Top Banner

Click here to load reader

Audio Steganography java project

Apr 12, 2017






qqqqqqqqqqqq UNIVERSITYCERTIFICATE This is to certify that the project report entitled STEGANOGRAPHY is a bonafide record of the project work done by the students:

In partial fulfillment of the requirement for the 6th semester of COMPUTER SCIENCE & ENGINEERING in Institute of Engineering Technology, qqqqqqqq University , ACKNOWLEDGEMENT This Project itself is an acknowledgment to the inspiration, drive and technical assistance contributed by many individuals. This project would have never seen the light of this day without the help and guidance I have received.

I express my gratitude to xxxxxxxxxx, Head, Department of Computer Science & Engineering, Institute of Engineering & Technology, Bundelkhand University , Jhansi , for providing me with excellent infrastructure and awesome environment that laid the potentially strong foundation for my professional life. I own an incalculable debt of my all staffs of Department of Computer Science & Engineering for their direct and indirect help.

I extend my heartfelt thanks to my parents, teacher, friends, and well-wishers for their support and timely help.

DECLARATIONI hereby declare that the project work entitled STEGANOGRAPHY

Is submitted in partial fulfillment of the requirements for the 6th semester. B.Tech (Computer Science & Engineering ) and it is a report of the original work done by me during the period of February May inPlace: Jhansi

Date: ---------------CONTENTS

Chapter noNamePage No

1Steganography at Large

1.1 Introduction

1.2 Where hidden data hides

1.3 What does the project do 7

2Problem Statement 9

3Objective 10

4Module Description

4.1 Interface Module Diagram

4.2Data Flow Diagram 11

5Behavioral Description5.1 image

5.2 audio 14

6Software Support

6.1 Technical details 17

7LSB Algorithm

7.1 Implementation 18

8User Manual

A. Image Steganography

B. Audio Steganography 20

9Summary 28

10Bibliography 29

Abstract Steganography is the art of hiding the fact that

Visit: For Complete Project 1. Steganography at Large 1.1 Introduction

Steganography derives from the Greek word steganos, meaning covered or secret, and graph (writing or drawing). On the simplest level, steganography is hidden writing, whether it consists of invisible ink on paper or copyright information hidden in an audio or image file.Where cryptography scrambles a message into a code to obscure its meaning, steganography hides the message entirely. These two secret communication technologies can be used separately or togetherfor example, by first encrypting a message, then hiding it in another file for transmission. As the world becomes more anxious about the use of any secret communication, and as regulations are created by governments to limit uses of encryption, steganographys role is gaining prominence.What Steganography essentially does is exploit human perception, human senses are not trained to look for files that have information hidden inside of them, although there are programs available that can do what is called Steganalysis (Detecting use of Steganography.) Steganography hides the secreted message within the host data set and presence imperceptible and is to be reliably communicated to a receiver. The host data set is purposely corrupted, but in a covert way, designed to be invisible to an information analysis.

1.2 Where Hidden Data hides?

It is possible to alter graphic or sound files slightly without losing their overall viability for the viewer and listener. With audio, you can use bits of the file that contain sound not audible to the human ear. With graphic images, you can remove redundant bits of color from the image and still produce a picture that looks intact to the human eye and is difficult to discern from its original.It is in those bits that stego hides its data. A stego program uses an algorithm, to embed data in an image or sound file, and a password scheme to allow you to retrieve information.1.3 What does the project do? Hiding the text message in audio or image file. Encryption of the same message, so as to support more secure steganography.

The decoding of the message, decryption and source message retrieval are also supported.

2. Problem Statement: Visit: For Complete Project3. Objective

The goal of steganography is to covert communication. So, a fundamental requirement of this steganography system is that the hider message carried by stego-media should not be sensible to human beings.

The other goal of steganography is to avoid drawing suspicion to the existence of a hidden message. This approach of information hiding technique has recently became important in a number of application area

This project has following objectives:

To product security tool based on steganography techniques.

To explore techniques of hiding data using encryption module of this project

To extract techniques of getting secret data using decryption module.

Steganography sometimes is used when encryption is not permitted. Or, more commonly, steganography is used to supplement encryption. An encrypted file may still hide information using steganography, so even if the encrypted file is deciphered, the hidden message is not seen.4. Module DescriptionHome:

This page will have the home display of the software and it will have the link to other modules also. Once the module is open it can then link to the database and retrieve the settings from the database. This module is also responsible to apply the settings on the other modules. This module will have only database reading capabilities and not writing.

Hide / Encrypt the data :

Create a File using the Text editor : This module will be used to create a file that will contain the Plaint text with no formatting. Also the file created under this module will not be saved in the system and can and will only be saved as a Encrypted (Visual encryption) or will be concealed under an image file.

Import file: In this module we will be able to import a file from the computer and that will be concealed under an image file.

Unhide / Decrypt the data:

Import file: This module will have the ability to import file(s). It will be able to decrypt, Unhide the file from the image file and it will also be able to retrieve the message from the image files generated by the encryption module using the Visual Cryptography.

4.1 Interface Module Diagram :


Visit: For Complete Project5. Behavioral Description for IMAGE Steganography

5. Behavioral Description for AUDIO Steganography USE CASE DIAGRAM Visit: For Complete Project

6. Software SupportOperating system:

Windows or GNU/LinuxJDK (1.7) : The Java Development Kit (JDK) is an implementation of either one of the Java SE, Java EE or Java ME platforms released by Oracle Corporation in the form of a binary product aimed at Java developers on Solaris, Linux, Mac OS X or Windows.

Java is fast, secure, and reliable. I am using Java because of some the most desirable features of Java. Some of those are list below-



Java Architecture

Object-Oriented Robust

JDBC (Java Database Connectivity)Swing :

Swing, which is an extension library to the AWT, includes new & improved components that enhance the look and functionality of GUIs. Swing can be used to build Standalone swing GUI Applications as well as Servlets and Applets. It employs model/view design architecture. Swing is more portable and more flexible than AWT. Swing is built on top of AWT and is entirely written in Java, using AWTs lightweight component support. The architecture of Swing components makes it easy to customize both their appearance and behavior.

7. LSB ALGORITHM for IMAGE7.1 Implementation:Structure of image files is that an image is created from pixels that any pixel created from three colors ( red, green and blue said RGB) each color of a pixel is one byte information that shows the density of that color. Merging these three color makes every color that we see in these pictures. We know that every byte in computer science is created from 8 bit that first bit is Most-Significant-Bit (MSB) and last bit Least-Significant-Bit (LSB), the idea of using Steganography science is in this place; we use LSB bit for writing our security information inside pictures. So if we just use last layer (8st layar) of information, we should change the last bit of pixels, in other hands we have 3 bits in each pixel so we have 3*hight*width bits memory to write our information. But before writing our data we m