Professional Documents
Culture Documents
What is Steganography ?
Steganography is a method of hiding the message in
the file of any formats. The power of steganography is in hiding the secret message by obscurity, hiding its existence in a nonsecret file. Steganography is different from cryptography,
which involves making the content of the secret message unreadable while not preventing nonintended observers from learning about its existence. In steganography messages are invisible.
audio.
Source Audio ss
Message
Encoded Audio
sbBss Bytes
key
d Encrypt
Bytes
Encoding Decode
Destination Audio
Decrypt
ENCODING
DECODING
Message
Algorithm Used:
Two types of algorithm are used in Audio Steganography:
Least Significant Bit Algorithm:It performs bit level manipulation to encode the message. STEPS: Receives the audio file in the form of bytes and converted into bit pattern. Each character in the message is converted in bit pattern. Replaces the LSB bit from audio with LSB bit from character in the message.
Encryption Algorithm:
Adding all ASCII values of characters in the key given by user. Converting the sum into bit pattern. Performing logical operation to the bit pattern. Adding to the encoded character.
Existing system
User can select only wav files to encode.
consecutive bytes received from audio file. Non-Provision of encryption key. Length of the message is limited to 500. Absence of frequency chart to show the variations. These are the disadvantages in the existing system which can be overcome by the proposed system .
Proposed system
Different Audio formats are supported by the system.
For example- wav, mp3, aiff, mid, au. Provision of encryption key and performs simple encryption algorithm. Length of the message is limited to 650. Presence of frequency chart to show the variations that helps the user to determine.
System modules
Following are the modules : Main : The main form which has all components. Encode : The process of encoding the message with audio. Decode : The process of decoding the message from audio. Encryption and Decryption: Encrypting with key and decrypting with same key Frequency Chart : Displays the variation Help: Provides help
Main Form
Encoding
The audio file contains set of bytes. Each byte is
received and checked if the received byte is 254 or 255. If it is byte 255 or 254, encoding is done. So for one character to encode we need eight 254 or 255 bytes. One character is hidden in consecutive eight 254 or 255 bytes. In order to mark the end of message, the LSB bit of next eight consecutive 254 or 255 bytes which comes after all the messages have encoded are replaced by 1 .
Decoding
The eight consecutive 254 or 255 bytes are taken and
decrypted with the public key. This decrypted byte have value less than 128. If the value is 255 after decrypted then it is said to be end of message.
Encryption
Message is encrypted using public key which can be in
any combination of numbers, symbols and characters. It will be same for sender and receiver. All characters are converted to ASCII value and add all the ASCII value to get single number. That single number is converted to bit pattern and by simple logical operation (XOR) we get a single number less than 128. It is added to the characters one by one in the message.
Decryption
The LSB bit of consecutive eight 254 or 255 bytes is
taken and subtract with the key to get the original character.
Frequency Chart
Requirements
Hardware Requirements: Processor Intel Core RAM 32MB/above Hard Disk 2 GB/above Software Requirements: Operating System -Window 7 Front End -JAVA 1.5 User Interface -JAVA Swing Back End -MS Paint,NotePad
SYSTEM ANALYSIS
ROAD MAP
(15 TH JAN) (15TH FEB)
SYSTEM DESIGN
(20TH MARCH)
(30TH MARCH)
FINAL SUBMISSION
(15TH APRIL)