver can detect. • Avoid ability of degradation and robustness for audio signals. • Protection of Intellectual digital works. • Internet privacy. • Secret communication between the organization like border security force and organization.
  • 38. 38 • Once algorithm known- confidentiality of information is lost. • Hackers may misuse the technique. • Due to distortion original signal may not be obtained.
  • 39. 39 As EVERY COIN HAS TWO SIDES, this technology besides having many benefits to make the internet business very safe and transmitting the defense messages secretly, it is also a threat to the society if it is used by anti social elements. “It will be more helpful if this technology is used in a proper way. The Steganography which we are seeing today is just an ice cap, we have to wait until it melts (ie. developed fully) to decide whether it is helpful to the society or not.”
  • 41. 41