Sei sulla pagina 1di 18

GENERAL SIR JOHN KOTELAWALA DEFENCE UNIVERSITY

FACULTY OF COMPUTING
DEPARTMENT OF COMPUTER SCIENCE

FINAL YEAR PROJECT PROPOSAL


Audio files and digital images steganography
application

BY SUPERVISED BY
4612 HI JAYAVILAL Mr. DMR KULASEKARA
1
INTAKE 32 Mrs. WPJ PEMARATHNE
Contents……
 PROBLEM ADDRESSED
 SOLUTION
 WHAT IS STEGANOGRAPHY….?
 AIM AND OBJECTIVES
 LITERATURE REVIEW
 METHODOLOGY
 REQUIREMENTS
 LIMITATIONS
 REFERENCES
2
Research problem………
 Today’s context communication securely is nearly impossible,
secret communication is Communicating with each other without
knowing to 3rd parties.
 Best way to harm our privacy is by stealing our information the best
way to do so is eavesdropping, eavesdropping means secretly
listening other people’s conversations.
 Can I communicate with people without getting caught ? Because
of that my interest in secret communication.

3
`
Secret
Message

Is Stego Message
Cover Embedding Stego Message? renewal Secret
Message Algorithm Message algorithm Message

Secret Secret
key key
Suppress
Message
4
Research solution………
 My Project deliverable will be a functional desktop application
which facilitates
it’s users to embed and extract text files in audio files,
in digital media such as images and scramble text paragraphs
to a non-understandable format,
descramble it to the original state to user to read it.
 Implement hiding application, which is able to protect the
messages in network environment .
 This system based on hiding these messages in audio files by
least significant bit (LSB) jumping algorithm technique.
5
What Is Steganography….?
 the practice of concealing a file, message, image, or video within
another file, message, image, or video. The
word steganography, meaning "covered, concealed, or
protected," and graphing meaning "writing".
 steganography is the hiding of a secret message within an
ordinary message and the extraction of it at its destination.
 Unlike encryption, where it's obvious that a message is being
hidden,
 steganography hides data in plain view,
 In steganography does not alter the structure of the secret
message, but hides it inside a cover image or audio so that it
6
cannot be seen .
Aim and objective………
Aim
Hide a message in a career and develop an application that acts as a perfect
educational tool complies with user requirements as the final output.
Objective
 Analyse user requirements and provide what they need.
 Provide easy to use interface.
 Provide a mix of functions in a one software.
 To learn different techniques of hiding data.
To make the outputs as undetectable as possible.

7
Literature Review……
PAPER YEAR TECHNOLOGIES DESCRIPTION

Three layered model for 2012 least significant bit The secret message to be transmitted is
audio steganography. replacement passed through two layers before it is
embedded within the cover message in
the third layer.
objective of the paper is to make sure the
confidentiality
Audio Steganography 2012 novel approach of Using genetic algorithm, message bits
using LSB submission technique are embedded into multiple and higher
of audio Steganography LSB layer values,

Efficient 2011 Enhanced Audio it uses most powerful encryption


Method of Audio Steganography (EAS) algorithm in the
Steganography by first level and in the second level it uses
Modified LSB Algorithm a modified LSB
and Strong Encryption
Key With Enhanced
Security
8
Literature Review…… cont.

PAPER YEAR TECHNOLOGIES DESCRIPTION

Data Hiding 2012 Least Significant Bit sample of cover audio is replaced with
Technique: Audio (LSB) secret message bit.
Steganography using method compares the spectra of original
LSB Technique audio signal before embedding and
audio signal after
embedding.
Modified LSB Audio 2013 method which is a The stego file along
Steganography variant of well-known with the filtered file thus obtained is
Approach” LSB method used to generate a
unique key.

9
Methodology……

 Emb: The message to be embedded.


 Cover: The data in which emb will be embedded.
 Stego: A modified version of cover that contains the embedded message
emb.
 Key: Additional secret data that is needed for the embedding and extracting
processes and must be known to both, the sender and the recipient. 10
Methodology……cont.
Carrier (Audio
file)

Embedding
Stego file
Message Module

Stego key

 Identification of redundant bits in a cover-file. Redundant bits are those bits that
can he modified without corrupting the quality or destroying the integrity of the
cover-file.
 To embed the secret information in the cover file, the redundant bits in the cover
file is replaced by the bits of the secret information. 11
Methodology……

8-bit ASCII Character Codes

12
Requirement……
 Functional Requirements
The system should select the correct file for encryption and decryption.
The system is supposed to perform steganography algorithm.
Should show and save decrypted text.
Should have an option to exit application.
Clear the space for new encryption.
Non-Functional Requirements
User Privacy
Response time
Reliability
Maintainability 13
Requirement……
 Software Requirements:
Tool Kit – MS Visual Studio
 Resource Requirements….
Resources that matches following criteria or above will be able to
run this program.
Requirements

Operating System Windows XP, Windows 7, 8, 8.1,10 with both x64 and x86 architecture.

Hard Disk Space 10GB

Ram 512MB and above

14
Limitation……

 Resources and availability


of examples – there are lots of careers to hide a message in such as .jpeg,
bmp, mp3
Application that supports careers such as .bmp format does not support
.jpeg careers.
 Functionality and durability – assuring that the developed application has the
ability to make the output a completed and successful one and not to corrupt
the original file.
 How much image/sound distortion is tolerable before the message is lost in the
noises.
 How much image/sound distortion is tolerable, before the user starts noticing
something weird?

15
Time plan……
ACTIVITIES JAN FEB MAR APR MAY JUNE JULY AUG SEP OCT NOV DEC

Project Title Identification

Project Scope Identification

Project Idea Submission

Project Proposal Submission

Literature review Study

Gathering data
Methodology Understanding

Technology Identification

Requirement Analysis

Writing the thesis

Design Analysis
Design Development

System Development part 1

Testing
System Development part 2

Testing 2
Overall System Testing

Thesis Submission

Supervisor Interaction 16
References……
1) Muhammad Asad, Junaid Gilani, Adnan Khalid, “Three Layered Model for Audio Steganography”, 2012
International Conference on Emerging Technologies (ICET)
2) Masahiro Wakiyama, Yasunobu Hidaka, Koichi Nozaki, “An audio steganography by a low-bit coding
method with wave files”, 2010 Sixth International Conference on Intelligent Information Hiding and
Multimedia Signal Processing, pp. 530 - 533.
3) Lovey Rana, Saikat Banerjee, “Dual Layer Randomization in Audio Steganography Using Random Byte
Position Encoding” , International Journal of Engineering and Innovative Technology, Volume 2, Issue 8,
February 2013
4) Kirti Gandhi, Gaurav Garg, “ Modified LSB Audio Steganography Approach” International Journal of
Emerging Technology and Advanced Engineering, Volume 3, Issue 6, June 2012, pp 158-161
5) Bankar Priyanka R., Katariya Vrushabh R, Patil Komal K, “Audio Steganography using LSB’’, International
Journal of Electronics, Communication and Soft Computing Science and Engineering, March 2012, pp 90-
92.
6) Medical Image Protection by Using Cryptography Data Hiding and Steganography, Vinay Pandey, Angad
Singh,
Manish Srivastava, ISSN 2250-2459,Volume 2,Issue
1,January 2012
7) Data Hiding Method with Quality Control for Binary Images, Ki-Hyun Jung, Kee-Young Yoo, J. Software
Engineering and Applications,2009,2:20-24. 17
Thank you…

18

Potrebbero piacerti anche