Sei sulla pagina 1di 5

ABSTRACT

The project entitled Audio Steganography is the application developed to embed an audio file in another
audio signal. It is concerned with embedding information in an innocuous cover Speech in a secure and
robust manner. This system makes the Files more secure by using the concepts Steganography and
Cryptography.

Steganography, poor cousin of Cryptography is the art of hiding messages inside other messages
such that the very existence of the message is unknown to third party. The goal of cryptography is to
make data unreadable by a third party, the goal of stenography is to hide the data from a third party
Through the use of advanced computer software, authors of images and software can place a hidden
trademark in their product, allowing them to keep a check on piracy. This is commonly known as
watermarking. Hiding serial numbers or a set of characters that distinguishes an object from a similar
object is known as finger printing. Together, these two are intended to fight piracy. The latter is used to
detect copyright violators and the former is used to prosecute them. But these are only examples of the
much wider field of stenography

The cover data should not be significantly degraded by the embedded data, and the embedded
data should be as imperceptible as possible. The embedded data should be as immune as possible to
modifications from intelligent attacks or anticipated manipulations .Thus it is necessary that the hidden
message should be encrypted.

Features

Audio Steganography is a one of hidden messaging system, user can send hidden and
important messages in a wave (.wav) file.
The message will be encrypted with a code number and send to the receiver, and then he
can decrypt the message giving same code number.
CreativeSoft (Corporate Office)
# 412, Annpurna Block,Aditya Enclave,Ameerpet,Hyderabad
500016 Tel : +91-40-40159158Mobile : 91-9247249455
Authors of books, manufacturers kept their emblem in hidden place to restrict the piracy
like water marking, in this also sender will keep the message in .wav file.
The .wav file will be saved automatically in another name when encryption is completed.

1Software Requirements

A set of programs associated with the operation of a computer is called software. Software is the part of
the computer system which enables the user to interact with several physical hardware devices.

The minimum software requirement specifications for developing this project are as follows:

Operating System : Window 2000, XP

Presentation layer : Java, Swings

Database : Oracle 8i.

Database layer : jdbc.

Presentation : Power Point 2003

Documentation Tool : Ms Office / GoBe Productive

Hardware Requirement Specification


The Collection of internal electronic circuits and external physical devices used in building a computer is
called Hardware.

The minimum hardware requirement specification for developing this project is as follows:

Processor : Pentium IV/AMD Athelon (1.6 GHz)

CreativeSoft (Corporate Office)


# 412, Annpurna Block,Aditya Enclave,Ameerpet,Hyderabad
500016 Tel : +91-40-40159158Mobile : 91-9247249455
RAM : 512MB RAM
Hard Disk : 10GB

Monitor : Standard Color Monitor

Keyboard : Standard Keyboard

Mouse : Standard Mouse

There is only one module for the Audio Steganography:

Admin
Admin Functionalities are:

Steganography is a sub discipline of information hiding that focuses on concealing the existence
of messages. It dates back to ancient Greece, where Herodotus, a famous Greek historian, tells a
story of how the ruler Histius shaved the head of one of his slaves and tattooed it with a
message. The message disappeared when the slave's hair grew back.
In pure Steganography, the secret lies in the embedding and extracting algorithms that only the
message sender and intended receiver should know. The simple example in the previous
paragraph illustrates a pure Steganography system--its success relies solely on the secrecy of the
algorithm.
Secret key Steganography is similar to a symmetric cipher. It is assumed that a party other than
the sender and intended receiver knows the embedding and extraction algorithms. The sender
embeds a message in a cover-object using a secret key known as a stegno-key. Therefore, even
if a third party intercepts the stegno-object and extracts the information, the result will appear
to be a random, garbled mess. Only the intended receiver who possesses the same key can
extract the original message.
Public key Steganography is based on principles of public key cryptography.

CreativeSoft (Corporate Office)


# 412, Annpurna Block,Aditya Enclave,Ameerpet,Hyderabad
500016 Tel : +91-40-40159158Mobile : 91-9247249455
In a computer-based audio Steganography system, secret messages are embedded in digital
sound. The secret message is embedded by slightly altering the binary sequence of a sound file.
Existing audio Steganography software can embed messages in WAV files.
Embedding secret messages in digital sound is usually a more difficult process than embedding
messages in other media, such as digital images. In order to conceal secret messages
successfully, a variety of methods for embedding information in digital audio have been
introduced. These methods range from rather simple algorithms that insert information in the
form of signal noise to more powerful methods that exploit sophisticated signal processing
techniques to hide information.
When hiding information inside Audio files the technique usually used is low bit encoding which
is some what similar to LSB that is generally used in Images.

Module Description:

There is one module in this Audio Steganography.

Admin Module:

The Functionalities of the Administrator is:

1. The administrator should login into the system with unique his/her password and username.
2. If the username and password is validated then he can gain access to the system.
3. Admin applies the Steganography concepts to the users file.
4. writes message and Encrypts the with the key
5. Decrypts the message

The Administrator can do the following actions:

1. Register
2. Login
3. Change Password

CreativeSoft (Corporate Office)


# 412, Annpurna Block,Aditya Enclave,Ameerpet,Hyderabad
500016 Tel : +91-40-40159158Mobile : 91-9247249455
4. Admin Actions
Receives the message
Applies the Steganography concepts
Forwards the message to the concerned user.
Sends the message(File)
Receive the message(File)

CreativeSoft (Corporate Office)


# 412, Annpurna Block,Aditya Enclave,Ameerpet,Hyderabad
500016 Tel : +91-40-40159158Mobile : 91-9247249455

Potrebbero piacerti anche