Top Banner
Audio STEGANOGRAPHY
22
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Audio steganography - LSB

Audio

STEGANOGRAPHY

Page 2: Audio steganography - LSB

www.company.com

STEGANOGRAPHY

Art and science of

writing hidden messages

No one apart from the

sender and intended recipient,

suspects the existence of the message

A form of security through

obscurity

Page 3: Audio steganography - LSB

www.company.com

STEGANOGRAPHY TECHNIQUE

Page 4: Audio steganography - LSB

MESSAGE

Embedded Data

Audio File

Hidden MESSAGE

Page 5: Audio steganography - LSB

Audio

Page 6: Audio steganography - LSB

www.company.com

AUDIO TERMS

• Sampling is the process in whichthe analogue values are only captured at regular time intervals.

• Quantization converts each input value into one of a discrete value.

• Popular sampling rates for audio include 8 kHz, 9.6 kHz, 10kHz, 12 kHz, 16 kHz, 22.05 kHz and 44.1 kHz

Page 7: Audio steganography - LSB

www.company.com

Audio File Types

File Format

Uncompressed 

WAV AIEF

Compressed

Lossy

Mp3, AAC, WMA

Loseless

ALAC, FlAC, WavPack

Page 8: Audio steganography - LSB

www.company.com

WHY .WAV ?Most popular Audio format

Don’t lose any quality in recording

Easier format for Development

No Compression!!

Page 9: Audio steganography - LSB

www.company.com

WAVE FILE FORMAT

Page 10: Audio steganography - LSB

www.company.com

WAVE FILE FORMATHEX Values of Wave

File Size Chunk Length of Format

Audio AttributesData Chunk

Page 11: Audio steganography - LSB

Steganography Techniques

Page 12: Audio steganography - LSB

www.company.com

TYPES OF STEGANOGRAPHY

LSB CODING

PHASE CODING

ECHO HIDING

SPREAD SPECTRUM

Page 13: Audio steganography - LSB

www.company.com

WHY LSB?

Low computational complexity

Easier Implementation

Variation in choosing LSB

Page 14: Audio steganography - LSB

www.company.com

LSB ALGORITHM

• Receives the audio file convert it into bit pattern.

Step1

• Each character in the message is converted into bit pattern.

Step 2• Check which LSB

to Replace By RC4 Algorithm

Step 3

• Replaces the LSB bit from audio with LSB bit from character in the message.

Step 4

Page 15: Audio steganography - LSB

www.company.com

CONT. ALGORITHM : CHANGING BITS

Page 16: Audio steganography - LSB

www.company.com

CONT. ALGORITHM : CHANGING BITS

RC4 Algorithm

Page 17: Audio steganography - LSB

www.company.com

RC4 ALGORITHM

RC4

The key-scheduling

algorithm (KSA)

The pseudo-random

generation algorithm (PRGA)

Page 18: Audio steganography - LSB

www.company.com

•  The key-scheduling algorithm (KSA)• initialize the permutation in the array "S•  Array "S" is initialized to the identity permutation• Swap values of S[i] and S[j].

RC4 ALGORITHM

Page 19: Audio steganography - LSB

www.company.com

• The pseudo-random generation algorithm (PRGA)• Used as many iterations as are needed

RC4 ALGORITHM

Page 20: Audio steganography - LSB

Live Demo

Page 21: Audio steganography - LSB

www.company.com

QUESTIONS

?