SlideShare a Scribd company logo
OBJECTIVE
TO HIDE TEXTUAL DATA IN AN
AUDIO SIGNAL
Sample
No.
Binary values of
corresponding
sample
Binary value
to be
embedded
Binary values
after
modification
51 01110100 0 01110100
53 01011110 1 01011111
55 10001011 0 10001010
57 01111011 0 01111010
59 10100010 0 10100010
61 00110010 0 00110010
63 11101110 0 11101110
65 01011100 1 01011101
SAMPLES OF AUDIO FILE BEFORE AND
AFTER EMBEDDING
EXTRACTION OF DATA FROM AUDIO
FILE
Sample No. Binary values with
embedded secret data
Bits that are stored in
the
queue
51 01110100 0
53 01011111 01
55 10001010 010
57 01111010 0100
59 10100010 01000
61 00110010 010000
63 11101110 0100000
65 01011101 01000001
ADVANTAGES
• SECRECY : known only to the sender &
receiver.
• IMPERCEPTIBILITY : indistinguishable from the
original.
• HIGH CAPACITY : depends on the size of the
audio.
DISADVANTAGES
• Once the algorithm is known
confidentiality of the information is lost.
• Hackers may misuse the technique.
• Due to distortion original signal may not
be obtained.
APPLICATIONS
• CORPORATE WORLD
• FORENSIC APPLICATIONS
• ANTI-SOCIAL ELEMENTS
HIDING TEXT IN AUDIO-STEGANOGRAPHY
HIDING TEXT IN AUDIO-STEGANOGRAPHY

More Related Content

What's hot

Smart Home Automation System ALAYOUBI TECHNOLOGIES
Smart Home Automation System ALAYOUBI TECHNOLOGIESSmart Home Automation System ALAYOUBI TECHNOLOGIES
Smart Home Automation System ALAYOUBI TECHNOLOGIES
مهند محمد أيوب
 
Spk Rock Duo3
Spk Rock Duo3Spk Rock Duo3
Spk Rock Duo3
LizChidester
 
Charleston Pines
Charleston PinesCharleston Pines
Charleston Pines 2015
Charleston Pines 2015Charleston Pines 2015
Charleston Pines 2015
Legacy Management Company LLC
 
Honeywell 5878-data-sheet
Honeywell 5878-data-sheetHoneywell 5878-data-sheet
Honeywell 5878-data-sheet
Alarm Grid
 
Dukane sm400 Sound System
 Dukane sm400 Sound System Dukane sm400 Sound System
Dukane sm400 Sound System
SchoolVision Inc.
 
Dukane wmic2 a-v3
Dukane wmic2 a-v3Dukane wmic2 a-v3
Dukane wmic2 a-v3
SchoolVision Inc.
 
Security systems for your smart home
Security systems for your smart home Security systems for your smart home
Security systems for your smart home
Abdul Rehman Al Balushi
 
Spk 24 Gx Duo
Spk 24 Gx DuoSpk 24 Gx Duo
Spk 24 Gx Duo
LizChidester
 
Active video protection, in all circumstances.
Active video protection, in all circumstances.Active video protection, in all circumstances.
Active video protection, in all circumstances.
Michel de Ruiter
 

What's hot (10)

Smart Home Automation System ALAYOUBI TECHNOLOGIES
Smart Home Automation System ALAYOUBI TECHNOLOGIESSmart Home Automation System ALAYOUBI TECHNOLOGIES
Smart Home Automation System ALAYOUBI TECHNOLOGIES
 
Spk Rock Duo3
Spk Rock Duo3Spk Rock Duo3
Spk Rock Duo3
 
Charleston Pines
Charleston PinesCharleston Pines
Charleston Pines
 
Charleston Pines 2015
Charleston Pines 2015Charleston Pines 2015
Charleston Pines 2015
 
Honeywell 5878-data-sheet
Honeywell 5878-data-sheetHoneywell 5878-data-sheet
Honeywell 5878-data-sheet
 
Dukane sm400 Sound System
 Dukane sm400 Sound System Dukane sm400 Sound System
Dukane sm400 Sound System
 
Dukane wmic2 a-v3
Dukane wmic2 a-v3Dukane wmic2 a-v3
Dukane wmic2 a-v3
 
Security systems for your smart home
Security systems for your smart home Security systems for your smart home
Security systems for your smart home
 
Spk 24 Gx Duo
Spk 24 Gx DuoSpk 24 Gx Duo
Spk 24 Gx Duo
 
Active video protection, in all circumstances.
Active video protection, in all circumstances.Active video protection, in all circumstances.
Active video protection, in all circumstances.
 

Recently uploaded

New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
HODECEDSIET
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Las Vegas Warehouse
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball playEric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
enizeyimana36
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
sachin chaurasia
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
mamamaam477
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 

Recently uploaded (20)

New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball playEric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 

HIDING TEXT IN AUDIO-STEGANOGRAPHY

  • 1.
  • 2. OBJECTIVE TO HIDE TEXTUAL DATA IN AN AUDIO SIGNAL
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. Sample No. Binary values of corresponding sample Binary value to be embedded Binary values after modification 51 01110100 0 01110100 53 01011110 1 01011111 55 10001011 0 10001010 57 01111011 0 01111010 59 10100010 0 10100010 61 00110010 0 00110010 63 11101110 0 11101110 65 01011100 1 01011101 SAMPLES OF AUDIO FILE BEFORE AND AFTER EMBEDDING
  • 10. EXTRACTION OF DATA FROM AUDIO FILE Sample No. Binary values with embedded secret data Bits that are stored in the queue 51 01110100 0 53 01011111 01 55 10001010 010 57 01111010 0100 59 10100010 01000 61 00110010 010000 63 11101110 0100000 65 01011101 01000001
  • 11. ADVANTAGES • SECRECY : known only to the sender & receiver. • IMPERCEPTIBILITY : indistinguishable from the original. • HIGH CAPACITY : depends on the size of the audio.
  • 12. DISADVANTAGES • Once the algorithm is known confidentiality of the information is lost. • Hackers may misuse the technique. • Due to distortion original signal may not be obtained.
  • 13. APPLICATIONS • CORPORATE WORLD • FORENSIC APPLICATIONS • ANTI-SOCIAL ELEMENTS