You are on page 1of 18

AUDIO STEGANOGRAPHY

NAMITA SRIVASTAVA (0805251012) RASHMI BARANWAL (0805210044) RENU CHAUDHARY (0805210047)

What is Steganography ?
Steganography is a method of hiding the message in

the file of any formats. The power of steganography is in hiding the secret message by obscurity, hiding its existence in a nonsecret file. Steganography is different from cryptography,

which involves making the content of the secret message unreadable while not preventing nonintended observers from learning about its existence. In steganography messages are invisible.

LAYERS OF AUDIO STEGANOGRAPHY:


The two layers in Audio Steganography are:
Encoding - is a process of hiding the message in the audio. Decoding - is a process of retrieving the message from the

audio.

Source Audio ss

Message

Encoded Audio

sbBss Bytes

key
d Encrypt

Bytes

Encoding Decode

Destination Audio

Decrypt

ENCODING

DECODING

Message

Algorithm Used:
Two types of algorithm are used in Audio Steganography:
Least Significant Bit Algorithm:It performs bit level manipulation to encode the message. STEPS: Receives the audio file in the form of bytes and converted into bit pattern. Each character in the message is converted in bit pattern. Replaces the LSB bit from audio with LSB bit from character in the message.

Encryption Algorithm:
Adding all ASCII values of characters in the key given by user. Converting the sum into bit pattern. Performing logical operation to the bit pattern. Adding to the encoded character.

Existing system
User can select only wav files to encode.

It supports water marking method to encode.


It is not efficient because it hides the message in

consecutive bytes received from audio file. Non-Provision of encryption key. Length of the message is limited to 500. Absence of frequency chart to show the variations. These are the disadvantages in the existing system which can be overcome by the proposed system .

Proposed system
Different Audio formats are supported by the system.

For example- wav, mp3, aiff, mid, au. Provision of encryption key and performs simple encryption algorithm. Length of the message is limited to 650. Presence of frequency chart to show the variations that helps the user to determine.

System modules
Following are the modules : Main : The main form which has all components. Encode : The process of encoding the message with audio. Decode : The process of decoding the message from audio. Encryption and Decryption: Encrypting with key and decrypting with same key Frequency Chart : Displays the variation Help: Provides help

Main Form

Encoding
The audio file contains set of bytes. Each byte is

received and checked if the received byte is 254 or 255. If it is byte 255 or 254, encoding is done. So for one character to encode we need eight 254 or 255 bytes. One character is hidden in consecutive eight 254 or 255 bytes. In order to mark the end of message, the LSB bit of next eight consecutive 254 or 255 bytes which comes after all the messages have encoded are replaced by 1 .

Decoding
The eight consecutive 254 or 255 bytes are taken and

decrypted with the public key. This decrypted byte have value less than 128. If the value is 255 after decrypted then it is said to be end of message.

Encryption
Message is encrypted using public key which can be in

any combination of numbers, symbols and characters. It will be same for sender and receiver. All characters are converted to ASCII value and add all the ASCII value to get single number. That single number is converted to bit pattern and by simple logical operation (XOR) we get a single number less than 128. It is added to the characters one by one in the message.

Decryption
The LSB bit of consecutive eight 254 or 255 bytes is

taken and subtract with the key to get the original character.

Frequency Chart

Requirements
Hardware Requirements: Processor Intel Core RAM 32MB/above Hard Disk 2 GB/above Software Requirements: Operating System -Window 7 Front End -JAVA 1.5 User Interface -JAVA Swing Back End -MS Paint,NotePad

SYSTEM ANALYSIS

ROAD MAP
(15 TH JAN) (15TH FEB)

SYSTEM DESIGN

CODING AND IMPLEMENTATION TESTING

(20TH MARCH)

(30TH MARCH)

FINAL SUBMISSION

(15TH APRIL)

You might also like