Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
The project entitled Audio Steganography is the application developed to embed an audio file in another
audio signal. It is concerned with embedding information in an innocuous cover Speech in a secure and
robust manner. This system makes the Files more secure by using the concepts Steganography and
Cryptography.
Steganography, poor cousin of Cryptography is the art of hiding messages inside other messages
such that the very existence of the message is unknown to third party. The goal of cryptography is to
make data unreadable by a third party, the goal of stenography is to hide the data from a third party
Through the use of advanced computer software, authors of images and software can place a hidden
trademark in their product, allowing them to keep a check on piracy. This is commonly known as
watermarking. Hiding serial numbers or a set of characters that distinguishes an object from a similar
object is known as finger printing. Together, these two are intended to fight piracy. The latter is used to
detect copyright violators and the former is used to prosecute them. But these are only examples of the
much wider field of stenography
The cover data should not be significantly degraded by the embedded data, and the embedded
data should be as imperceptible as possible. The embedded data should be as immune as possible to
modifications from intelligent attacks or anticipated manipulations .Thus it is necessary that the hidden
message should be encrypted.
Features
Audio Steganography is a one of hidden messaging system, user can send hidden and
important messages in a wave (.wav) file.
The message will be encrypted with a code number and send to the receiver, and then he
can decrypt the message giving same code number.
CreativeSoft (Corporate Office)
# 412, Annpurna Block,Aditya Enclave,Ameerpet,Hyderabad
500016 Tel : +91-40-40159158Mobile : 91-9247249455
Authors of books, manufacturers kept their emblem in hidden place to restrict the piracy
like water marking, in this also sender will keep the message in .wav file.
The .wav file will be saved automatically in another name when encryption is completed.
1Software Requirements
A set of programs associated with the operation of a computer is called software. Software is the part of
the computer system which enables the user to interact with several physical hardware devices.
The minimum software requirement specifications for developing this project are as follows:
The minimum hardware requirement specification for developing this project is as follows:
Admin
Admin Functionalities are:
Steganography is a sub discipline of information hiding that focuses on concealing the existence
of messages. It dates back to ancient Greece, where Herodotus, a famous Greek historian, tells a
story of how the ruler Histius shaved the head of one of his slaves and tattooed it with a
message. The message disappeared when the slave's hair grew back.
In pure Steganography, the secret lies in the embedding and extracting algorithms that only the
message sender and intended receiver should know. The simple example in the previous
paragraph illustrates a pure Steganography system--its success relies solely on the secrecy of the
algorithm.
Secret key Steganography is similar to a symmetric cipher. It is assumed that a party other than
the sender and intended receiver knows the embedding and extraction algorithms. The sender
embeds a message in a cover-object using a secret key known as a stegno-key. Therefore, even
if a third party intercepts the stegno-object and extracts the information, the result will appear
to be a random, garbled mess. Only the intended receiver who possesses the same key can
extract the original message.
Public key Steganography is based on principles of public key cryptography.
Module Description:
Admin Module:
1. The administrator should login into the system with unique his/her password and username.
2. If the username and password is validated then he can gain access to the system.
3. Admin applies the Steganography concepts to the users file.
4. writes message and Encrypts the with the key
5. Decrypts the message
1. Register
2. Login
3. Change Password