Top Banner
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.

2. STEGANOGRAPHY No one apartfrom theArt andA form ofsender and science of security intendedwriting hiddenthroughrecipient, messagesobscurity suspects theexistence of the message 3. STEGANOGRAPHY 4. EmbeddedDataHidden MESSAGEAudio FileMESSAGE 5. Audio 6. AUDIO TERMS Sampling is the process in whichthe analogue values are only captured at regulartime intervals. Quantization converts each input value into oneof a discrete value. Popular sampling rates for audio include 8 kHz,9.6 kHz, 10kHz, 12 kHz, 16 kHz, 22.05 kHz and44.1 kHz 7. Audio File TypesFile Format Uncompressed CompressedLossy Loseless WAVAIEFALAC, FlAC, Mp3, AAC, WMA 8. WHY .WAV ?Most popular Audio formatDont lose any quality in recordingEasier format for DevelopmentNo Compression!! 9. WAVE FILE FORMAT 10. WAVE FILE FORMATHEX Values of WaveFile Size Chunk Length of Format Data Chunk Audio 11. SteganographyTechniques 12. TYPES OF STEGANOGRAPHYLSB CODINGPHASE CODING ECHO HIDING 13. WHY LSB?Low computational complexityEasier ImplementationVariation in choosing 14. LSB ALGORITHM Step 2Step 4 Receives the Check which LSB Replaces the LSBaudio file Each characterto Replace By bit from audioconvert it into bit in the message is RC4 Algorithm with LSB bit frompattern.converted intocharacter in thebit pattern.message.Step1Step 3 15. CONT. ALGORITHM : CHANGING BITS 16. CONT. ALGORITHM : CHANGING BITSRC4 Algorithm 17. RC4 ALGORITHMRC4 The pseudo-The key- random schedulinggenerationalgorithm (KSA)algorithm (PRGA) 18. RC4 ALGORITHM The key-scheduling algorithm (KSA) initialize the permutation in the array "SArray "S" is initialized to the identity permutation Swap values of S[i] and S[j] 19. RC4 ALGORITHM The pseudo-random generation algorithm (PRGA) Used as many iterations as are needed 20. Live Demo 21. 22. RESOURCES Source Code : Other Online