Sei sulla pagina 1di 7

Abstract

The main objective of the project Audio steganography is to embed the text message in cover audio file, using the available methods of audio steganography methods. The receiver extracts the message from carrier audio file. Steganography is a means of storing information in a way that hides that informations existence. Paired with existing communication methods, steganography can be used to carry out hidden exchanges. Avoiding communication in well-known forms greatly reduces the risk of information being leaked in transit. Another form of steganography, called watermarking is used primarily for identification and entails embedding a unique piece of information within a medium without noticeably altering the medium. Steganography can also enhance individual privacy. This is effective only if the hidden communication is not detected. Our system provides a very friendly User Interface where the user had to specify just the required inputs (audio, text).After embedding or extracting the user can save /open or just discord the output of that particular operation according to their wish. In view of providing security by preventing unauthorized person to access the software password facility is provided to the user in order to work with the software. To provide more security by avoiding an intruder to extract the embedded data a security key is used while embedding and extracting messag

Introduction
Least significant bit (LSB) coding is the simplest way to embed information in a digital audio file. By substituting the least significant bit of each sampling point with a binary message, LSB coding allows for a large amount of data to be encoded. The following diagram illustrates how the message HEY is encoded in a 16-bit CD quality sample using the LSB method: In LSB coding, the ideal data transmission rate is 1 kbps per 1 kHz. In some implementations of LSB coding, however, the two least significant bits of a sample are replaced with two message bits. This increases the amount of data that can be encoded but also increases the amount of resulting noise in the audio file as well. Thus, one should consider the signal content before deciding on the LSB operation to use. For example, a sound file that was recorded in a bustling subway station would mask low-bit encoding noise. On the other hand, the same noise would be audible in a sound file containing a piano solo. To extract a secret message from an LSB encoded sound file, the receiver needs access to the sequence of sample indices used in the embedding process. Normally, the length of the secret message to be encoded is smaller than the total number of samples in a sound file. One must decide then on how to choose the subset of samples that will contain the secret message and communicate that decision to the receiver. One trivial technique is to start at the beginning of the sound file and perform LSB coding until the message has been completely embedded, leaving the remaining samples unchanged. This creates a security problem, however in that the first part of the sound file will have different statistical properties than the second part of the sound file that was not modified. One solution to this problem is to pad

the secret message with random bits so that the length of the message is equal to the total number of samples. Yet now the embedding process ends up changing far more samples than the transmission of the secret required. This increases the probability that a would-be attacker will suspect secret communication. A more sophisticated approach is to use a pseudorandom number generator to spread the message over the sound file in a random manner. One popular approach is to use the random interval method, in which a secret key possessed by the sender is used as a seed in a pseudorandom number generator to create a random sequence of sample indices. The receiver also has access to the secret key and knowledge of the pseudorandom number generator, allowing the random sequence of sample indices to be reconstructed. Checks must be put in place, however, to prevent the pseudorandom number generator from generating the same sample index twice. If this happened, a collision would occur where a sample already modified with part of the message is modified again. The problem of collisions can be overcome by keeping track of all the samples that have already been used. Another approach is to calculate the subset of samples via a pseudorandom permutation of the entire set through the use of a secure hash function. This technique insures that the same index is never generated more than once.

System Analysis Existing System


Digital Steganography is the art of inconspicuously hiding data within data. Steganography is a process that involves hiding a message in an appropriate carrier for example, an image or an audio file. The carrier can then be sent to a receiver without anyone else knowing that it contains a hidden message. There are many techniques available to the digital steganographer. The most common technique is to exploit the lenient constraints of popular file formats. Many publicly available software packages use this technique on a variety of media. Images are a good medium for hiding data. The more detailed an image, the fewer constraints there are on how much data it can hide before it becomes suspect. The JPHide/JPSeek package uses the coefficients in a JPEG to hide information. Another method embeds data in visually insignificant parts of an image. Both of these methods alter the image; however, you can explore image degradation using different images and messages of varying length. An alternative, specific to GIF images, is to manipulate an images palette in order to hide data. Gifshuffle does not alter the image itself in any visible way; rather, it permutes a GIF images color map, leaving the original image completely intact. Digital Steganography have some drawback such as bellow1. Cannot provide more security 2. Audio file cannot be reusable.

Proposed System
The proposed system over comes all the restrictions made on the existing systems. It provides good looking environment to user .It also provide the user to give private key for encryption. The length of message is 650 characters and provides frequency chart to see the variations after encoding. The quality of the audio doesnt change variably. It cannot detect the lack in quality of sound. The encryption key can be any combination of characters, symbols, numbers. The key which is used for encoding is also used for decoding . There are two methods in Audio steganography 1) Encoding 2) Decoding Encoding is a process of hiding the message in the audio. Decoding is a process of retrieving the message from the audio. One ecode/decode library would be used to implement Algorithm is used to encode the message into audio. It performs bit level manipulation to encode the message. The following steps are: 1. Receives the audio file in the form of some file format . 2. Converted it in to binary pattern. 3. Receives the message file in the form of document file format 4. Each character in the message is converted in binary pattern. 5. Encoding process would be done among binary pattern of audio with binary pattern of character in the message.

For more security enhancement the encoding is done only when the byte which is received from the audio is a pattern of Bytes such as 254 or 255.This selection of particular bytes for encoding will reduce the lack in quality of audio after encoding. It can be proved by seeing the frequency chart indicating the deviations happened after encode. Thought it shows bit level deviations in the chart as a whole the change in the audio cannot be determined. The best types of audio to use any file formats. The redundancy of the data helps to hide the presence of a secret message. A cover audio should contain some randomness. It should contain some natural uncertainty or noise. Hiding information may introduce enough visible noise to raise suspicion. Therefore the carrier or cover audio must be carefully selected. Once it has been used the audio should not be used again and should be destroyed. A familiar audio should not be used so it is better for the steganographer to create their own audio. Some software displays the audio before and after data is hidden. The user will be someone who is familiar with the process of information hiding and will have knowledge of Information systems. \

System Specification
Hardware Specification

Processor

: Pentium 111

RAM

: 128 MB

Keyboard

: 101 Keys

Hard Disk Software Specification

: 40 GB

Operating System

: Windows XP/7

Language

: Java (JDK 1.5)

IDE

: Netbeans

Potrebbero piacerti anche